Activity 4 - Monitoring Employees on Networks

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

270 Part Two Information Technology Infrastructure

INTERACTIVE SESSION MANAGEMENT


Monitoring Employees on Networks: Unethical or Good Business?
The Internet has become an extremely valuable When employees use email or the web (includ-
business tool, but it’s also a huge distraction for ing social networks) at employer facilities or with
workers on the job. Employees are wasting valuable employer equipment, anything they do, includ-
company time by surfing inappropriate websites ing anything illegal, carries the company’s name.
(Facebook, shopping, sports, etc.), sending and re- Therefore, the employer can be traced and held lia-
ceiving personal email, texting to friends, and down- ble. Management in many firms fear that racist, sexu-
loading videos and music. According to a survey by ally explicit, or other potentially offensive material
International Data Corp (IDC), 30 to 40 percent of accessed or traded by their employees could result in
Internet access is spent on non-work-related brows- adverse publicity and even lawsuits for the firm. Even
ing, and a staggering 60 percent of all online pur- if the company is found not to be liable, responding
chases are made during working hours. to lawsuits could run up huge legal bills. Companies
Many companies have begun monitoring employee also fear leakage of confidential information and
use of email and the Internet, sometimes without their trade secrets through email or social networks. U.S.
knowledge. Many tools are now available for this pur- companies have the legal right to monitor what em-
pose, including Veriato Investigator, OsMonitor, Work ployees are doing with company equipment during
Examiner, Mobistealth, and Spytech. These products business hours. The question is whether electronic
enable companies to record online searches, monitor surveillance is an appropriate tool for maintaining an
file downloads and uploads, record keystrokes, keep efficient and positive workplace. Some companies try
tabs on emails, create transcripts of chats, or take to ban all personal activities on corporate networks—
certain screenshots of images displayed on computer zero tolerance. Others block employee access to spe-
screens. Instant messaging, text messaging, and social cific websites or social sites, closely monitor email
media monitoring are also increasing. Microsoft offers messages, or limit personal time on the web.
software called MyAnalytics, which assembles data IT Authorities, a Tampa, Florida–based infrastruc-
from emails, calendars, and other sources to show em- ture management and support organization, is using
ployees how they spend their time, how often they are Veriato 360 employee monitoring software to help
in touch with key contacts, and whether they multi- improve employee productivity. The company im-
task too much. It also aggregates the data for managers plemented the software in 2016 to reduce what it be-
to see how their teams are doing. lieved to be “inefficient activities.” According to CEO
Although U.S. companies have the legal right to Jason Caras, knowing that managers can see whether
monitor employee Internet and email activity while employees are working and exactly how they are
they are at work, is such monitoring unethical, or is working is a huge deterrent to wasteful activity. For
it simply good business? IT Authorities specifically, Veriato 360 tracks and
Managers worry about the loss of time and em- records the websites employees are visiting, what
ployee productivity when employees are focusing on documents they are transmitting (and how), what
personal rather than company business. Too much they are sending (and to whom) in email and instant
time on personal business translates into lost reve- messaging, and even how long they might have been
nue. Some employees may even be billing time they away from their computers at any given time. With
spend pursuing personal interests online to clients, Veriato 360, companies such as IT Authorities are
thus overcharging them. able to identify “normal” patterns of activity for an
If personal traffic on company networks is too individual’s job, as well as any anomalies, so they
high, it can also clog the company’s network so that can quickly address any potential productivity loss
legitimate business work cannot be performed. GMI before it costs their company thousands or even mil-
Insurance Services, which serves the U.S. transporta- lions of dollars in lost work.
tion industry, found that employees were download- A Proofpoint survey found that one in five large
ing a great deal of music and streaming video and U.S. companies had fired an employee for violating
storing the files on company servers. GMI’s server email policies. Among managers who fired employ-
backup space was being eaten up. ees for Internet misuse, the majority did so because
Chapter 7 Telecommunications, the Internet, and Wireless Technology 271

the employees’ email contained sensitive, confiden- investment firms will need to allow many of their
tial, or embarrassing information. employees access to other investment sites. A com-
No solution is problem-free, but many consultants pany dependent on widespread information shar-
believe companies should write corporate policies on ing, innovation, and independence could very well
employee email, social media, and Internet use. Many find that monitoring creates more problems than it
workers are unaware that employers have the right solves.
to monitor and collect data about them. The policies
should include explicit ground rules that state, by posi-
Sources: “Technology Is Making It Possible for Employers to
tion or level, under what circumstances employees can
Monitor More Work Activity than Ever,” Economist, April 3, 2018;
use company facilities for email, blogging, or web surf- www.privacyrights.org, accessed April 5, 2018; “Electronic Surveillance
ing. The policies should also inform employees whether of Employees,” www.thebalance.com, accessed April 5, 2018; “Office
these activities are monitored and explain why. Slacker Stats,” www.staffmonitoring.com, accessed May 3, 2017;
“How Do Employers Monitor Internet Usage at Work?” wisegeek.org,
The rules should be tailored to specific business accessed April 15, 2017; and Veriato,“Veriato 360 Helps IT Authorities
needs and organizational cultures. For example, Quickly Increase Employee Productivity,” March 15, 2017.

CASE STUDY QUESTIONS


1. Should managers monitor employee email and 3. Should managers inform employees that their web
Internet usage? Why or why not? behavior is being monitored? Or should managers
2. Describe an effective email and web use policy for monitor secretly? Why or why not?
a company.

A virtual private network (VPN) is a secure, encrypted, private network


that has been configured within a public network to take advantage of the
economies of scale and management facilities of large networks, such as the
Internet (see Figure 7.10). A VPN provides your firm with secure, encrypted
communications at a much lower cost than the same capabilities offered by tra-
ditional non-Internet providers that use their private networks to secure com-
munications. VPNs also provide a network infrastructure for combining voice
and data networks.
Several competing protocols are used to protect data transmitted over the
public Internet, including Point-to-Point Tunneling Protocol (PPTP). In a process
called tunneling, packets of data are encrypted and wrapped inside IP packets.
By adding this wrapper around a network message to hide its content, business
firms create a private connection that travels through the public Internet.

The Web
The web is the most popular Internet service. It’s a system with universally
accepted standards for storing, retrieving, formatting, and displaying informa-
tion by using a client/server architecture. Web pages are formatted using hy-
pertext, embedded links that connect documents to one another and that also
link pages to other objects, such as sound, video, or animation files. When you
click a graphic and a video clip plays, you have clicked a hyperlink. A typical
website is a collection of web pages linked to a home page.

Hypertext
Web pages are based on a standard Hypertext Markup Language (HTML),
which formats documents and incorporates dynamic links to other documents
and other objects stored in the same or remote computers (see Chapter 5). Web

You might also like