Case Study Chapter 8 Monitoring Employees on Networks: Unethical or Good Business? By Michele Schatz March 7, 2005.

Slides:



Advertisements
Similar presentations
Internet and Network Safety YKSD Policies. YKSD Board Policies 10 Pages of YKSD Board Policies exist for your protection. They are available from your.
Advertisements

Example policy elements and their role in bandwidth management and optimisation.
MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Created by Katie C. Bradley Greenwood District 50.
Objectives Describe behaviors indicative of bullying at work Explain the two types of harassment Establish a barometer for humor at work Identify the.
Implications and Security Issues of the Internet By Neelesh Patel.
Using Technology the CCSD Way by Dr. Kathi Vanderbilt.
Cyberbullying Donna Kozica, LCSW Social Work Department Chairperson.
BULLYING What Is The Definition of Bullying?
ICT & Crime Cyberslacking. What is Cyberslacking? Cyberslacking is wasting time (usually online) when you should be working Either at work or at school.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
SOCIAL NETWORKING – WORKPLACE CHALLENGES EMPLOYMENT LAW UPDATE for the TENNESSEE HUMAN RIGHTS COMMISSION & TN DEPARTMENT OF HUMAN RESOURCES By: TIM K.
Riverside Community School District
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Computer Security Fundamentals
HR TacticsInterview TipsFinding JobsNetworking Application or Resume?
INTERNET and CODE OF CONDUCT
Workplace Harassment What Supervisors Need to Know.
Introduction Social Implications & EthicsSocial Implications & Ethics Since the introduction of the Internet, many policies have been introduced as a way.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
1 Blogs and Personal Web Pages: Legal Issues And Practical Advice Baker & Daniels LLP Webinar July 16, 2008 Audio
PART THREE E-commerce in Action Norton University E-commerce in Action.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
GMT eBizOS DOs and DON’Ts DOs 1. Access to GMT Portal( to view all the system, user guide, application form & procedure.
Chapter 6 Acceptable-Use Policies: Human Defenses Trevor Norsworthy Christina Richardson.
Medical Center Hospital and Midland Memorial Hospital respects the right of employees to use internet-based communications such as social networking sites.
Objective 5.02 Understand ethics and ethical decision-making.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Monitoring Employees on Networks: Unethical or Good Business?
Lesson 4: Taking Perspectives on Cyberbullying THE CYBER BULLYING VIRUS
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Protection offered by employment and equal opportunities legislation OCR Diploma.
Dignity for All Students Act & Sexual Harassment Avoidance Annual Training.
December 25, 2015 Copyright © 2010 WeComply, Inc. All rights reserved. Appropriate Internet Use Note to Trainer.
INTERNET SAFETY.
PRESENT BY : WOE LEE NA NURUL NABIHAH BT NGAH NOOR FISHAH RIL BT SHAH FAROUK NATASYA DEWANTY AYU PUTRI HUMAN RESOURCE PROBLEM.
Welcome to the ICT Department Unit 3_4 Code of Conduct.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Monitoring Employees on Networks
Laws and Rules That Govern Internet Safety Ashley Martin.
School Accounts Presented by: Mrs. Mazzola.
Information Technology Acceptable Usage. What you should know… Employees provide the first and final defense in addressing and mitigating day-to-day security.
Telnet Media. Telnet Media Ltd Surfing the Web Secure Content Management Products Reasons to implement Agenda.
Internet safety for your student
Ogletree, Deakins, Nash, Smoak & Stewart PC
To spy or not to spy; that is the question
BULLYING
GOSSIP and CYBERBULLYING
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Internet Safety and Acceptable Use Policies.
Sexual Harassment: A Commonsense Approach
GOSSIP and CYBERBULLYING
COMPUTER ETHICS: Gender Effects and Employee Internet Misuse
Presentation transcript:

Case Study Chapter 8 Monitoring Employees on Networks: Unethical or Good Business? By Michele Schatz March 7, 2005

Case Summary  The Internet and are important tools  Employees abuse the Internet and during work hours  Companies must have written policies that are easy to understand and follow  Employers using a variety of monitoring software  Exhibit of Computer Usage Policy

Business is business!  Competition is stronger than ever before  Internet and use is steadily growing  Internet and help businesses expand their territory, customer base and sales

What are employees doing during business hours?  Surfing the Internet for personal reasons and  Sending personal s to their friends and family

What sites are they surfing?  Sports sites  Retail outlets  Investment sites  Adult and child pornography sites

Is It Really A Problem?  At least 25% of employee’s on-line time is spent on nonwork-related surfing

Does Internet Abuse Cause Problems?  Employee productivity is lost  Employee morale is low  Employees who witness their co- workers surfing the web: First, complain silently to themselves Second, complain to other co-workers Third, complain to supervisor  Sexual harassment lawsuits

Does Abuse Cause Problems?  Some s are racist, sexually implicit, or contain other potentially offensive material  Sexual harassment lawsuits have been filed and settled  Trade secrets can be lost or stolen  Personal s can have damaging viruses  Personal s can clog the network

Eight Ways Computer Abuse Can Hurt a Company! 1. Loss of time and salary: Example: 1,100 employees average salary is $15 per hour all employees waste one hour per day costs $16,500 per day costs $82,500 per week costs $4,290,000 per year

Cont. Eight Ways Computer Abuse can hurt! 2. Loss of productivity 3. Loss of potential revenue 4. Slow working network bandwidth 5. Having to update bandwidth 6. Overcharging clients 7. Lawsuits 8. Bad publicity

What Can Employers Do?  Monitor and personal use of Internet  Policy regarding Internet usage to protect against employee lawsuits. Explicit ground rules in easily understood language Includes who has what rights and under what circumstances Vague terminology cannot be applied fairly Allow specific times for personal and Internet access Implement a zero tolerance policy and modified usage policy

Monitoring Software  SurfWatch  MailSweeper  CommandView Internet Manager

Good Business Practice  An automatic message Warns all employees of the written policies Reminds employees about monitoring software Significant decrease of abuse has occurred

Conclusion  Internet and are two very important tools  Need written policies  Monitoring software

Exhibit A Internet Usage Policy  Internet Usage Policy  Use of the Internet will be allowed regarding the following Internet usage: Use of the Internet for personal business, such as personal or Internet surfing is permitted ONLY during the following periods: before stated company business hours, after stated company business hours, or an employee’s lunch hour. Information Services Department is allowed to monitor employees to provide weekly reports detailing Internet and usage during normal business hours per employee.  Zero tolerance policy will be strictly enforced regarding the following Internet/ usage: Use of the Internet/ to discuss or distribute information related to the company’s trade secrets, policies or practices. Monitoring software will be employed to scan outgoing for company sensitive terminology and related subject matter Use of the Internet causing disruption to the facility’s services including reduction of bandwidth available for company business. Transmission of harassing, discriminatory or otherwise objectionable or files (as determined by the recipient) is strictly prohibited. The Internet must not be used to access, create, transmit, print or download material that is derogatory, insulting, obscene, or offensive, such as slurs, epithets, or anything that may be construed as harassment or disparagement based on race, color or religious. Monitoring software will be employed to block the availability of these types of sites