Preview

Should Employees Be Allowed to Use Work Computers for Personal Use?

Better Essays
Open Document
Open Document
996 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Should Employees Be Allowed to Use Work Computers for Personal Use?
Should Employees Be Allowed to Use Work Computers for Personal Use?

Using Work Computers for Personal Use

Introduction 1. Briefly discuss topics

Body 1. Computers have changed the workplace 2. Importance of computer use policy 3. Disciplinary action for misuse

Conclusion Give a summary of the topics, reiterating the importance of knowing the employers’ computer use policy and stressing that a little common sense goes a long way.

The widespread use of Internet and e-mail has transformed the way business is conducted in the typical American workplace. Undeniably, the Internet and e-mail have also given employees a means of escaping briefly from long days at the office. How many of you have used work computers for your personal use? More than likely all of us have at one point or another. Should our employers even allow us to use the business computers for our own personal benefit on company time? Of course, the answer to this question varies from business to business depending on the computer use policy of the particular company. Employees should know and understand their employers’ computer use policy before accessing business computers for personal use. Disciplinary action, up to and potentially including termination of employment, could result if misuse occurs. In every industry, computers have left their mark on the workplace, changing the way people do their jobs. They make trusty assistants, helping workers to manage information more effectively and automate repetitive tasks. They connect employees across the office or across the globe, and they connect businesses with customers in the same way. They standardize the routines of work, sometimes trading individuality for efficiency. They even transform the idea of the workplace itself into a virtual structure that enables employees to work remotely. In a perfect world common sense and a solid work ethic would keep employees on task throughout the



References: Adams, S. (2002). Dilbert and the Way of the Weasel. New York: Harper. Conner, C. (2012, July 17). Employees Really Do Waste Time at Work. Forbes. Retrieved from http://forbes.com Gouveia, A. (2012). Wasting Time at Work 2012. Retrieved from http://www.salary.com White, M. (2012, March 13). You’re Wasting Time at Work Right Now, Aren’t You? Time Business & Money. Retrieved from http://business.time.com

You May Also Find These Documents Helpful

  • Good Essays

    The company’s computer network, including its connection to the Internet, is to be used for business-related purposes. Any unauthorized use of the Internet is strictly prohibited. Unauthorized use includes, but is not limited to, connecting, posting, or downloading pornographic material; engaging in computer “hacking” and other related…

    • 696 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    You will be able to describe various ways people use computers based on their lifestyles and…

    • 402 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    UNV104

    • 999 Words
    • 4 Pages

    Internet abuse is an issue in the workplace. Statistics show the internet is being used for personal use during work hours. Extensive internet use causes a decrease in productivity and an increase in liability.…

    • 999 Words
    • 4 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Better Essays

    DEUTSCH, MIMI. "Work And Family--What Are Companies Doing?." Financial Executive 8.3 (1992): 60-61. Business Source Premier. Web. 1 Nov. 2013.…

    • 1193 Words
    • 5 Pages
    Better Essays
  • Best Essays

    The Sarbanes-Oxley Act

    • 2729 Words
    • 11 Pages

    The missing of a formal acceptable use policy (AUP) did not give user or management a guideline on the day-to-day activities. The incident involving Laura requesting trial software without getting proper security review and authorization shows the lack of security awareness and proper request for exception procedure. According a report from Ernst & Young, over 75% of security breaches are caused by activities by internal users (H. M. P. S. & Wijayanayake, 2009). Misuse of computer resources in work place not only reduced productivities but also bring additional risk to company’s reputation. Activities like surfing the web and participating in social networking sites might bring questionable contents to the work place. These contents can be seen as a form of sexual harassment. The Melissa virus, founded in 1999, was originally planted in an alt.sex Usenet newsgroup message. The billions of dollars of productivity lost and the negative publicity can tarnish the image and the business of Firion. Without a formal review on software request, the IT security organization will not be able to design a security solution to cover the user base. This gap will allow both internal and external intruders to plant software or Trojan to disrupt services or stealing…

    • 2729 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    Xcom/285 Privacy Laws

    • 321 Words
    • 2 Pages

    Friedman, B., & Reed, L. (2007, June). Workplace privacy: Employee relations and legal implications of monitoring employee e-mail use. Employee Responsibilities and Rights Journal, 19(2),…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    IT policies and procedures in any organization provides a framework for appropriate and inappropriate use of computing and information resources (Winniford, et al, 2012). More specifically, the organization would have in writing that using a computer system without proper authorization granted through Briargrove’s Administration would have adverse actions on their…

    • 1283 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    The use of company-owned computing devices and networks is a privilege, instead of a right, and inappropriate use can result in revocation of such privilege. Employees must remember that their behaviors represent the actions of the company, and the respect to the rights of others and all relevant laws, regulations and contracts. Employees also must be aware of that their inappropriate uses may lead to catastrophic results on the company and other employees. This acceptable use policy grants the right for users to gain access to the network of Richman Investments and also binds the said user to follow and abide accordingly to the agreements set forth for network access provided below.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Best Essays

    In the modern world, several businesses and organizations support an ironically traditional style of work. An employee wakes up on the morning of a workday, pours their cup of Joe, goes off to work, and sits down at their office desk and starts up the computer owned by the company in which they are employed. However, a new initiative, the Bring Your Own Device (BYOD) policy has plans to alter this long held work tradition, namely, the structure of the workplace. The BYOD initiative proposes that in a modern and technologically diverse world, employees should now have the responsibility to trek their own…

    • 1383 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Bowen, W. (1989) ‘The Puny Payoff from Office Computers’ in Forester, T.(Ed) Computers in the Human Context, Blackwell, Oxford.…

    • 8333 Words
    • 34 Pages
    Powerful Essays
  • Better Essays

    Technology plays a great part in the social implications of our modern world. Americans can hardly go a day without using the new technology and inventions. Science fiction is a thing of the past. Now we have cell phones, flat-screen T.V.’s, portable computers, video-games, the web, CT scans, antilock brakes, and more. If you compare a 1985 model car to its counterpart of today, you can see the improved and added features such as, power doors and windows, dual airbags, better fuel efficient engines, built in CD and GPS, air conditioner, and fewer defects (Nye, 2002). The modern economy today is knowledge based, globalized, entrepreneurial, IT-driven, and innovation-based (Atkinson, 2010). The forever changing forces, such as economic climate, fast paced, and challenging times is what the workplace is now. The office design has become smaller and simpler. The process of workplace technology has grown immensely. The reduction of the computer in size, weight and mobility requires less space and yet it stores more data, reducing the amount of paper being used (London Councils 2006). As more of the work…

    • 946 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Internet and the Workplace

    • 1937 Words
    • 8 Pages

    The Internet has become a pervasive presence in the American workplace. Two-thirds of employees in medium and large companies in the United States now have Internet access, compared with fifteen percent only two years ago, according to a sampling of 500 companies surveyed by the IntelliQuest Corporation. (IntelliQuest)…

    • 1937 Words
    • 8 Pages
    Better Essays
  • Better Essays

    Method to the Madness

    • 1951 Words
    • 8 Pages

    Evans, T. (2009). Time management by the very time-challeneged. [online] Retrieved from: http://www.businessweek.com/magazine/content/09_72/s0912052526727.htm [Accessed: 18 Feb 2014].…

    • 1951 Words
    • 8 Pages
    Better Essays
  • Good Essays

    She completed all the work that was given to her before it was due, so she had a right to use some of her down time to do what she wanted. What she was doing on the computer was not serious enough for het to be dismissed or reprimanded. She only uses the computer for a couple of reasons; to look on shopping sites but she doesn’t purchase anything, personal emails, and downloading music to listen to block out the noise so she could concentrate better on her work. If other employee could use their computers for personal use without getting in trouble, why couldn’t…

    • 585 Words
    • 3 Pages
    Good Essays