Preview

Workplace Monitoring Proposal

Good Essays
Open Document
Open Document
560 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Workplace Monitoring Proposal
Workplace monitoring in India
Group 13
Abhinav Yadav (1411001)
Ashutosh Pathak (1411011)
Bidyut Bikash Changmai (1411013)
Abhinav katakdhond (1411026)

Submitted on 30.01.2015
Management of Information Systems and Technology

1. Need for workplace monitoring
Technology makes it possible for employers to monitor online and offline behavior of employees in the workplace. In addition to audio and video surveillance, companies are increasingly monitoring their employees’ internet surfing habits, social media interactions and email communications.
Companies justify the necessity of such monitoring as a precautionary measure against disgruntled or tone-deaf employees who criticize customers, harass subordinates and otherwise misbehave1. Many a times these behaviors bring workplace tensions, complaints and can damage a company’s reputation among employees (both current and prospective) and customers.
Another reason to use workplace monitoring is to increase productivity of employees. For instance, monitoring software used in restaurants has resulted in revenue increase of about 7%, a sizeable gain in a low-margin industry2. Restaurants owner track performance of individual waiters, thus, allowing them to coach and train waiters whose sales are less than average.
Other reasons include preventing cyberslacking and cannibalization of organisations resources and theft of organization’s data.
Proposal: Incidences of effective monitoring from literature and primary interviews. Focus on increased productivity, minimizing losses and other benefits.

2. Workplace monitoring in India
In India, organizations in the technology sector, viz., IT, BPO and KPO have adopted workplace monitoring3. Data security concerns is of primary importance. Laws related to data security is inadequate in India and workplace monitoring prevents intended or unintended loss of critical information. Other MNCs working in India may adopt practises of their originating country.
Proposal: To study

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Implications differ form company to company. But many of the companies monitor their employees to make sure that they are not sharing company related information with people out of the company. Some companies monitors to make sure that employees are not using companies’ website during work hours.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    How does e-mail benefit an organization? Email can benefit a company because it is faster than the regular mail service, emails can be saved for later use and response can also be saved and retrieved later if needed. Organizations want to limit how employees use email so that they do not open unwanted files or attachments that can cause virus to the system.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Organisations have a duty to ensure the security and confidentiality of information under their control. Most organisations have policies on information security and confidentiality which go beyond the requirements of the Data Protection Act. They also have quality control procedures which staff must follow in order to keep information systems secure, accurate and updated.…

    • 501 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Confidentiality and information security are key factors for an organisation. It allows organisations to ensure they preserve these along with…

    • 2721 Words
    • 11 Pages
    Satisfactory Essays
  • Powerful Essays

    Employees have a reasonable expectation of privacy within the workplace; however there are circumstances when an employer has a legitimate right to monitor, investigate, and review the activities of its employees. The following identifies business practices that may be executed to ensure the integrity of company products and property, workplace safety, and the monitoring of employee productivity.…

    • 1493 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Security is a business issue because companies have very valuable information assets to protect. Business must protect not only their own information assets but also those of customers, employees, and business partners. Failure to do so may open the firm to costly litigation for data exposure or theft. Systems often hold confidential information about customers information( social security, date of birth, credit card information, taxes), corporate operations, new product development plans, marketing strategies. These information assets have tremendous value for the companies and can be devastating if they are lost, destroyed, disturbed or placed in wrong hands.…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Data protection: employees must know their personal data cannot be divulged to a third party and it has to be relevant and not exaggerated.…

    • 2459 Words
    • 9 Pages
    Good Essays
  • Satisfactory Essays

    Xcom/285 Privacy Laws

    • 321 Words
    • 2 Pages

    Friedman, B., & Reed, L. (2007, June). Workplace privacy: Employee relations and legal implications of monitoring employee e-mail use. Employee Responsibilities and Rights Journal, 19(2),…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Osi Layers

    • 597 Words
    • 3 Pages

    Companies should take the time to educate their employees on the security threats that each individual brings to the company. Throwing personal information into a dumpster and not shredding this information is a huge security risk. Each individual is given a password to access the system for his or her job and should never reveal their password to anyone. Employee’s must keep in mind that anything done under their login and password is considered that persons responsibility and therefore, by keeping their password safe, it eliminates the possibility of someone else using his or her log-in for malicious purposes.…

    • 597 Words
    • 3 Pages
    Good Essays
  • Better Essays

    For any business, the need to protect its assets is just as important as the need to maintain or increase its bottom line. If a business does not, will not, or can not enact a sufficient security plan that is the equal to or greater than its needs, it may find itself rapidly losing its assets, its monies, or completely out of business. In addition to a robust security policy, there must also be robust standards put into place to clearly define the roles the employees, as well as the management, must play in order to properly enact those roles.…

    • 1124 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Computer in Work Place

    • 869 Words
    • 4 Pages

    Consider the potential for computer-based systems in business to be used to monitor employees. What if computers were (and some are already) programmed to check your speed, the pauses you make, the breaks you take, the rate of keying errors? Would it be fair for the company to do this to make sure it retains only the most efficient workers, and thus increase the value of goods and services it has to sell? Or would this detract from your dignity as a human being—your right to do some things better than you…

    • 869 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Peer Pressure

    • 1246 Words
    • 5 Pages

    To identify better with peer monitoring, Loughry and Tosi used the quantative method. Firstly, they conducted an empirical research, by gathering qualitative information on a purposive sampling from selected departments to find out if the employees…

    • 1246 Words
    • 5 Pages
    Better Essays