Академический Документы
Профессиональный Документы
Культура Документы
1. Executive Summary.............................................................................................4
2. Introduction..........................................................................................................4
3. Literature review..................................................................................................4
4. Background..........................................................................................................4
4.1 Company Purpose..........................................................................................4
4.2 General implementations of internet policies................................................5
4.3 Current implementations of internet policies.................................................5
4.3.1 Comparison of other organization use.....................................................5
5. Benefits................................................................................................................5
5.1 Benefits for Employees..................................................................................5
5.2 Benefits for Employers...................................................................................5
5.3 Benefits for the Company..............................................................................6
6. Problems..............................................................................................................6
6.1 Psychological impact of implementation........................................................6
6.1.1 Employee attitudes towards employers...................................................6
6.1.2 Employee attitudes towards work...........................................................6
6.1.3 Employer attitudes towards employees...................................................6
6.2 Legal implications..........................................................................................7
6.2.1 Beneficial implications.............................................................................7
6.2.2 Negative implications..............................................................................7
6.2.3 Ethical implications..................................................................................8
6.3 Costs..............................................................................................................8
6.3.1 Costs of implementation..........................................................................8
6.3.2 Costs of on-going support........................................................................8
7. Possible solutions.................................................................................................9
7.1 Involving employees in construction of policy...............................................9
7.2 Benefits and rewards for non-violations.........................................................9
7.3 Promoting awareness of internet misuse in the workplace............................9
7.4 Possible alternatives......................................................................................9
7.4.1 Blacklisting websites...............................................................................9
7.4.2 Blacklisting internet-software packages..................................................9
1
7.4.3 Blacklisting words and phrases...............................................................9
7.4.4 Restrictions on internet usage...............................................................10
8. Conclusions........................................................................................................10
9. Recommendations.............................................................................................10
10. Bibliography....................................................................................................11
Bibliography
2
1. Figure
1.0…………………………………………………………………………………………………
……………………………….13
2. Figure
2.0…………………………………………………………………………………………………
……………………………….14
1
1.Executive Summary
The purpose of this report is to analyse the introduction of internet usage
policies and monitoring software in an organisation. Research has been
sourced from numerous faucets of information ranging from professional
publications to individual views and personal blog articles to present a report
outlining benefits, problems and potential solutions in the implementation of
the aforementioned. Internet usage policies have proven to be beneficial for
both employees and teachers in this employers age; and due to the low cost
of implementation, maintenance and security are also a very large factor in
considering implementation. This report recommends implementation of this
policy which not only in the short term, but also in long term will aid the
success, security and growth of this organisation.
2. Introduction
This report is based on research carried out between March and May 2010
using qualitative methods. Over the past decade, employee internet abuse
has been a growing concern for numerous organizations. Thus, more and
more companies are implementing are switching to monitoring software
rather than just enforcing policies to try to limit the amount of abuse
occurring. This report will identify the costs, efficiency, impact on morale and
the legal issues with imposing such things.
3. Literature review
There are many texts on this matter giving a range of ideas, views and
opinions. Because this topic covers a wide range of aspects, ranging from
psychological effects through to legal issues, it was necessary to retrieve
information from numerous forms of media. After heavy consideration, I
came to select specific texts which covered all of the aforementioned
aspects. My citations should appear as a list of references below. In this
report I have used the American Psychological Association referencing style.
4. Background
4.1Company Purpose
(company) is a relatively large organisation which does not currently have
a internet usage policy. They are a well respected and prospectful
organisation who wishes to maintain their good image and due to recent
awareness of possible implications of internet abuse and misuse in the
workplace have seeked consultation in regards to this issue.
1
4.2General implementations of internet policies
Internet policies generally outline what the users are allowed and not
allowed to do. They include the type of websites that are allowed to be
accessed, when they can be accessed, and for what reasons. They also
depict how users should conduct themselves when using company email
or internet. It sets out limitations on personal (non work-related) use, and
usually outlines the punishments and procedures that will occur if an
employee is found to be breaking these rules.
5. Benefits
5.1Benefits for Employees
Employees benefit in the sense that they are allowed to work to their full
capacity, void of distractions that could come from internet misuse which
opens the door for promotion and advances in their workplace (RAJAN). It
also provides a clear written set of what is and what is not acceptable, so
the employee can identify what the employer’s thoughts are on this
matter. It also outlines a strict set of punishments and procedures to
prevent any unfair sanctions against employees found to break the policy
(YOUNG).
1
5.2Benefits for Employers
Employers are able to spend less time physically monitoring employees
(KOMANDO) and be able to make sure that employees who abuse this are
able to be correctly punished (YOUNG).
6. Problems
6.1Psychological impact of implementation
6.1.1 Employee attitudes towards employers
Employees could feel that their Employer is infringing their privacy
rights (ENBYSK). Employees could also feel that their Employer
does not respect them, which can cause numerous implications
(Schulman, 2008)
1
6.2Legal implications
6.2.1 Beneficial implications
6.2.1.1Monitoring software
Monitoring employees could prevent an organisation being
responsible for the employee’s actions on the company
computers (Ruquet, 2010).
2
• Reduce the organization's liability resulting from
harassment claims, copyright violations originating onsite
and other illegal acts
•
2.2Costs
2.2.1 Costs of implementation
2.2.1.1General Policy
The costs of implementing a general policy can be as little as a
few dollars. It involves preparing a policy, or simply downloading
a pre-made one from the internet. It is then photocopied, and
individual copies are signed and dated by individual employees
affected. You may consider affixing it to walls, or making it a
screen-saver or background on the actual computers used
(assuming you have the right to do so). The total cost should not
exceed $100. Note that the costs will increase if you plan on
having a legal attorney prepare the policy for you.
2.2.1.2Monitoring software
A complete monitoring software suite will cost $200. To
implement it will cost $50 per computer.
1
2.2.2 Costs of on-going support
2.2.2.1General Policy
It is recommended that every 6 months the internet policy
revised and resigned to assure that the employee is aware and
has not forgotten. It will cost the same as the implementation
cost
2.2.2.2Monitoring software
Depending on what software package you have, licenses may
expire after a year. This means that you will need to renew the
software license which could cost as much as the initial
purchase price.
3. Possible solutions
3.1Involving employees in construction of policy
Surveying employees could allow them to see why a policy would be
useful. It will also give you a good idea as to how they personally feel
about such a policy, and how you should implement it. This concept of
employee involvement would also make it easier for the employees to
accept, as the more involved they feel they are the more likely they are to
comply with it.
1
3.4Possible alternatives
3.4.1 Blacklisting websites
Many companies are starting to blacklist social networking and
other websites they feel are not productive at work (Polakowski,
2008) and it is usually a cheap and easy to implement feature.
4. Conclusions
This report has identified the numerous benefits, problems and opinions
based on internet policy implementation. Some are primarily used for larger
organisations such as the higher-end internet usage monitoring software;
others are used in smaller and more common situations such as a basic
internet usage agreement between the employee and employer. The
psychological aspects of a policy implementation have also been discussed.
The performance of these policies is dependent upon their quality, strength,
aspects covered and most importantly the way they are written and
communicated to the users. Internet policy has improved productivity
significantly in recent years when we are becoming more and more
dependant on the internet. The impact of these improvements is expected to
increase the efficiancy of employees its suitability for a wider range of
purposes (such as legal aspects). In relation to this, the future of internet
2
monitoring software seems to point to that more employers are switching to
monitoring their employees’ internet usage.
5. Recommendations
An internet usage policy should be drafted with the aid of a lawyer and
should be signed and agreed to by all users who will be affected by it. It is
recommended that surveys to the affected users are produced to allow self-
reflection, which will inturn make it easier to implement future policies and
monitoring technologies. It is recommended that low-level internet
monitoring is implemented, whereby the websites and e-mails sent on
company e-mail is monitored for any issues. The benefits outweigh the
negatives, and in situations such as legal situations they could prove
incredibly useful.
6. Bibliography
Ruquet, M.E (2010). To Avoid Many Perils Control Internet Access, Agencies Warned,
National Underwriter P&C. Retrieved from
http://www.propertycasualty.com/News/2010/3/Pages/Agencies-Warned-Control-
Internet-Access-To-Avoid-Many-Perils.aspx
Young, E.M. (2010). The ethics of monitoring employee Internet use in the workplace.
Web log message http://www.helium.com/items/1593083-the-ethics-of-monitoring-
employee-internet-use-in-the-workplace
2
Enbysk, M . (2010). Should you monitor your employees' Web use? Microsoft
company publication Retrieved from
http://www.microsoft.com/smallbusiness/resources/ArticleReader/website/default.as
px?
ArticleId=ShouldyoumonitoryouremployeesWebuse#Shouldyoumonitoryouremploye
esWebuse
Amour, S. (2006, June 2). Companies keep an eye on workers' internet use.
USA Today, Retrieved from
http://www.usatoday.com/tech/news/internetprivacy/2006-02-20-internet-
abuse_x.htm
Reh, F.J. (n.d.). Your boss is watching you. About.com Management, Retrieved
from http://management.about.com/cs/people/a/MonitorEE062501.htm
CCH. (n.d.). Internet use poses litigation risk for employers, provides litigation
tool for attorneys. Hrtools Build a better business, Retrieved from
https://www.hrtools.com/legal_compliance/internet_use_poses_litigation_risk
_for_employers_provides_litigation_tool_for_attorneys.aspx
Erik, Initials. (2006, August 24). The Importance of internet usage policies.
Tech republic, Retrieved from http://articles.techrepublic.com.com/5100-
10878_11-6071808.html
Polakowski, M. (2008, May 12). To Block or not to block? social networking sites
at work. Cetification Magazine, Retrieved from
http://www.certmag.com/read.php?in=3456
1
Figure 10Use of internet for business purposes
2
(Industry Canada, 2009)
1
(207 Tech, undated)