Preview

Organizational Policy - Computer Monitoring

Good Essays
Open Document
Open Document
945 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Organizational Policy - Computer Monitoring
Cynthia Gallo
IFSM 304
James Jones
October 9, 2011
ORGANIZATIONAL POLICY – COMPUTER MONITORING
Introduction
An organizational policy as defined by Tutorialspoint.com is a principled adopted by a company or an organization set in place to determine and influence decisions established by senior management (2011). According to Murugan Anandarajan’s book, The Internet and Workplace Transformation: Advances in Management Information Systems, it states “As guidelines, organizational policies may discipline computer use and Internet access, helping employees understand what behaviors are acceptable or not” (2006). Misuse of company resources have led to companies reevaluating the guidelines and policies currently in place. Developing a new organizational policy to address the issue of computer and internet usage and addressing the ethical dilemma of employee computer monitoring is essential for the well-being and productivity of the company.
Organizational Policy
When accessing the company’s network (on-site or remotely), employees must limit personal computer and internet usage only during their allocated break and lunch times. During these times, internet and computer usage must be appropriate. In the case there is reasonable suspicion that an employee is in violation of this policy, the company holds the right to monitor computer activity. The company holds the right to terminate an employee based on information found after monitoring their workstation. If the offense does not deem a termination, computer training will be conducted for the employee to reestablish comprehension of proper use of company resources.
How will this help the Company The policy in place will help the company by assuring all employees are not misusing company resources and productivity is maintained. “Employees who access inappropriate sites pose serious legal liabilities for the organization” (Young, 2010), which means applying the policy can reduce these risks significantly.



References: Anandarajan, M. (2006). The Internet and Workplace Transformation: Advances in Management Information Systems Friend, L. (2010). “Benefits and Effects of Computer Monitoring in the Workplace.” Chron Small Business CMMI Glossary (2011). “Organizational Policy”. Tutorialspoint.com. Retrieved October 8, 2011 from http://www.tutorialspoint.com/cmmi/cmmi-glossary.htm#O Reynolds, G.W. (2010). Ethics in Information Technology (3rd Ed.). Boston, MA: Course Technology. Young, K. (2011, February) “Management Wise: Killer Surf Issues: Crafting an Organizational Model to Combat Employee Internet Abuse.” Information Management October 6, 2011 from http://content.arma.org/imm/IMMJanuary- February2010/IMM0110managementwisekillersurfissues.aspx

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Each workstation will be set up to automatically lock the screen after 3 minutes of no use. Employees will be trained on how to keep their workstations and network credentials secure. Under no circumstances are employees to use flash drives or any type of external…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Behaviors such as transferring files from a work device to a home computer that is not protected or maintained to IT’s standards, using personal communications that are not as safe as corporate communications, talking about sensitive company matters where others can hear the conversation, and failing to use a laptop privacy guard when working remotely in a public place all invite information theft. Employees also fail to safeguard equipment such as laptop computers and portable storage devices, which can be lost or stolen (Cisco Systems, 2008, p 5).…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    User domain is essentially the people who access the information system. User domains tend to receive risk due to the user’s carelessness due to lack of awareness, not caring for policies, and security violations. These can easily be rectified with training. Conduct security awareness training, display security posters around the office, and send email reminders to keep the policies fresh in the employee’s mind. Another common threat is caused by employee misuse of the system. Employees might insert USB drives, or download photos music and videos. These items might contain virus’s which in turn damages the system. The USB ports should be disabled and content filtering and antivirus scanning should be enabled.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 4222-307 Answers

    • 767 Words
    • 4 Pages

    The Internet and Email Acceptable Use Policy provides all staff with access to email and internet a framework and set of rules and regulations to follow, to ensure that they know what they can and cannot enter or send…

    • 767 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Acct Internal Control

    • 716 Words
    • 3 Pages

    The first internal control should be implemented within the human resources department which is the human resources control to define the policies and procedures for hiring practice of LBJ Company. The human resource department will have the expertise to establish policies that speak directly to the proper acquisition, promotion, benefits, and termination of all future and current employees. A full background check will be conducted on each individual who are seriously vetted for a position within LBJ. This process will eliminate the embarrassment experience by the president recently. In addition to the background checks being put in place for all employees, the principle of establishing responsibility control is needed to ensure that every employee has accountability to themselves and LBJ. This will be done by introducing a computer usage agreement signed and placed in each employee file. Having this legal and binding agreement with the employees and LBJ, will state the policy of use of all computer systems within the company and the recourse if said agreement is violated and mandate that each user have a username and password to be changed every 45 days. With the usage of common access cards or username and password combination will readily identify anyone who is engaging in illegal activities on the company’s asset by…

    • 716 Words
    • 3 Pages
    Good Essays
  • Good Essays

    UNV104

    • 999 Words
    • 4 Pages

    Internet abuse is an issue in the workplace. Statistics show the internet is being used for personal use during work hours. Extensive internet use causes a decrease in productivity and an increase in liability.…

    • 999 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Web page and search engines are very helpful and can provide a lot of information at an employee’s fingertips, however if these programs are not monitored they can be abused by personal use of employees. Managers and other department supervisors should monitor the use of email, instant messaging, web pages, and search engines because it is important to…

    • 346 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Safety Policy” covering the filtering discussed above. For minors, the policy must also address monitoring of online activities, the safety and security of all forms of direct electronic communications, unauthorized online access, and unauthorized disclosure of personal identification information.…

    • 1205 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Why: Management should define the policies for the reason to use the Internet, how to use the Internet, responsibilities of the person online, and consequences for in appropriate use. This will allow the IS department to take measures to ensure security over the Web, while still allowing for successful business to be conducted.…

    • 545 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    IT policies and procedures in any organization provides a framework for appropriate and inappropriate use of computing and information resources (Winniford, et al, 2012). More specifically, the organization would have in writing that using a computer system without proper authorization granted through Briargrove’s Administration would have adverse actions on their…

    • 1283 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    This section of the employee handbook is provided as a guideline for employees to understand the company policy and procedures regarding privacy in the workplace. While this section cannot address every possible scenario that may occur, the general policy will serve as a basis of understanding the key workplace issues and employee privacy. This section addresses privacy issues related to personal background information, off-work activities, and the corporate policy on the use of electronic monitoring. These privacy policies are designed to both provide a clear guideline for employees on the difference between job related and personal privacy. The policies are designed to create a standard set of procedures that apply equally to all employees. The company goal is to provide a fair workplace for everyone, while at the same time protect the organizations professional reputation. The privacy policies are all in compliance with state, federal, and international laws.…

    • 1411 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Speculate whether employers should have more or fewer rights to monitor employee use of company equipment, such as laptops, tablets, and cell phones issued for out-of-office, potentially after-hours work. Suggest at least three methods for an employer to monitor its employees’ use of company equipments. Provide a rationale for your response.…

    • 297 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Computer and Internet technology use in the workplace gives rise to questionable ethical practices among employees as well as managers. For the last three (plus) decades the increasing availability and advances in technology has improved productivity; however the use of computers and Internet in the workplace leads to temptation to misuse the resource for personal gain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    HRM3704

    • 5092 Words
    • 17 Pages

    [To be issued by employer to staff governing authorised use of internet and email facilities assuming that limited personal use is permitted]…

    • 5092 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    employees can have a “reasonable expectation of privacy in their use of e-mail and internet” at…

    • 1089 Words
    • 5 Pages
    Good Essays