THIS IS HOW TIME WASTING LOOKS LIKE!
CASE STUDY ON:
Monitoring Employees on Networks: Unethical or Good Business?
PRESENTED TO: Mr. A.T. M. Jakaria Khan Lecturer, Institute of Business Administration University of Dhaka
PRESENTED BY: Md. Atiqul Basher, ID: 31, Batch – MBA -52D Raisa Tasneem Zaman, ID: 32, Batch- MBA- 52D
CASE SUMMARY
• The Internet and email are important tools • Employees abuse the Internet and e-mail during work hours
In a fast paced, competitive business world, some employee:
QUESTION 1: Should manager monitor employee e-mail and Internet usage? Why or why not?
WHY MANAGERS SHOULD MONITOR EMPLOYEES?
1 OUT OF 3 US COMPANIES HIRE INDIVIDUALS TO MONITOR EMPLOYEES
- Proof point plus study, 2010
UNRESTRICTED USAGE CAUSES CLOG TO NETWORK (COMPANIES LIKE PNG PAID A HUGE PRICE FOR THIS!)
14% EMPLOYEES ADMITTED THAT THEY SENT COMPANY SECRET AND POTENTIALLY EMBARASSING MAILS TO OUTSIDERS
$6,50,000 AVERAGE LITIGATION COST OF SEXUAL AND ANY OTHER HARRASSMENT CAUSED BY MISUSE OF INTERNET AT WORK
According to the law, US companies are…
NOT ALLOWED
ALLOWED
QUESTION 2: Describe an effective e-mail and Web use policy for a company.
STEPS TO FOLLOW Step 2:
Step 4:
Step 5:
Adapt spectorsoft
Introduce Written policy
Introduce IS department
Step 1:
Step 3:
Step 6:
Lay out specific procedures
Adopt Zero tolerance
Specific personal usage time
Lay out specific procedures and accountabilities: Identify which users and organizational units can share information, where information can be distributed, and who is responsible for updating and maintaining the information.
Spector Soft Corporation: Record all Web site employee visit, time spend at each site and all e-mail sent.
E-mail monitoring software flags certain type of messages and keywords within messages for further investigation.
Zero tolerance policy: Use of the Internet/E-mail to discuss or distribute information related to the company’s trade secrets, policies or practices. Monitoring software will be employed to scan outgoing e-mail for company sensitive terminology and related subject matter Use of the Internet causing disruption to the facility’s services including reduction of bandwidth available for company business. Transmission of harassing, discriminatory or otherwise objectionable e-mail or files (as determined by the recipient) is strictly prohibited. The Internet must not be used to access, create, transmit, print or download material that is derogatory, insulting, obscene, or offensive, such as slurs, epithets, or anything that may be construed as harassment or disparagement based on race, color or religious. Monitoring software will be employed to block the availability of these types of sites
Written policy must include explicit ground rule: By position or level
Under what circumstance employee can use company facilities for e-mail, blogging, or Web surfing.
Information Services Department: To monitor employees to provide weekly reports detailing Internet and e-mail usage during normal business hours per employee.
Specified personal usage time Personal e-mail or Internet surfing is permitted ONLY during the following periods: before stated company business hours, after stated company business hours, or an employee’s lunch hour.
A good policy will detail exactly what type of activity is acceptable and what is not allowed.
QUESTION: 3 Should managers inform employees that their Web behavior is being monitored? Or should mangers monitor secretly? Why or why not?
Should managers inform employees that their Web behavior is being monitored?
Yes
Good Business Practice: • An automatic message
• Warns all employees of the written policies • Reminds employees about monitoring software
Letting employees know that their computers are monitored can urge them to avoid using the Internet for personal purposes. More productive work hours Improved efficiency
IN CONCLUSION EMPLOYEE SURVEILANCE IS AN ACCEPTED PRACTICE, AT AND DURING WORKING HOUR ONLY. HOWEVER IT MUST BE TAILORED IN SUCH A MANNER SO THAT WORK DOES NOT GET HAMPERED.
VIDEO PRESENTATION
THANK YOU !