...ELIZABETH BAAPA BUAH SB/DMK/14/0012 4. EZEKIEL ARTHUR MENDS SB/DMK/14/0002 5. NATHANIEL DUAH ADJEI SB/DMK/14/0003 6. FREDRICK A. ASIEDU SB/DMK/14/0010 CASE STUDY MONITORING EMPLOYEES ON NETWORKS: UNETHICAL OR GOOD BUSINESS?. LAUDEN & LAUDEN (2014), PAGE 296-7 Question 1. Should managers monitor employee e-mail and internet usage? Why or Why not? Employee email and Internet usage monitoring in the workplace may put employers and employees in conflict because both sides are trying to protect personal interests. Employees want to maintain their personal privacy while employers want to ensure company resources are not misused. Employers monitor Internet use in the workplace to protect their companies from legal problems that could arise if employees use company computers for inappropriate or illegal online activities, such as racist, sexually explicit or other potentially offensive materials accessed or traded by their employees which could result in adverse publicity. They are also concerned about a decline in productivity as some workers use the Internet to handle personal activities such as checking personal email, responding to instant messages or sneaking in a brief YouTube video which creates series of non-stop interruptions that divert employees’ attention from the job tasks they are supposed to be performing. More over Strict monitoring allows employers to spot potential problems early, get the information...
Words: 1460 - Pages: 6
...Information Technology (IT) and E-commerce have been on a constant up-rise, over the past couple of decades. Many organizations have found ways to grow and remain profitable, by creating a good mixture of e-commerce and IT. E-commerce can cover a range of areas, but focus mainly on internet sales and product marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human Resources Team and Management team, for perspective departments. The company...
Words: 1127 - Pages: 5
...Security Monitoring Activities CMGT/442 May 21, 2012 Security Monitoring Activities Any company that considers data an asset must realize the importance of risk management. Managing risk helps a company identify vulnerabilities and allows actions to be taken to reduce or stop these vulnerabilities. Risk management is also helpful in the attainment of goals and higher profits by attempting to eliminate any risk that may cost the company extra money to rectify. This paper will discuss security monitoring activities that must be addressed for both internal information technology (IT) and electronic commerce (e-commerce) applications of an organization. The recommended course of action will also be discussed when potential risks have been identified. According to Bejtlich (2004), security monitoring is defined as the collection, analysis, and escalation of indicators and warnings to detect and respond to intrusions. Security monitoring is an important part of risk management for internal applications such as payroll, human resources, and inventory. Security monitoring should also be used in the risk management of external applications like sales and marketing. Security Monitoring Process Security monitoring should be considered and used as a routine task to monitor and analyze the use of the network. Failure to use security monitoring would indicate that an organization believes there are no credible risks to the network. This thought process could...
Words: 1068 - Pages: 5
...Individual Assignment: Security Monitoring Activities CMGT/442 Introduction Information Technology (IT) and E-commerce have been on a constant up-rise, over the past couple of decades. Many organizations have found ways to grow and remain profitable, by creating a good mixture of e-commerce and IT. E-commerce can cover a range of areas, but focus mainly on internet sales and product marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human...
Words: 1199 - Pages: 5
...workplace has been in existence for some time now; Frederick Taylor used time and motion studies to analyze the work practices of various types of employee. But nowadays, the electronic monitoring will give the employers the more information of all the employees’ work activities in a detailed way (Ottensmeyer and Heroux, 1991). They are some network tools that can capture user log in details, the file accessed, the time it was accessed and so many other things. What is Electronic Monitoring? Electronic monitoring can be seen in different concepts, firstly, it can be seen by the way employers will use electronic devices to review and measure the employees work performance, for instance, the employer may decide to review the employee’s incoming and outgoing mails to see how he/she relate with the customers whether is satisfactorily. Secondly, it can be seen as electronic surveillance in such a way that the employer will use the electronic devices to know what the employee does, and also review the sites he visited for the day and check whether the site is adult site or gamble site (King, 2008). The Frequency of Electronic Monitoring within the company An employee maybe unaware how he is being monitored, but research showed that more than 20 millions of employees have their emails being search by their employers; in telecommunication and banking industries, it has been established that about 80% of their workers are being subject to monitoring (Dichter and Burkhardt,...
Words: 1097 - Pages: 5
...Employee Privacy Report your name COM/285 March 28, 2011 University of Phoenix CERTIFICATE OF ORIGINALITY: I certify that the attached paper is my original work. I affirm that I have not submitted any portion of this paper for any previous course, and neither has anyone else. I confirm that I have cited all sources from which I used language, ideas, and information, whether quoted verbatim or paraphrased. Any assistance I received while producing this paper has been acknowledged in the Reference section. I have obtained written permission from the copyright holder for any trademarked material, logos, images from the Internet, or other sources. I further agree that my name typed on the line below is intended to have, and shall have, the same validity as my hand written signature. Students’ signature (name(s) typed here is equivalent to a signature): Your Name Here Employee Privacy Report The Texas Department of Criminal Justice (TDCJ) is a not-for-profit organization comprised of nine non-salaried members who are appointed by the Governor of Texas for staggered six year terms known as the Texas Board of Criminal Justice. The board is charged with governing the TDCJ, implementing policies which guide operations. There are different divisions of TDCJ and amongst those divisions is the Correctional Institutions Division of which I am employed and am tasked with the confinement and supervision of convicted felons...
Words: 1081 - Pages: 5
...into our private lives. The government should only monitor the people and sites that need to be watched, leave the majority of the people on the internet alone. People should be able to have the privacy they deserve and not feel they are being watched by anybody. In the United States people have birth rights and can not be strippted by any person, and they are stripted people have the right to revolt. The fourth amendment protects us the government intervening in our private lives or property without a warrant to legally search that property. Our government should not be able to just watch what we search on the internet, we have rights. The internet even though it is public domain our government should not have the...
Words: 722 - Pages: 3
...Employee Privacy Report The need for businesses and organizations to access the internet has brought about several concerns regarding employee privacy while emailing and surfing the internet at the workplace. Each employee is given access to company issued computers and equipment, and consider his individual email messages and internet browsing to be private. In most organizations, security controls, such as passwords, are used to ensure privacy; however, the internet systems managers still have access to employees’ activities. Employees usually do not realize that these security measures are intended to prevent unauthorized access to his computer and files, not to invoke control over the employees. POLICY IMPLIMENTATION Organizations can review the following guidelines when developing or improving the company’s existing policies: • Policies should be properly discussed and reviewed with management and employees. • Policies should specify what activities will not be tolerated within the workplace. • Policies should specify what accessed information is kept in a log and who in the chain of command will have access to this log. • Proper computer and internet security policies should be set in place and reviewed with all employees and management. • Policies should address how the organization will be monitoring employee compliance with these policies. • Regular review of stated policies will allow the organization to make the necessary changes to keep pace with...
Words: 1069 - Pages: 5
...Employee Monitoring Most of us would be hard pressed to deny our use of the Internet at work for non-work related purposes. With sites like YouTube, eBay, and Facebook and access to instant messaging and email tempting us at every turn, it can be difficult to resist personal Internet usage at work. While not every person has access to the Internet at work, the majority do. As evidenced by various surveys and studies conducted by media research companies, including American Management Association (AMA), Symantec, and Profpoint Plus, those workers who do have access are using it. According to (Laudon & Laudon, 2013), “A 2010 study from Proofpoint Plus found that more than one in three large U.S. corporations assign staff to read or analyze employee e-mail.” With software such as Spectorsoft, it allows employee monitoring to occur. This lets the employer to monitor the employees’ actions while on the computer. Many employees have no idea they are being monitored. Whether an employer is watching an employee via the internet, the phone, or accessing the equipment on an employee’s desk (e.g. hard drive), the software can determine how many hours a day they are spending doing personal messaging, surfing the internet and other non-work relative activities. With such information, it can define what kind of employees are working for the company (ie. Honest, hard-working or less productive). Business can benefit from this software by filtering out the employees who waste the company’s...
Words: 441 - Pages: 2
...Employees Private Social Sites Are Unethical Monitoring employee’s private social network sites is unethical. The Internet has become an excellent medium to connect with the outer World. People use it to connect with other people, sharing files, entertainment and lots of other activities that are useful and beneficial. Although the Internet can be useful, it’s usage can also present a problem for employers. Most companies fear leakage of confidential information and trade secrets through e-mail or blogs. A recent survey conducted by the American Management Association and the ePolicy Institute found that 14 percent of the employees polled admitted they had sent confidential or potentially embarrassing company e-mails to outsiders(pg ). As a result, some companies have monitored their employee’s social networking site; facebook for example. So, a distinction as to why companies monitor their employee’s social sites should be made, as well, as the employee’s rights to privacy. Why do companies monitor their employee’s social networking media? The reasons managers monitor social media was revealed in a new Deloitte survey. Many businesses want to be able to monitor their employees’ social networking activity on sites such as MySpace, Facebook, and Twitter. The main problem with this idea stems from employers wanting to monitor this activity on a subordinate’s off time. Business Week reported that companies want to make sure that their hard-earned reputation...
Words: 684 - Pages: 3
...assessment, and appropriate mitigation of vulnerabilities and threats that can adversely impact Medical General Hospital information assets and patient records. Objectives • To keep all private patient files confidential • Allow only doctors and nurses access to private documents of patient • Setup username and passwords for employees • Setup badges for contactors and janitors • To comply with all security measures • To make sure private information about company files are prohibited • To make sure all printed documents that can be a threat to the company are shredded and not thrown in trash. • To make sure all staff shutdown workstation after using at the end of the day • To enforce that Surveillance cameras are monitored 24hrs a day 7days a week • To make sure visitors check in at the front before seeing the patient’s • Protect all data from unauthorized internal and external access. Purpose Due to the rights of the patient’s confidential records and the HIPAA privacy act. The company’s private files and the internal and external threat of the potential attackers. We will employ security to protect all of those associated with the Medical General Hospital facility. HIPAA stands for Health Insurance Portability and Accountability Act....
Words: 5676 - Pages: 23
...1. Summarize the benefits of using automated software tools to manage staff access to Internet content and e-mail. (10 marks) In today’s information age, using Internet at the workplace is essential for business. Having said this, statistics show that a majority of employees use the organisational resources for doing personal work such as social networking, email, online shopping, etc. Also a number of employees engage in activities that might cause problems for the organisation financially and legally. As a result more and more organisations have opted for automated software tools to manage staff access to Internet and e-mail. The advantages of such software tools are many, some of which have been outlined below. The use of automated software enables the management to keep a watchful eye on the employee activities, which would affect the productivity at work if the staffs indulge in personal activities online. It is important to emphasise that the manager or team leader cannot always observe his/her staffs and these software enables to record the activities of the employees at any time. Hence the management will be able to maximise productivity by managing employees’ web browsing habits. Unmanaged Internet access allows employees to download or share illegal or copyrighted content from peer-to-peer (P2P) networks. Also employees can take part in other activities such as downloading and viewing pornography, which might be illegal in some countries. All this means that...
Words: 1661 - Pages: 7
...Employers often believe that anything that goes on in the office is subject to review and scrutiny by the employer. This belief, at times, related to employee use of the office phone, computers, office space, and office resources. Employers often take the position that once an employee arrives at work anything the employee does related to job performance and is therefore subject to the employer’s oversight. Employees on the other hand, usually have certain expectations of privacy when they are at work. For example, employees believe that websites visited, emails, or contents within their desks should be off-limits to the employer’s eyes. If they are taking a break, they should be permitted to say or do anything, in the privacy of their own workplace, without constant monitoring of the employer’s watchful eye. Opinions also differ concerning off-duty activities of...
Words: 1127 - Pages: 5
...Updated: August 2013 CONTENTS Page No. 1. 2. 3. 4. 5. 6. 7-8. 9. 10. 11-12. 13. Introduction Access to Systems and Services Internet Access Virus Protection Email and Moodle Use Tips for Safe Web Surfing Acceptable Use Policy for Network Access Health and Safety Tips Access to Data and Information Online Safety Information Security Policy Statement STUDENTS WORK You are responsible to backup current work and keep it safe. Work should be backed up to a pen drive on-line service such as you college Sky drive account. INTRODUCTION 1 The purpose of information security management is to preserve: Confidentiality: data and information can only be seen by those authorised to see it and can only be changed by those allowed to change it Integrity: data is complete, accurate, up to date and relevant and the system is operating as per the specification information and services are delivered to the right person when they are needed Availability: Accountability: all activity can be traced back to the originator The College recognises that staff and students will require access to systems, services and data in order to fulfil their roles and responsibilities. Therefore, appropriate procedures and controls will be put in place to enable staff and students to obtain the necessary authorised access so that they are able to carry out their work effectively and efficiently. The College also recognises that all staff and students are required to comply with the necessary...
Words: 2825 - Pages: 12
...Explain where an employee can reasonably expect to have privacy in the workplace. A typical workspace has a desk, a computer, file drawers, telephones, and maybe a plant for decoration. And if you are lucky, you may have a window and a door. Because companies are trying to conserve space and stay within budget, most offices include more than one person in a room with dividers or columns separating each person. There is no privacy because everyone can hear your conversation and now what you are doing. A good place for employees to have privacy would be away from the job, in order to keep personal information private. An employee’s personal items, such as a locker, handbags, personal emails, or voicemails, or personally addressed mail would be confidential and belong to the employee, unless noted by company policies In the office workplace, there are typically two types of workspace, an open area, in which there are several desks and where conversations can be overhead, or an enclosed office, in which, when the door is closed, conversation cannot be heard and where one would expect virtually total privacy. Explain whether it makes a difference if an employee is in an open are or in an enclosed office. It does make a difference if an employee is in their own office space or are in an open area. For example, my manager sits in a closed off and the employees share a suite. Because she is behind a closed door, she is able to close herself off to other to have meetings...
Words: 1210 - Pages: 5