Monitoring Employees on Networks: Unethical or Good Business?

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

Let’s Talk About Cyber Security
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
The Woodlands High School
Crime and Security in the Networked Economy Part 4.
ICT & Crime Cyberslacking. What is Cyberslacking? Cyberslacking is wasting time (usually online) when you should be working Either at work or at school.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Security+ Guide to Network Security Fundamentals
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
1 Pertemuan 9 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
INTERNET and CODE OF CONDUCT
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Case Study Chapter 8 Monitoring Employees on Networks: Unethical or Good Business? By Michele Schatz March 7, 2005.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
Higher Administration
Internet safety By Lydia Snowden.
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Computer Misuse The Kingsway School. Computer Misuse Computers have improved our standards of living for most of us. Some individuals and organisations.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Employee Guidelines for Acceptable Use of Technology Resources.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
Technology in the Bellingham School District. Bellingham School District Network §Connectivity §Communication §Research Practice Responsible Use.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Chapter 8 Ethics and Technology
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Educational Computing David Goldschmidt, Ph.D. Computer Science The College of Saint Rose CIS 204 Spring 2009.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Computer System and Internet Misuse at the Work Place By: Kris Dimon.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
CONTROLLING INFORMATION SYSTEMS
Computer Security By Duncan Hall.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Security and Ethics Safeguards and Codes of Conduct.
Monitoring Employees on Networks
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Woodland Hills School District Computer Network Acceptable Use Policy.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Marion County Public Schools Acceptable Use Guidelines for Network Access.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
To spy or not to spy; that is the question
Technology Guidelines for Students
IT Vocab IT = information technology Server Client or host
Technology Guidelines for Students
Social Issues in Computing
Social Issues in Computing
Woodland Hills School District
Presentation transcript:

Monitoring Employees on Networks: Unethical or Good Business?

Summary Businesses are often asked to make difficult decisions when deciding whether to “trust” employees or provide them protections under well defined rules and guidelines. With well defined and communicated processes in place, the employee should understand their responsibilities in using company tools to perform company business only.

Risks of Monitoring Employees Employers can be liable for employees’ misuse of company Forms of harassment can be done by Threats of violence via Theft or unauthorized disclosure of company information via spreads viruses very well

Risks of Monitoring Employees Internet Unauthorized access into for-pay sites Harassment charges from display of pornographic or obscene materials found on some sites Trademark and copyright infringement problems from improper use or dissemination of materials owned by an outside party Too much time wasted surfing the Web Viruses in downloads of software and other materials from Web sites

Risks of Monitoring Employees Company Computers Software piracy-employees making unauthorized copies of company-provided software Unauthorized access into company databases Use of unauthorized software from home on company computers Sabotage of company files and records Excessive time spent on computer games Employees using company computers to produce materials for their own personal businesses or private use

Policy Issues Basic issues revolve around letting employees know that as far as work is concerned, they have no expectation of privacy in their use of company premises, facilities, or resources and they are subject to monitoring at all times. Every employer needs to have a detailed policy regarding use of company computers and resources accessed with computers, such as , Internet, and the company intranet, if one exists.

Costs to Companies At least 25 percent of employee on-line time is spent on nonwork-related surfing and 27 percent of large U.S. companies are now monitoring employee in some way compared to only 15 percent in 1997 loss of time and employee productivity availability of company’s network bandwidth anything an employee does on the Web carries the company’s name

Good Business? Security of the infrastructure Assist in the education of employees

Conclusion By monitoring the employee use of company assets for personal use, the employee is less prone to perform personal business on company time and company equipment.