Misprez-160108165841.pdf

  • Uploaded by: Afifa FifaLiani
  • 0
  • 0
  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Misprez-160108165841.pdf as PDF for free.

More details

  • Words: 621
  • Pages: 29
THIS IS HOW TIME WASTING LOOKS LIKE!

CASE STUDY ON:

Monitoring Employees on Networks: Unethical or Good Business?

PRESENTED TO: Mr. A.T. M. Jakaria Khan Lecturer, Institute of Business Administration University of Dhaka

PRESENTED BY: Md. Atiqul Basher, ID: 31, Batch – MBA -52D Raisa Tasneem Zaman, ID: 32, Batch- MBA- 52D

CASE SUMMARY

• The Internet and email are important tools • Employees abuse the Internet and e-mail during work hours

In a fast paced, competitive business world, some employee:

QUESTION 1: Should manager monitor employee e-mail and Internet usage? Why or why not?

WHY MANAGERS SHOULD MONITOR EMPLOYEES?

1 OUT OF 3 US COMPANIES HIRE INDIVIDUALS TO MONITOR EMPLOYEES

- Proof point plus study, 2010

UNRESTRICTED USAGE CAUSES CLOG TO NETWORK (COMPANIES LIKE PNG PAID A HUGE PRICE FOR THIS!)

14% EMPLOYEES ADMITTED THAT THEY SENT COMPANY SECRET AND POTENTIALLY EMBARASSING MAILS TO OUTSIDERS

$6,50,000 AVERAGE LITIGATION COST OF SEXUAL AND ANY OTHER HARRASSMENT CAUSED BY MISUSE OF INTERNET AT WORK

According to the law, US companies are…

NOT ALLOWED

ALLOWED

QUESTION 2: Describe an effective e-mail and Web use policy for a company.

STEPS TO FOLLOW Step 2:

Step 4:

Step 5:

Adapt spectorsoft

Introduce Written policy

Introduce IS department

Step 1:

Step 3:

Step 6:

Lay out specific procedures

Adopt Zero tolerance

Specific personal usage time

Lay out specific procedures and accountabilities: Identify which users and organizational units can share information, where information can be distributed, and who is responsible for updating and maintaining the information.

Spector Soft Corporation: Record all Web site employee visit, time spend at each site and all e-mail sent.

E-mail monitoring software flags certain type of messages and keywords within messages for further investigation.

Zero tolerance policy: Use of the Internet/E-mail to discuss or distribute information related to the company’s trade secrets, policies or practices. Monitoring software will be employed to scan outgoing e-mail for company sensitive terminology and related subject matter Use of the Internet causing disruption to the facility’s services including reduction of bandwidth available for company business. Transmission of harassing, discriminatory or otherwise objectionable e-mail or files (as determined by the recipient) is strictly prohibited. The Internet must not be used to access, create, transmit, print or download material that is derogatory, insulting, obscene, or offensive, such as slurs, epithets, or anything that may be construed as harassment or disparagement based on race, color or religious. Monitoring software will be employed to block the availability of these types of sites

Written policy must include explicit ground rule: By position or level

Under what circumstance employee can use company facilities for e-mail, blogging, or Web surfing.

Information Services Department: To monitor employees to provide weekly reports detailing Internet and e-mail usage during normal business hours per employee.

Specified personal usage time Personal e-mail or Internet surfing is permitted ONLY during the following periods: before stated company business hours, after stated company business hours, or an employee’s lunch hour.

A good policy will detail exactly what type of activity is acceptable and what is not allowed.

QUESTION: 3 Should managers inform employees that their Web behavior is being monitored? Or should mangers monitor secretly? Why or why not?

Should managers inform employees that their Web behavior is being monitored?

Yes

Good Business Practice: • An automatic message

• Warns all employees of the written policies • Reminds employees about monitoring software

Letting employees know that their computers are monitored can urge them to avoid using the Internet for personal purposes. More productive work hours Improved efficiency

IN CONCLUSION EMPLOYEE SURVEILANCE IS AN ACCEPTED PRACTICE, AT AND DURING WORKING HOUR ONLY. HOWEVER IT MUST BE TAILORED IN SUCH A MANNER SO THAT WORK DOES NOT GET HAMPERED.

VIDEO PRESENTATION

THANK YOU !

More Documents from "Afifa FifaLiani"

Misprez-160108165841.pdf
November 2019 3
871-2875-1-sm.pdf
November 2019 10
Gambar Seft.docx
April 2020 12
Covermen Revisi.docx
April 2020 15