Monitoring Employees On Networks

Page 10 of 50 - About 500 Essays
  • Premium Essay

    Electronic Surveillance of Employees

    their investments, and increase employees’ productivity. Because of this, employees cannot reasonably expect to have privacy within the workplace. Although employees would like privacy in their office, on their computer, and during phone conversations, there is no law legally granting privacy to employees in the workplace. The only place an employee could have a reasonable expectation of privacy is in the restroom. Also, since the employers need to know all employees are providing a proper job, that

    Words: 563 - Pages: 3

  • Premium Essay

    It205

    Monitoring Employees on Networks How does e-mail benefit an organization? Why might an organization want to limit how an employee uses e-mail during work hours? What is an e-mail’s path once it leaves an organization? E-mail communication can offer an organization a number of benefits. For one thing, communication between clients and employees becomes much easier, clearer, and faster. E-mails are a very effective organizational communication tool, but it has some disadvantages as well.

    Words: 472 - Pages: 2

  • Premium Essay

    Mr Buzz

    methods may restrict sensitive data to legitimate users, but Flynn and Ignatiev found that even legitimate users were putting the data, and their companies, at risk. At BCD Travel, a corporate travel service, nearly 80 percent of its 10,000 employees work in call centers and thus have legitimate access to sensitive customer information. BCD and the Texans did not find malicious activity; instead, they found people who were unaware of security risks, such as sending a customer’s credit card

    Words: 1374 - Pages: 6

  • Premium Essay

    Southern Management Corporation Case Stuy

    these practices, both theoretical and practical knowledge is required. To this end, Southern Management Corporations managerial practices were studied and analyzed to understand how the managements work practices affected its residents and also its employees. The outcome of our study has identified

    Words: 2942 - Pages: 12

  • Premium Essay

    Employee Monitoring Controversy

    The idea of employee monitoring has become increasingly controversial throughout the past few years. With the introduction of social media, the widespread use of global positioning satellite (GPS) technology, and cameras in many public locations, it has become ever more difficult to keep our lives private. It is the need for privacy that has raised tensions between employers and employees. With the rise of employee monitoring many employees feel that employers target them, or even discipline the

    Words: 714 - Pages: 3

  • Free Essay

    Nt2580 Research Project Part 2

    these into a public network presence with security in mind. The Digital revolution of the 21st Century has not been achieved without its consequences. Real time business requirements and economic drivers have forced rapid changes to the methods used to conduct business-to-business and business to client communication. The Internet has now become a convenient and economic deployment medium for global business. Richman Investments Computer users’ policy: Although employees are given PCs so they

    Words: 1544 - Pages: 7

  • Free Essay

    Access Control Systems

    were examined to determine if a network based system would be more reliable and beneficial. Two major systems were determined to be very beneficial to the company. In contrast, the systems would consume a great deal of resources in order to be put into full working order at all sites worldwide. Together these findings suggest that using a network based system can ultimately serve the company better and create a more secure environment for the research and the employees. Keywords: Access control

    Words: 2919 - Pages: 12

  • Premium Essay

    Acceptable Use Policy

    the acceptable use of Cooley’s assets regarding Internet and email access and the actions that are prohibited. Cooley Investment’s computers, computer files, e-mail system, Internet access and any software furnished to employees are company property and subject to monitoring and unannounced review. They are to be used for company business only, and not for excessive personal use to communicate with friends or family or to access the Internet for personal purposes. While use of the computer,

    Words: 805 - Pages: 4

  • Premium Essay

    Information Security for Managers

    security of person and an enterprise. Security can be understood as a condition to protect against unauthorized access. In terms of IT, security can be categorized into application security, computing security, data security, information security, and network security. Source: (Whitman & Mattord 2007, p.5) Even though all of these security fields need to be monitored in an enterprise, for instance in this document we are concerned only with information security. Information security is responsible

    Words: 2401 - Pages: 10

  • Premium Essay

    Monitoring Employees

    Monitoring Employees on Networks William C. Bridges IT/205 February 28, 2014 Professor Song Tang   The e-mail process benefits organizations by allowing for inter-company communications faster and more direct. . Email benefits an organization in speed of communication between its employees as well as management and also the decreased cost of this method of instant communication. Using e-mail lets employees communicate with each other and management immediately for purposes of meetings, lunch’s

    Words: 626 - Pages: 3

Page   1 7 8 9 10 11 12 13 14 50