Rider Monitoring Employees on Networks Unethical or Good Business Case Analysis I’m attaching picture of the case. Answer the question, Mla citation.1 page

Rider Monitoring Employees on Networks Unethical or Good Business Case Analysis I’m attaching picture of the case. Answer the question, Mla citation.1 page single spac 9:57 AM Sun Apr 12
77%
< >
m
AA
bookshelf.vitalsource.com
c
+
preclude definition – Google Search
learn-us-east-1-prod-fleet01-xythos.S…
x
VitalSource Bookshelf: Management…
270 Part Two Information Technology Infrastructure
ts
Information
udon; Jane P.
INTERACTIVE SESSION MANAGEMENT
Monitoring Employees on Networks: Unethical or Good Business?
The Internet has become an extremely valuable When employees use email or the web (includ-
business tool, but it’s also a huge distraction for ing social networks) at employer facilities or with
workers on the job. Employees are wasting valuable employer equipment, anything they do, includ-
company time by surfing inappropriate websites ing anything illegal, carries the company’s name.
(Facebook, shopping, sports, etc.), sending and re- Therefore, the employer can be traced and held lia-
ceiving personal email, texting to friends, and down- ble. Management in many firms fear that racist, sexu-
loading videos and music. According to a survey by ally explicit, or other potentially offensive material
International Data Corp (IDC), 30 to 40 percent of accessed or traded by their employees could result in
Internet access is spent on non-work-related brows- adverse publicity and even lawsuits for the firm. Even
ing, and a staggering 60 percent of all online pur- if the company is found not to be liable, responding
chases are made during working hours.
to lawsuits could run up huge legal bills. Companies
Many companies have begun monitoring employee also fear leakage of confidential information and
use of email and the Internet, sometimes without their trade secrets through email or social networks. U.S.
knowledge. Many tools are now available for this pur- companies have the legal right to monitor what em-
pose, including Veriato Investigator, Os Monitor, Work ployees are doing with company equipment during
Examiner, Mobistealth, and Spytech. These products business hours. The question is whether electronic
enable companies to record online searches, monitor surveillance is an appropriate tool for maintaining an
file downloads and uploads, record keystrokes, keep efficient and positive workplace. Some companies try
tabs on emails, create transcripts of chats, or take to ban all personal activities on corporate networks-
certain screenshots of images displayed on computer zero tolerance. Others block employee access to spe-
screens. Instant messaging, text messaging, and social cific websites or social sites, closely monitor email
media monitoring are also increasing. Microsoft offers messages, or limit personal time on the web.
software called MyAnalytics, which assembles data IT Authorities, a Tampa, Florida-based infrastruc-
from emails, calendars, and other sources to show em- ture management and support organization, is using
ployees how they spend their time, how often they are Veriato 360 employee monitoring software to help
in touch with key contacts, and whether they multi- improve employee productivity. The company im-
task too much. It also aggregates the data for managers plemented the software in 2016 to reduce what it be-
to see how their teams are doing.
lieved to be ‘inefficient activities.” According to CEO
Although U.S. companies have the legal right to Jason Caras, knowing that managers can see whether
monitor employee Internet and email activity while employees are working and exactly how they are
they are at work, is such monitoring unethical, or is working is a huge deterrent to wasteful activity. For
it simply good business?
IT Authorities specifically, Veriato 360 tracks and
Managers worry about the loss of time and em- records the websites employees are visiting, what
ployee productivity when employees are focusing on documents they are transmitting and how), what
personal rather than company business. Too much they are sending and to whom) in email and instant
time on personal business translates into lost reve- messaging, and even how long they might have been
nue. Some employees may even be billing time they away from their computers at any given time. With
spend pursuing personal interests online to clients, Veriato 360, companies such as IT Authorities are
thus overcharging them.
able to identify “normal” patterns of activity for an
If personal traffic on company networks is too individual’s job, as well as any anomalies, so they
high, it can also clog the company’s network so that can quickly address any potential productivity loss
legitimate business work cannot be performed. GMI before it costs their company thousands or even mil-
Insurance Services, which serves the U.S. transporta lions of dollars in lost work.
tion industry, found that employees were download- A Proofpoint survey found that one in five large
ing a great deal of music and streaming video and U.S. companies had fired an employee for violating
storing the files on company servers. GMI’s server email policies. Among managers who fired employ-
backup space was being eaten up.
ees for Internet misuse, the majority did so because
ns,
e…
>
7
cture
>
m
Digital Age
>
nd Managing
Chapter 7 Telecommunications, the Internet, and Wireless Technology 271
investment firms will need to allow many of their
employees access to other investment sites. A com-
pany dependent on widespread information shar-
ing, innovation, and independence could very well
find that monitoring creates more problems than it
solves.
the employees’ email contained sensitive, confiden-
tial, or embarrassing information.
No solution is problem-free, but many consultants
believe companies should write corporate policies on
employee email, social media, and Internet use. Many
workers are unaware that employers have the right
to monitor and collect data about them. The policies
should include explicit ground rules that state, by posi-
tion or level, under what circumstances employees can
use company facilities for email, blogging, or web surf-
ing. The policies should also inform employees whether
these activities are monitored and explain why.
The rules should be tailored to specific business
needs and organizational cultures. For example,
Sources: “Technology Is Making It Possible for Employers to
Monitor More Work Activity than Ever, Economist, April 3, 2018;
www.privacyrights.org, accessed April 5, 2018; “Electronic Surveillance
of Employees, www.thebalance.com, accessed April 5, 2018; “Office
Slacker Stats, www.staffmonitoring.com, accessed May 3, 2017;
“How Do Employers Monitor Internet Usage at Work?’ wisegeek.org,
accessed April 15, 2017; and Veriato, “Veriato 360 Helps IT Authorities
Quickly Increase Employee Productivity,” March 15, 2017
CASE STUDY QUESTIONS
1. Should managers monitor employee email and
Internet usage? Why or why not?
2. Describe an effective email and web use policy for
a company.
3. Should managers inform employees that their web
behavior is being monitored? Or should managers
monitor secretly? Why or why not?

Purchase answer to see full
attachment

Don't use plagiarized sources. Get Your Custom Essay on
Rider Monitoring Employees on Networks Unethical or Good Business Case Analysis I’m attaching picture of the case. Answer the question, Mla citation.1 page
Just from $13/Page
Order Essay
Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.