Free Essay

Personal Use of Company Resources

In:

Submitted By kmboozer
Words 1144
Pages 5
Personal Use of Company Resources

Karen M. Boozer Baker College Center for Graduate Studies

July 12, 2011

Abstract

Everyone, at one time or another, has used company resources for personal usage. Considering all the time that people spend at a desk it is almost inevitable that this will happen. The important thing is to make sure that the usage is not abusive nor against company policy. Research suggests that people either very diligent about excessive usage or very abusive of company policies. The line between the two can be a very fine one but determining what constitutes excessive will always seem to be controversial.

Personal Use of Company Resources
Everyone at some point has used company resources for personal use whether it is office supplies, copiers/printers or computers. In today’s society people spend more time at work then they do at home with their families. There just does not seem to be enough time at home to handle all the things that need to be done at home and that is why employees use company resources for their personal business. How does an employer determine what is excessive and is considered abuse? There are some organizations out there that allow their employees limited use of company resources as long as it does not impact their jobs or the actual network resources. There are other companies out there that have very strict policies to prevent certain types of personal usage to the point that they do not allow any internet access at all. These types of policies depend solely on the company or organization due partly to cost but also to past history of usage from employees. For example NASA’s policy seems to be lenient and allows employees use office equipment and internet. NASA’s policy states that they believe their employees are responsible and capable of balancing responsibility. NASA does qualify that the personal usage should not violate laws, interfere with business and/or official duties and the additional expense to the government should be minimal. (NASA.gov, 2010) Research shows that this written policy is very rare in the way that lists the ways that employees are allowed to use the company resources down to spelling out long distance phone usage, copier paper and toner. Another example would be the State of Texas’ Workforce Center (TWC) and the policy that they have listed where all actual office machines including computers and fax machines are to be only used for official purposes. TWC does also qualify that it is allowable to use the internet briefly and occasionally to check personal e-mail and to surf the internet. Their policy goes on to define excessive as interfering with job function, responsiveness or the ability to perform job activities. (TWC, 2011)
A company called Cyclope-Series has monitored studied 200 employees internet usage from June 1, 2009 to December 31, 2009 with the results showing more usage than what was expected. The following are some of the statistics from the employees during normal working hours (cyclope-series.com, 2010): * Personal e-mail checking up to 5 times per day * 24% spend more than 1 hour per day on social networks while Facebook is the most popular site with 90% of employees logging in periodically * 90% exceed lunch break * Activity starts on average 30 minutes after computer start up.
Abuse of company resources does not only apply to internet usage but there is a large number of employees that commit expense account and travel fraud. This is one of the most common types of white-collar crime that drains billions of dollars from corporations each year. Companies have a tendency to leave the door open when writing policies because they are trying to meet audit and tax law requirements. It is easy for an employee to fudge on their mileage when submitting for reimbursement because while beginning and ending mileage has to be listed there is no way for the company to verify that without looking at the odometer on the employee’s personal vehicle. There are several other ways for employees to perpetrate fraud in relation to expenses for example saying that a more expensive hotel was used in actuality the hotel was lower in cost. Another example is booking a flight for first class “because there were no coach seats available” and then exchanging for a coach ticket and pocketing the difference. (mcgoverngreen.com, 2011) There are many other types of fraud related to expense accounts and they basically relate to the theory of padding the account by saying that more money was spent than actually was spent.
Another form of abuse in with company resources is the supply cabinet. According to SecuritySolutions.com, over 58% of office workers have taken office supplies for their personal use. The most commonly taken office supplies are pens and pencils (77%), followed by sticky notes (44%) and then paper clips (40%). There are also instances where employees have taken office decorations. (SecuritySolutions.com, 2006)
There are a few ways to try and curtail the abuse that happens in the workplace. For example for internet abuse such as putting website filters so the only websites that are available are related to the type of work that is being done. There are a few ways to prevent expense account fraud such as giving a monthly allowance for mileage rather than paying per mile, paying for plane tickets and hotels through the company account rather than employees turning in receipts and in regards to supplies having someone that is dedicated for keeping track of supplies and issuing them to employees rather than leaving them open for a “free-for-all”.
Employees using company resources costs companies billions of dollars a year and while some of the things needed to curtail the abuse will cause more work in the beginning but in the end will help save company money. The issue is that many companies rely on the honor system and the ethics of its employees.

REFERENCES
NASA Policy Directive (2010, June 8). Personal Use of Government Office Equipment Including Information Technology. Retrieved July 13, 2011 from http://nodis3.gsfc.nasa.gov/displayDir.cfm?t=NPD&c=2540&s=1G
Texas Workforce Center (2011). Internet, e-mail, and computer usage policy. Retrieved July 13, 2011 from http://www.twc.state.tx.us/news/efte/internetpolicy.html
Cyclope-Series Team Blog (2010, February 4). Internet usage work statistics for 2009. Retrieved July 13, 2011 from http://blog.cyclope-series.com/2010/02/04/internet-usage-at-work-statistics-for-2009/
Green, Craig L. McGovern & Greene LLP (2011). Expense Account and Travel Fraud. Retrieved July 13, 2011 from http://www.mcgoverngreene.com/archives/archive_articles/Craig_Greene_Archives/expense_acct_fraud.html
Security Solutions (2006, May 9). Watch out for Sticky-Fingered Employees. Retrieved July 13, 2011 from http://securitysolutions.com/news/StickyFingers/

Turn it in report:

Similar Documents

Premium Essay

Electronic Communications Policy

...tools are heavily relied on and recognized as an enormous company asset. Electronic communications equipment and services include internal and external electronic mail (e-mail), facsimiles, telephone systems, voice mail, internet access, cellular phones, as well as computer networks, files, hardware and software. While we encourage the use of these company resources, it is important to note they should only be used for their intended purposes and in a manner in which their integrity and performance is protected. “Company” will continually monitor the use of all company assets. Purpose: The guiding purpose of “Company’s” electronic communications policy is to set forth the expected standards of conduct, rules, restrictions, procedures, and disciplinary actions surrounding their use. Abuse and misuse of electronic communication tools potentially puts both the company and employees at risk. In an effort to minimize risks, “Company” is responsible for securing its electronic communications system against unauthorized access, prohibited uses, abuse, and violation of local, state, federal, and international laws. In addition, we will ensure any applicable electronic communications will be retained in accordance with any applicable laws. Employee acknowledgement and consent is required. Scope: The electronic communications policy applies to all electronic communications resources owned by, managed by, or provided by “Company” and any electronic communication records held by or...

Words: 806 - Pages: 4

Premium Essay

Riordan Human Resources

...System Analysis for Riordan Manufacturing’s Human Resources Department Kelly Beckwith University of Phoenix, Online Table of Contents Abstract ………………………………………………………………………………………… 3 Introduction ……………………………………………………………………………………. 4 Scope and Goals ………………………………………………………………………………… 4 Supporting Measures …………………………………………………………………………. 5 System Requirements …………………………………………………………………………. 7 Application Architecture and Process Design …………………………………………………. 9 Data Flow and Protection ………………………………………………………………………. 10 Data Flow Chart ………………………………………………………………………………. 10 Flow of Data Chart ………………………………………………………………………….…. 11 Implementation Process ………………………………………………………………………… 12 Human Resource Organizational Chart ………………………………………………………… 12 Conclusion ……………………………………………………………………………………… 14 Resources ………………………………………………………………………………………. 16 Abstract Designing a new system for Riordan Manufacturing’s Human Resources Department is a crucial and important part of Riordan efforts to evolve with new technology. The company has asked that installation of their new system occur within six months. The current Human Resources Information Systems (HRIS) is outdated by over 10 years. Allowing an outside company to implement a new system will save Riordan Manufacturing time and money, and allowing completion of the project in the time allowed. Combining all of the systems used by Riordan’s human resources staff will allow easier access for all. ...

Words: 3220 - Pages: 13

Premium Essay

Professional Development Planning

...This assignment is based on the strategic management and leadership and it is discussed about the McDonalds. There are different types of skills such as personal skills and professional skills and as a manager it is required to have both types of skills to achieve personal goals and professional goals. From this assignment it is identifying the company strategic goals and the required personal and professional skills to achieve those strategic goals. Same time it is mentions the learning styles of those skills and evaluates the skills. It is mentioned personal development plan including budget reports, resources and time framework. It is important to evaluate the developments and the progress of the skills and it is able to use several methods to evaluate. There are several impacts from the self learning and it is affected for the strategic goals achieving. Therefore it is discussing all these areas based on the McDonalds case study and it is significant to get a clear idea about the skills of the individuals. Task 2 2.1. Personal skills audit evaluating strategic skills needed to meet current and future leadership requirements According to Boselie et al. (2005:4) there are different types of skills which should have with an individual and it is supports to perform in the business. Therefore it is required to have personal skills as well as professional skills to perform in the job. As a manager it is significant to have leadership skills with him and it supports to direct...

Words: 4142 - Pages: 17

Free Essay

Paid and Unpaid Personal Leaves

...long time in that company, then the benefits it is offering such as employee leave and for how many days it is willing to pay for personal leave is very important. Employers offer employees leave in many forms such as vacation, sick time, personal time, paid time as a part of benefit package. These policies really make a difference. They develop a positive working relationship between employee and employer and also increase the commitment of the employee towards the organization which leads to more profits, promotes good working habits and help human resource manager to easily keep track of the employee attendance. This research paper is about paid and unpaid personal leaves for employees. These leaves are not under leave of absence laws. They are not required by the federal law to be granted to the employees and they are purely given by the company as a benefits package or bonus. In the body of the paper, I will discuss about the definition of these days, main goal of these leaves, number of days, rules and regulations on how to use these days, a new policy being introduced in many organizations known as PTO (Paid Time Off Policy) to benefit employees and managers in the place of paid personal leave, benefits and disadvantages. Paid Personal Days Definition: These are the days paid by the employer to the employee as a part of comprehensive benefits package or given at the request of the employee or some legal contract made by the employer with the company while joining, when...

Words: 3068 - Pages: 13

Premium Essay

Huaman Resource

...Human Resource Management Class Owen Li Samford University Brock School of Business Abstract I have been taking Dr. Robert W. Service’s Human Resource Management (HRM) class for four months, and I was able to learn insightful thoughts and valuable objectives of human resource management. In this paper, I will discuss the knowledge, principles, and theories I have learned from the articles I have read, the HR managers I have interviewed, and the HRM classes I have taken. The paper will discuss HRM in terms of interviewing and hiring, training, employee development, succession planning, and appraisals. I will also discuss the work environment, employee protection, technologies, and overall HR management-planning and forecasting. Keywords: human resource management, interviewing and hiring, training, employee development, succession planning, appraisals, work environment, employee protection, technologies, overall HR management-planning and forecasting What I Have Learned From Human Resource Class No matter which topic we discuss in our HRM class, they all somehow relate to one objective that Dr. Robert W. Service emphasizes to us all the time: “the organization has the right people in the right positions with the right training and motivation to do tasks effectively and efficiently at the right time” (Service and Loudon, 2010). With this primary HR objective in mind, I realize that HRM plays a very important role in human resource allocation for any company in building...

Words: 3423 - Pages: 14

Premium Essay

Ha Hrm 5540

.................................................... 1 2) Utilization of key competencies ........................................................................................................... 1 3) Individual Use .............................................................................................................................................. 3 4) Personal Learning ...................................................................................................................................... 4 5) Literature ..................................................................................................................................................... II 1 1) Key competencies Competencies are defined as a set of behaviours and knowledge that enables a person to do its job properly.1 Competencies and knowing which competencies are needed are most important for a company. McClelland analysed in its paper from 1973 already that it is better for a company to test on a person’s competencies than on its intelligence.2 Not every job position needs the most intelligent person but the person who takes the job needs to have the requested competencies to fulfil the job. The problem is that there are not the one key competencies. Every single company or job requests its own competencies. To receive a better understanding about them it is helpful to...

Words: 3407 - Pages: 14

Premium Essay

Ethics

...SAMPLE INTERNET USAGE POLICY Policy: Access to the Internet through the Company is a privilege. Users granted this privilege must adhere to strict guidelines concerning the appropriate use of this information resource. Users who violate the provisions outlined in this document are subject to disciplinary action up to and including termination. In addition, any inappropriate use that involves a criminal offense will result in legal action. All users are required to acknowledge receipt and understanding of guidelines contained in this document. Purpose: To define policies and procedures for access to the Internet through the Company network infrastructure. Scope: This policy applies to all personnel with access to Internet and related services through the Company network infrastructure. Internet Related services include all services provided with the TCP/IP protocol, including but not limited to Electronic Mail (e-mail), File Transfer Protocol (FTP), Gopher, and World Wide Web (WWW) access. Procedure: 1. ACCEPTABLE USE 1. Access to the Internet is specifically limited to activities in direct support of official Company business. 2. In addition to access in support of specific work related duties, the Company Internet connection may be used for educational and research purposes. 3. If any user has a question of what constitutes acceptable use he/she should check with their supervisor for additional guidance. Management or supervisory...

Words: 1375 - Pages: 6

Premium Essay

Ethics Issues

...three ethical issues: Human Resources Issues, Conflicts of Interest, and the Use of Corporate Resources, and how they affect the organization of Lovelace Health System. Business Ethics Business ethics, by definition is the “Moral principles defining how businesses and business should act towards each other, employees, and the public” (The Hutchinson Unabridged Encyclopedia with Atlas and Weather guide, 2009). Ethics is derived from a person’s upbringing, culture, nationality, education, peer group(s), and experiences throughout life that ultimately define the individual. It is how a person decides what is right and what is wrong. Many organizations today have put in place a code of ethics for employees to live by and must be adhered to if the employee wishes to prosper long-term with that organization. Human Resources Issues Human resources issues describe “the ethical problems that occur when people work together” (Trevino, Nelson, 2007, p. 2). The performance evaluation is very important in grading one’s performance, but it also can be the deciding factor in yearly merit increases. At Lovelace Health Systems, performance evaluations are given once a year. The evaluations can last from 15 minutes to 30 minutes at most. Throughout the year little or no feedback is given to the employee(s) concerning work performance unless the employee does something wrong and is counseled on the issue. This is an ethical problem because the human resources-the employees-are not properly...

Words: 676 - Pages: 3

Premium Essay

Unit2

...users must follow. The policy provides IT managers within R.I. with policies and guidelines concerning the acceptable use of R.I. technology equipment, e-mail, Internet connections, network resources, and information processing. The policies and restrictions defined in this document shall apply to all network infrastructures and any other hardware, software, and data transmission mechanisms. This policy must be adhered to by all R.I. employees, temporary workers and by vendors and contractors working with R.I. Scope- This policy document defines the common security requirements for all R.I. personnel and systems that create, maintain, store, access, process or transmit information. This policy also applies to information resources owned by others, such as vendors or contractors of R.I., in cases where R.I. has a legal obligation to protect resources while in R.I. possession. This policy covers all of R.I. network systems which are comprised of various hardware, software, communication equipment and other devices designed to assist the R.I. in the creation, storage, processing, and transmission of information. This definition includes equipment connected to any R.I. domain or VLAN, either hardwired or wirelessly, and includes all stand-alone equipment that is deployed by the R.I.at its office locations or at remote locations. Acceptable Use Policy The use of the company network, internet, and email services by Richmond Investments employees is...

Words: 598 - Pages: 3

Premium Essay

Wlison Brothers Communication Guidelines

...3. Write a document that Wilson Brothers specifically would use to establish guidelines and norms for the organization with respect to the use of email, and any other electronic communication medium, for internal and external communications. Make recommendations on what to do and what not to do. Explain the reasoning for your recommendations. (10 marks) WILSON BROTHERS LIMITED Guidelines for Best Practices in Electronic Communications This document will serve as a guideline on the use of electronic communications and addresses major issues such as; email and cell phone usage, best practices, how we define appropriate use of email and cell phones in the workplace, the effective use of email as a business tool for internal and external communication and how it is to be managed. This policy applies to all Wilson Brothers Limited Employees. Important Factors to Note:  Email is not guaranteed to be private.  Email is not an appropriate substitute for face-to-face in specific situations.  Email is not always sent and received instantly; messages can arrive several hours or days after they are sent. As a result, email is not an appropriate method for exchanging time-sensitive information.  Emails are considered to be company records. Therefore, they should be retained in the same way as Wilson Bros does customer/sales records or other forms of communication, such as letters, faxes Risks Associated to using Email include:  The privacy and security of email communication...

Words: 1777 - Pages: 8

Premium Essay

Btec Level 3 Unit 2 Task Sheet

...Unit 2: Business Resources Name of assessors: Mr Williams Mr Toher Deadline for completion: Statement of Context: At the core of every organization are the human, physical, technological and financial resources that enable it to function. In this unit you learn the importance organizations place on managing their resources efficiently in order to achieve their objectives. Understanding how these resources are managed is one of the keys to assessing how well an organization is performing. The first part of this unit explores the range of human, physical and technological resources for a selected organization. You will investigate the importance of managing these resources efficiently and the contribution that recruiting and retaining suitable staff can make to the organization’s performance. The importance of managing the physical and technological resources efficiently is also explored. The level of an organization’s performance can be seen in its financial statements and the second part of this unit will develop your knowledge and understanding of them and highlight the need for the monitoring and control of costs and budgets. Scenario 1 You have obtained work experience as an assistant in a Recruitment Agency. One of the Agencies more important clients, ASDA, are wishing to change its recruitment procedures and have asked the agency for some advice. You have been asked to assist ASDA by producing material for The Human Resource department which...

Words: 2266 - Pages: 10

Premium Essay

Student

...Software for his personal gain. Jack did this after the belief felt the company bypassed him for a promotion. However, A&A, I believe should have given Jack further consideration based on his job performance and accomplishments. Jack, as an accomplished stakeholder, has legitimate claims in the company’s successful use of its resources. A&A has a social responsibility to its employees to recognize employee accomplishment beyond a paycheck to minimize negative feelings towards to company to the point employee’s use company resources for personal gain as Jack did. Jack actions eventually “snared” in Carla, who herself became pressed in her ethical views and values towards the company. 2. Carla’s options were either report Jack or back off as she did. She should not have backed off! Carla right away realized Jack was stealing from the A&A. But Jack was successful to persuade her not to exercise her duty of diligence to report him. Carla’s use of company equipment was extremely minute compared to Jack copying software. Jack did what he did so that he may perform consulting work for personal gain not for the sake of the company. Jack would likely respond by reporting that Carla used the copier for personal use and made long distanced phone calls. That which Jack did could severely damage the company’s ability to continue being successful where Carla’s using the copying machine and making personal long distance telephone calls will not impact the company as greatly. Carla...

Words: 539 - Pages: 3

Premium Essay

Executive Summary of Htc

...Analysis & Five Force Model | Submitted by : Muhammad Saad Dasti Section B | 1. Prepare a Five Forces Analysis of the personal computer industry. (Think of your traditional Windows based PC.) How attractive is this industry? In order to properly identify and evaluate competitive position of personal computer , competitive analaysis model has been created to fully depict the position of display systems according to current scenario * The personal computer industry is somewhat vulnerable against the bargaining power of buyers.  In recent years customers have more and more alternative options to the personal computer.  Smartphone’s, tablet computers, and other handheld devices like IPods have most of the same capabilities as a personal computer.  And because of the availability, sleekness, and trendiness of these alternatives, they have become increasingly popular making personal computers more and more obsolete.  In order for the personal computer to compete with these newer alternative options, it must differentiate itself in order to regain market share. * Suppliers in the personal computer industry can be categorized into three groups, including hardware suppliers, software suppliers and service suppliers. The core of their products are generally standardized  and they compete by focusing on creating better, more advanced products at...

Words: 4272 - Pages: 18

Premium Essay

Social Networking in Business and Human Resources

...Social Networking in Business and Human Resources Rebecca Moriarty Troy University Introduction to Information Systems IS 3300 XTIB Dr. Rodger Morrison February 27, 2011 With the growth and explosion of popularity of the internet in the recent past, there has been a significant increase in the use of social networking sites. More than ever people and businesses are now using the internet with the purpose of having access to social networking sites. It is in these sites that they are able to set up networks with their friends, co-workers and family from all over the world and be able to share their thoughts and ideas on virtually everything spanning from personal issues to work and business advertising. Social networking sites have therefore become a subject that is drawing a lot of research from all over the academic world. In the recent past it has become difficult for people working in human resources departments to avoid the distractions that are being introduced with the rampant use of social networking sites. In the world today millions of people are now subscribed to the providers of the social networking services such as Facebook, MySpace, LinkedIn, and Friendster among many others. The main activities that go on in these sites are online discussions about the common happenings in life, discussions about various interests, organizing of various events, making friends, talking about politics or mere gossip sharing activities (Jackson, 2003)...

Words: 2300 - Pages: 10

Premium Essay

Ethics

...Title Our Core Values in Action Alternate Letter Brochure Title Alternate Letter Brochure Title Our Code of Business Ethics reinforces our core values and drives our culture of compliance, ethical decision making and accountability. Our core values shape the culture and define the character of our company. They guide how we behave and make decisions. Accenture will not tolerate retaliation against any employee who raises an issue or uses its Business Ethics Line (or any other appropriate channel) to report an ethical or legal concern. Employees who come forward with concerns play an important role in maintaining our ethical workplace and high-performance business. Contents Page 3 Page 6 Page 8 Page 11 Page 14 Page 17 Page 20 Page 25 Page 28 Page 29 Page 30 Page 31 How to Use the Code of Business Ethics: Our Core Values in Action Our Code at a Glance Client Value Creation One Global Network Respect for the Individual Best People Integrity Stewardship The Five Cs A Model for Making Ethical Decisions Responsibilities Index of Key Terms Visit the Accenture Business Ethics Line Visit the Code of Business Ethics website 2 | Accenture Code of Business Ethics How to Use the Code of Business Ethics: Our Core Values in Action Our Code is built on a foundation of our core values, illuminated by "action statements." Action statements describe the behaviors we seek and “key ideas” provide concise examples of how these action statements apply to everyday work at Accenture....

Words: 15252 - Pages: 62