Preview

Misuse of Internet

Powerful Essays
Open Document
Open Document
1778 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Misuse of Internet
* 1. Managing Internet Misuse Inside the Company * 2. It is important to learn how to prevent misuse of your company’s technology resources and how to protect your business from legal liability for employee misuse of e-mail, blogs and the Internet. Managing Internet Misuse Introduction * 3. More than 25% of employers have fired workers for misuse of e-mail. 1/3 of employers have fired an employee for misuse of the Internet. More than 50% of employers have disciplined an employee for violating e-mail policies. Managing Internet Misuse USA Internet Misuse - Information * 4. 60 million Americans have e-mail and/or Internet access at work. 70% of workers admitted to viewing or sending sexually explicit e-mail at work. Most traffic to Internet pornographic sites occurs during regular business hours (faster connection). Worker admits to squandering away 2.09 hours per 8-hour workday. 60% of employees admit having exchanged e-mail that could be considered racist, sexist or otherwise “politically incorrect. Managing Internet Misuse USA Internet Misuse - Information * 5. Companies estimate that more than 1 in every 5 outgoing e-mails contains content that poses a legal, financial or regulatory risk. Managing Internet Misuse USA Internet Misuse – The Problem is Growing * 6. There are many reasons of monitoring Internet use inside an organization: To reduce the risk of legal liability. To protect assets. To prevent the loss of productivity. To minimize negative publicity. Managing Internet Misuse Why Should Employers Monitor Internet Use? * 7. Implement and publish policies to monitor company e-mail and Internet use. Implement a monitoring system and consider using technology to block employee access to websites that are offensive or unrelated to work. Respond quickly and consistently when inappropriate use is discovered. Managing Internet Misuse What Companies can do? * 8. Employers have a duty to prevent certain kinds of inappropriate use of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    For the LAN domain, inform employees about email scams. Most users know not to open emails when on our system. Spam filters can help control junk email, so there is less risk of opening emails containing malware.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Corporation Tech will face many security risks with their current network. The user domain is the single most vulnerable part of any network and as such poses the most obvious security risk. To mitigate risks involving the users is to implement policies and training to educate the user on proper use and security best practices. By educating the user on security practices such as secure passwords, safe web surfing, and securing their workstations, many potential attacks can be avoided. Policies and training are also necessary because they can be used as evidence when taking administrative action against a user or intruder in the event the system or data information is compromised.…

    • 612 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The user domain is the employees who access the organization network and IT infrastructure. There should be a policy in place that defines what the employee can do inside the organization. A employee handbook would be beneficial and should list all of the guidelines and procedures. Many smack threats can be avoided by the lack of knowledge and security violations. Reminders like emails and periodic meetings can help employees be more aware about threats and technology updates. If there is a security violation the employee should be under watch and have a meeting with their supervisor. Employee’s daily usage should also be supervised periodically to…

    • 347 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NT2580 Unit 1

    • 578 Words
    • 3 Pages

    The first domain that would be affected is the User Domain. The User Domain defines the people who access an organization’s information system. One of the roles and tasks is that the user can access systems, applications, and data depending upon their defined access rights. Inside the User domain is where the user would find the acceptable user policy or AUP. The AUP defines what users are allowed to do within the organization-owned IT assets. The User Domain is considered the weakest and most affected domain. One reason why is that it has a lack of user awareness. Another reason is that when users are downloading various content and different files, they generally do not conform to the established security guidelines. To protect from these issues, there should be enabled content filtering as well as automatic antivirus scans. A way to protect from an user doing Employee blackmail or extortion is to enable intrusion detection system/intrusion prevention system (IDS/IPS) monitoring. The monitoring will examine the IP data streams for inbound and outbound traffic.…

    • 578 Words
    • 3 Pages
    Good Essays
  • Better Essays

    References: Morton, H. (October, 2002 10). Somerville college policy on staff use of email and internet. Retrieved from http://www.some.ox.ac.uk/cms/files/policy_on_staff_use_of_email_and_internet_Oct_02.pdf…

    • 1402 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    I believe that they should monitor employee email and internet usage. By allowing the company to monitor such actions it will stop individuals wasting valuable company time. This also allows for restrictions of site access if one is exploring sites they should not be. It is important to watch to be sure that important information about the company is not leaked out to the public. Actions of their employees effect company whether online or not online. Although, the internet makes it easier to incidentally bring hardship to company in which one works the actions can cause lawsuits against the company.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Spamming coworkers Accessing prohibited websites Purposely circumventing security policies Sending files with sensitive data outside the organization.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    We will watch how the users go about their daily activities on the company’s internet/network and make notes on what we see to be as an opposing threat to the company itself. Monitoring how much bandwidth is being used and for what, also if any employee tries to load out of company software or use flash drives from home will be locked out immediately and then be questioned about it.…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Employees have a reasonable expectation of privacy within the workplace; however there are circumstances when an employer has a legitimate right to monitor, investigate, and review the activities of its employees. The following identifies business practices that may be executed to ensure the integrity of company products and property, workplace safety, and the monitoring of employee productivity.…

    • 1493 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Xcom/285 Privacy Laws

    • 321 Words
    • 2 Pages

    Friedman, B., & Reed, L. (2007, June). Workplace privacy: Employee relations and legal implications of monitoring employee e-mail use. Employee Responsibilities and Rights Journal, 19(2),…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    however there are circumstances when an employer has a legitimate right to monitor, investigate, and review the activities of its employees. The following identifies business practices that may be enacted to ensure the integrity of company products and property, workplace safety, and the monitoring of employee productivity.…

    • 1411 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Speculate whether employers should have more or fewer rights to monitor employee use of company equipment, such as laptops, tablets, and cell phones issued for out-of-office, potentially after-hours work. Suggest at least three methods for an employer to monitor its employees’ use of company equipments. Provide a rationale for your response.…

    • 297 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays

Related Topics