CASE STUDY ON: Monitoring Employees on Networks: Unethical or Good Business? PRESENTED TO:
Mr. A.T. M. Jakaria Khan
Lecturer, Institute of Business Administration University of Dhaka
PRESENTED BY:
Md. Atiqul Basher, ID: 31, Batch – MBA -52D
Raisa Tasneem Zaman, ID: 32, Batch- MBA- 52D CASE SUMMARY • The Internet and email are important tools • Employees abuse the Internet and e-mail during work hours In a fast paced, competitive business world, some employee: QUESTION 1: Should manager monitor employee e-mail and Internet usage? Why or why not? WHY MANAGERS SHOULD MONITOR EMPLOYEES? 1 OUT OF 3 US COMPANIES HIRE INDIVIDUALS TO MONITOR EMPLOYEES
- Proof point plus study, 2010
UNRESTRICTED USAGE CAUSES CLOG TO NETWORK
(COMPANIES LIKE PNG PAID A
HUGE PRICE FOR THIS!) 14% EMPLOYEES ADMITTED THAT THEY SENT COMPANY SECRET AND POTENTIALLY EMBARASSING MAILS TO OUTSIDERS $6,50,000 AVERAGE LITIGATION COST OF SEXUAL AND ANY OTHER HARRASSMENT CAUSED BY MISUSE OF INTERNET AT WORK According to the law, US companies are…
NOT ALLOWED ALLOWED
QUESTION 2: Describe an effective e-mail and Web use policy for a company. STEPS TO FOLLOW
Step 2: Step 4: Step 5:
Adapt Introduce Introduce IS spectorsoft Written policy department
Step 1: Step 3: Step 6:
Lay out specific Adopt Zero Specific procedures tolerance personal usage time Lay out specific procedures and accountabilities:
Identify which users and organizational
units can share information, where information can be distributed, and who is responsible for updating and maintaining the information. Spector Soft Corporation:
Record all Web site employee visit, time spend at
each site and all e-mail sent.
E-mail monitoring software flags certain type of
messages and keywords within messages for further investigation. Zero tolerance policy: Use of the Internet/E-mail to discuss or distribute information related to the company’s trade secrets, policies or practices. Monitoring software will be employed to scan outgoing e-mail for company sensitive terminology and related subject matter
Use of the Internet causing disruption to the facility’s services
including reduction of bandwidth available for company business.
Transmission of harassing, discriminatory or otherwise
objectionable e-mail or files (as determined by the recipient) is strictly prohibited.
The Internet must not be used to access, create, transmit, print or
download material that is derogatory, insulting, obscene, or offensive, such as slurs, epithets, or anything that may be construed as harassment or disparagement based on race, color or religious. Monitoring software will be employed to block the availability of these types of sites Written policy must include explicit ground rule:
By position or level
Under what circumstance employee can use
company facilities for e-mail, blogging, or Web surfing. Information Services Department:
To monitor employees to provide
weekly reports detailing Internet and e-mail usage during normal business hours per employee. Specified personal usage time Personal e-mail or Internet surfing is permitted ONLY during the following periods: before stated company business hours, after stated company business hours, or an employee’s lunch hour. A good policy will detail exactly what type of activity is acceptable and what is not allowed. QUESTION: 3 Should managers inform employees that their Web behavior is being monitored? Or should mangers monitor secretly? Why or why not? Should managers inform employees that their Web behavior is being monitored?
Yes Good Business Practice:
• An automatic message • Warns all employees of the written policies
• Reminds employees about monitoring
software Letting employees know that their computers are monitored can urge them to avoid using the Internet for personal purposes.
More productive work hours
Improved efficiency IN CONCLUSION
EMPLOYEE SURVEILANCE IS AN ACCEPTED PRACTICE, AT AND
DURING WORKING HOUR ONLY.
HOWEVER IT MUST BE TAILORED IN SUCH A MANNER SO
THAT WORK DOES NOT GET HAMPERED. VIDEO PRESENTATION THANK YOU !