Develop a comprehensive policy statement for internet

Assignment Help Management Theories
Reference no: EM131661035

Question: Most businesses provide their employees with access to computer systems and other electronic devices. Employers that make electronic communications systems (such as access to the Internet and e-mail) available to their employees face some obvious risks, though. An employee could use e-mail to harass other employees or subject the employer to liability by reproducing, without authorization, copyright-protected materials found on the Internet. Another risk is that an outside party might intercept confidential information contained in e-mail messages transmitted via the Internet. Finally, by monitoring employees' Internet use and e-mail in an attempt to avoid these problems, the employer may risk being held liable for violating the employees' privacy rights. If you are an employer and find it prudent to monitor employees' Internet use, you should take certain precautions. Remember that a small company can be bankrupted by just one successful lawsuit against it. Even if your company wins the suit, the legal fees incurred to defend against the claim could be devastating for your profits.

Inform Your Employees of the Monitoring and Obtain Their Consent First, you should notify your employees that you will be monitoring their Internet communications, including their e-mail. Second, you should ask your employees to consent, in writing, to such actions. Generally, as discussed earlier in this chapter, if employees consent to employer monitoring, they cannot claim that their privacy rights have been invaded by such practices. You will find it easier to obtain employees' consent to monitoring if you explain why it is necessary or desirable and let them know what methods will be used to monitor Internet communications. As a rule, when employees are told the reasons for monitoring and clearly understand their rights and duties with respect to the company's communications system, they are less offended by the surveillance. Spell Out Permissible and Impermissible Internet Uses Employees should be told which uses of the firm's communications system are permissible and which uses are prohibited. To make sure that employees understand your policy, develop a comprehensive statement setting forth your standards for Internet use and provide specific examples of impermissible activities. It is also important to let employees know what will happen if they violate the policy. The policy might state, for example, that any employee who violates the policy will be subject to disciplinary actions, including termination.

CHECKLIST FOR THE EMPLOYER

1 Inform employees that their Internet communications will be monitored, explain why monitoring is necessary or desirable, and indicate how it will be conducted.

2 Obtain employees' written consent to having their electronic communications monitored.

3 Develop a comprehensive policy statement explaining how Internet communications should and should not be used and indicating the consequences of misusing the firm's communications system.

Reference no: EM131661035

Questions Cloud

Discuss a health promotion plan for individuals : Discuss what would be included in a health promotion plan for individuals and families based on needs assessment findings, risk factors
Explain the appropriateness of the debt policy : BAFN602: Corporate Finance Assessment. Obtain the financial statements for Woolworths and Telstra. In another word, explain the appropriateness of debt policy
Analyze the network diagram for pureland wastewater : This assignment requires you to analyze the network diagram for PureLand Wastewater and make specific recommendations to improve network security.
Percentage error of water : What would be the percentage error of water if the volume was 5.0 ml, Mass A of the Graduated Cylinder is 19.50, mass B.
Develop a comprehensive policy statement for internet : Develop a comprehensive policy statement explaining how Internet communications should and should not be used and indicating the consequences of misusing.
How to defend against attacker on the web : Even just talking on the phone can be a security risk, according to Harwood, there will be a slight increase in risk due to all the vulnerabilities
Discuss professional education in terms of costs : The various kinds of health professionals are educated in separate schools but with considerable overlap in curricula and training requirements
Analyze project management processes : Examine communication, human resources, procurement, and stakeholder management as project management functions.
What are the concentrations of all ions left in solution : Assuming that the volume is still 1.0 L, what are the concentrations of all ions left in solution?

Reviews

Write a Review

Management Theories Questions & Answers

  Discuss the various systems development methodologies

Discuss the various systems development methodologies. Can developers use a hybrid of the technologies in developing systems.

  Paper that explains human resource functions

Write a 175- to 350-word short paper that explains how Human Resource functions relate to organizational development

  What needs motivated the invention of the cash register

What needs motivated the invention of the cash register? Give four examples of how punched cards were used by large organizations in the early twentieth century.

  Brent bonnin begins his senior year of college filled with

brent bonnin begins his senior year of college filled with excitement and a twinge of fear. the excitement stems from

  What is the second stage in the mediation process

What is the second stage in the mediation process? When Lisa says to her husband, "You'd make a lousy father," she is communicating which type of hurtful message

  Describe the common nonverbal cues

Describe the common nonverbal cues used by someone you have worked for. Are they usually consistent or inconsistent with that person's verbal expressions? Explain.

  Implementation and drive organizational change

Implementation and drive organizational change

  Resolve privacy issues

Resolve privacy issues

  Draw the project network for completing all milestones

Brent Bonnin begins his senior year of college filled with excitement and a twinge of fear. The excitement stems from his anticipation of being done with it all-professors, exams, problem sets, grades, group meetings, all-nighters. . . .

  Texas disciplinary rules of professional conduct

Is it permissible under the Texas Disciplinary Rules of Professional Conduct for a lawyer to continue to represent a client in a proceeding after learning that the conduct of the lawyer's former client may be material to the proceeding?

  Review the case of harts v farmers insurance exchange

Mr. and Mrs. Hart bought an auto insurance policy from an agent representing Farmers Insurance. The policy they bought did not include uninsured motorist.

  Men video demonstrates group behavior

The Twelve Angry Men video demonstrates group behavior, communication and decision-making. Describe how the jurors' filters/perceptions/mental models/experiences impacted communication, the group dynamics and the decision making process.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd