Monitoring Employees on Networks

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Example policy elements and their role in bandwidth management and optimisation.
Cellular Telephone Use Guidelines AA Roundup June 27, 2007.
Northside I.S.D. Acceptable Use Policy
BUSINESS B2 Ethics.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
CHAPTER 4 E-ENVIRONMENT
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Little brother is watching you
Ethical Hacking by Shivam.
1 Freedom of Expression Prepared By Joseph Leung.
Business Plug-In B7 Ethics.
Chapter 14: Ethics, Justice and Fair Treatment at Work
1. 2 Technology in Action Technology in Focus: Information Technology Ethics Information Technology Ethics Copyright © 2012 Pearson Education, Inc. Publishing.
Ethical Implications of Social Media Use in Organizations Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque,
The Marketing Plan Sports Marketing Careers 2 Chapter Objectives Explain the purpose and function of a marketing plan. Identify each element found in.
ETHICS, POLICY & SECURITY ISSUES 1CIIT---ETHICS,POLICY AND SECURITY ISSUES.
Case Study Chapter 8 Monitoring Employees on Networks: Unethical or Good Business? By Michele Schatz March 7, 2005.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
Using Technology in Nursing Practice: Part 1: Complying with Policy 1.
Inappropriate Work Behavior CTE 1-Career and Technology Exploration.
Employee Law Module What you need to do to protect credit history and the documents that you will need for employment. The information in this module comes.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
Monitoring Employees , Social Media, Phones, & GPS Tracking GROUP 4 Peter Rankin, Kayla Roache, Derrick Fulton, Pam Goulais Janet Lavoie, Eric Annala,
Digital Citizenship Working and playing in a digital word.
Monitoring Employees on Networks: Unethical or Good Business?
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
ETHICS, POLICY & SECURITY ISSUES
Chapter 8 Ethics and Technology
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Privacy at Johnson and Dresser By: Anuj Ghai & Ubaid Khan.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 9 Ethics and Information Technology Understanding Business Ethics Stanwick.
Topics AUP, Online Safety, and Permission By: Amy Mahon, Amy Lawrence, And Melissa Rafetto By: Amy Mahon, Amy Lawrence, And Melissa Rafetto.
CHAPTER 17 EMPLOYEE RIGHTS AND DISCIPLINE. Chapter 17 EMPLOYEE RIGHTS AND DISCIPLINE Human Resource Management, 9E Mathis and Jackson © 2000 South-Western.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Business Plug-In B7 Ethics.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY INTRODUCTION TO ICT COMPUTER ETHICS AND LEGAL ISSUES.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Lesson 2: Workplace Digital Communication
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Overview In this tutorial you will: identify different ways to access review your own skills identify rules to follow when using . There.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Student The Do’s and Don’ts of in Liberty Public Schools.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Life Hacks for your professional identity
Acceptable Use Policy (Draft)
Computer Security Fundamentals
BCOM 5 7 Communicating Electronically LEHMAN/ DUFRENE
To spy or not to spy; that is the question
Unit 7 – Organisational Systems Security
E-Commerce: Regulatory, Ethical, and Social Environments
Internet law Business law.
The Health Insurance Portability and Accountability Act
Web Page Design and Development I Standards
Presentation transcript:

Monitoring Employees on Networks Unethical or Good Business? By: Francisco Rose

Agenda Case Summary Ethical reasons for monitoring Fears & Problems Questions Solution Conclusion

Summary of case This case seeks to address the ethics of monitoring employees use of networks or the necessity of monitoring it to improve the companies business. While a controversial subject, the cons of using companies resources for personal use far outweighs the question of ethics. What was highlighted as important is having a clearly written set of guidelines in the company’s policy , that will protect the company and reduce their expenses from employees usage and alert employees that they will be monitored so that it would not be considered unethical.

What led to Monitoring Increase in computer usage Abuse of Company resources Time spent online 25% unrelated to work

Company Fears Pornography Lawsuits Sports sites Retail Outlets

Real Problem Email Online trading Productivity loss Clogged network On company time Productivity loss

Real Problem – cont’d Availability of Company’s Bandwidth Cost of expansion, time consuming Loss of revenue Overcharges to clients Illegal Activities Company can be held liable Negative publicity

Questions #1 Is it ethical for employers to simply check e-mail on a fishing expedition, without having any specific reason to suspect that the employee has a problem that needs to be addressed?

Question # 2 If employees complain about an undue invasion of privacy, how can management determine whether the employee’s complaints are legitimate?

Question # 3 Write a rationale that would ban all employees personal use of the internet, including e-mail and the Web.

Question # 4 Evaluate as an effective tool a zero tolerance position (firing of employees any time an Internet access rule is broken). If you do not believe zero tolerance is an appropriate policy, under what circumstances would you support firing an employee for using the Internet or email while on the job?

Question # 5 Write what you consider to be an effective email and Web-use policy for a company. Briefly describe the company and explain your reasoning for its details.

What’s the Solution? Complete Ban Restricted time of use Password access Time restriction Blocked site access

Doing it Ethically! Written Guidelines Explicit ground rules Written consequences Tailored to specific organization Who has the right to access

Conclusion No solution is problem free! Companies need to have proper communication with employees about their specific guidelines and in return employees need to adhere to those guidelines.