Premium Essay

Monitoring Employees on Networks Checkpoint

In: Computers and Technology

Submitted By belleaz
Words 318
Pages 2
July 20, 2012

Monitoring Employees on Networks CheckPoint

E-mail has several benefits to an organization such as faster; more convenient and lower costs compared other communications. Organizations may want to limit how an employee uses e-mail during work hours to avoid loss of productivity when an employee is attending to personal business instead of working this cost is passed on to the customer. Another reason to monitor an employee’s usage of e-mail could be that an employer is legally liable for anything an employee may send or do during work hours using the company’s equipment. An e-mail’s path once it leaves an organization could be through a software programming for monitoring if one is in place then to its intended location within seconds.

The effect of instant messaging on organizational network can be beneficial allowing clients and employees to instantly communicate. Some benefits of using instant messaging in an organization are fast communication to answer any questions, provide useful information and cut out traveling and cost in holding a meeting. Some drawbacks of using instant messaging in an organization could be employee could misuse the services such as personal business and loss of productivity.

Some benefits of web page and search engine use in an organization could be researching information for projects, availability and access to potential clients. With benefits come drawbacks such as stated before misuse by employees which would cost the organization. Another drawback could be confidential information could be leaked.

Managers should monitor employee’s e-mail and Internet usage while they are at work because employees are expected to perform certain duties and tasks using the Internet or e-mail for personal use takes time away from these expectations and tasks. Legally companies have the right to monitor...

Similar Documents

Premium Essay

It 205 Monitoring Employees on Networks Checkpoint

...Monitoring Employees on Networks CheckPoint 1 Monitoring Employees on Networks CheckPoint Kimberly Daugherty IT/ 205 August 17, 2012. Cristina Oliver 2 Email usage in an organization enables messages to be sent from computer to computer. E-mail allows a person to share files and documents with another person through a computer. An e-mail can be written and sent at any time and from anywhere. Organizations sometimes limit their employees from using e-mail during working time. An organization may fear that an employee will send confidential information, offensive material, or perform an illegal activity by e-mail and to stop these kind of actions the company will ban all employees from sending e-mails from company computers. When such e-mails are sent from an organization the results could mean bad publicity or lawsuits...

Words: 370 - Pages: 2

Premium Essay

Monitoring Employees on Networks

...Checkpoint - Monitoring Employees on Networks Jorge Hernandez IT/205 March 14, 2014 DEBBI MCCLOUD, MSCIS Checkpoint - Monitoring Employees on Networks Answer the following questions in 200 to 300 words each:  How does e-mail benefit an organization? Why might an organization want to limit how an employee uses e-mail during work hours? What is an e-mail’s path once it leaves an organization?  E-mail can benefit an organization by offering quick, efficient and relatively inexpensive means of communication, both internally and externally, for an organization. It also allows paperless communication and via the use the Global Access List (GAL) military directory, quick access to all other employees/service members. Since email first emerged as a business tool, the military along with many companies have increased productivity, decreased costs and found new marketing venues. It has effectively decrease the layers of management because everyone in a company can email the company president with ideas, suggestions or comments. In DISA for example, our boss has what we like to call “an open door policy” which can be utilized to provide feedback to the boss directly. In DISA, this is useful because management can obtain opinions from the front lines, which helps stay in touch with the day-to-day operations and field experiences the employees. Suggestions and ideas received from those at lower help spur innovation and create new revenue streams for the business. Email......

Words: 1236 - Pages: 5

Premium Essay

Aircraft Solutions

...Aircraft Solutions: Security Assessment and Recommendations Phase I and Phase II Table of Contents Executive Summary 3 Company Overview 3 Security Vulnerabilities 4 A Software Data Loss/Data Leak 4 A Hardware Firewall 5 Recommended Solutions 7 A Software Example Solution 7 A Hardware Example Solution 8 Impact on Business Processes 9 Summary 10 Appendix 11 References 17 Executive Summary Aircraft Solutions is aircraft Design Company that allows internal and external users to access its system. As a result of this, the company has made itself vulnerability to certain threats. This paper identifies two vulnerabilities. One is the threat of data loss or data leak. The other is intrusion by way of the internet firewall. Based on the known vulnerabilities, it was recommended that the Check Point Software Blade application is used to prevent the data loss and the Check Point Power-1 appliance be used to address the firewall vulnerability. Company Overview Aircraft Solutions (AS) design and fabricate component products and services for companies in the electronics, commercial defense, and aerospace industry. The mission of AS is to provide the customer success through machined products and related services, and to meet cost, quality, and scheduled requirements. Aircraft Solution uses Business Process Management (BPM) to handle end to end processes that span multiple systems and organizations. BPM system is designed to connect...

Words: 2691 - Pages: 11

Premium Essay


...14042024David Teo Liang ChyeBM 0245INFORMATION mANAGEMENT | ByMr Shireesh | RFID | | | | Words Count: 2,180 Tables of Content Page Tables of Content 1 Introduction 2 What is Radio Frequency Identification (RFID)? 2 - 3 Purpose of RFID 3 - 6 Benefits of RFID 6 Disadvantages of RFID 6 Points of View 7 Conclusion 8 References 9 Introduction Imagine a technology that could slice the time it takes a retailer to measure inventory, one that could provide accurate information about a single tem as it moves from manufacturing through a store and then on to post-sales support. Imagine one that could finally fully automate checkout, freeing store personnel to provide increased...

Words: 2473 - Pages: 10

Free Essay

Teradata Introduction

...Outline 02/17/05 PURPOSE Coffing Data Warehousing has been providing quality Teradata education for over a decade. We offer customized courses to maximize the effectiveness of each class. The purpose of this proposal is to build a lasting relationship with your company. To this end, we have combined our comprehensive Teradata education services in a unique package that we feel best suits the diverse needs of your company while offering our high quality product at competitive pricing. Coffing Data Warehousing is excited to offer you, our preferred partner, an innovative new way to look at training at the CoffingDW Teradata University (CDW-TU). This approach provides the ability to maximize learning potential. Our goal is to make your employees the most educated data warehouse experts in the industry. CURRICULUM: Coffing Data Warehousing will provide an experienced and highly qualified resource to deliver this customized educational seminar on the following topic(s): Teradata Education • Teradata Database Administration COURSE DESCRIPTION COURSE PREREQUISITES COURSE Duration/Format COURSE AUDIENCE OBJECTIVES There is no...

Words: 1512 - Pages: 7

Premium Essay

Project: Access Control Proposal

...5 IV. Phase II: Policies and procedures for protecting the IT assets 6 1) General Security Practices for VPN Remote Access 6 2. Protecting Cyber Assets: Secure Interactive Remote Access Concepts 7 2. How Employee Accesses the Corporate Network 9 3. How external Partners (Vendor) Access the Corporate Network 9 V. Conclusion 13 I. Introduction Access control mechanisms operate at a number of levels in a system, from applications down through the operating system to the hardware. Higher-level mechanisms can be more expressive, but also tend to be more vulnerable to attack, for a variety of reasons ranging from intrinsic complexity to implementer skill levels. Most attacks involve the opportunistic exploitation of bugs; and software that is very large, very widely used, or both (as with operating systems) is particularly likely to have security bugs found and publicized. Operating systems are also vulnerable to environmental changes that undermine the assumptions used in their design. The main function of access control in computer operating systems is to limit the damage that can be done by particular groups, users, and programs whether through error or malice. This project will be conducted in two main checkpoints: * Phase I: The first step in this project is to analyze risk and develop a mitigation plan to identify which assets are more critical. Determining what systems rely on each other...

Words: 2458 - Pages: 10

Premium Essay

Research - Ports

...operational process are the obligation of TSA. The Federal Security Director (FSD) is the designated TSA official that approves the required Airport Security Program (ASP) document, the document identifies how the airport will meet security requirements. The FSD and local FAA Airports Division officials should be consulted during all phases of the project. Airport operators must integrate a Safety Management System process into their overall plan in accordance with FAA rules. Airports must establish hazard reporting systems, a risk assessment process, and a risk mitigation and assurance process with the participation of airport management. The best way to implement security in a facility is through advance planning and continuous monitoring throughout the project. Selecting, constructing, or modifying a facility without considering security for the general public, the facility, passengers, and airport and air carrier personnel can result in costly modifications. All physical security upgrades should be based on applicable Federal, State, and local laws, regulations, and policies to ensure the protection of all persons and assets (including information systems and data). At a minimum,a physical security approach should include: 1. A vulnerability assessment, including a check of regulatory compliance (refer to Appendix A) to evaluate the existing security at an operational airport or a comprehensive security plan evaluating the potential vulnerabilities at a new......

Words: 6328 - Pages: 26

Free Essay

Communication and Management Crisis

...Communication to Manage Crisis HCS/320 Communication to Manage Crisis Those who work in hospitals have to face crisis. It may happen in the emergency room or even in the manager’s office. Hospital employees need to be ready for such events. Coombs 1999 states that no organization can guarantee that they will not have any crisis. According to Reynolds 2006, crisis may occur internally or externally for the organization but when it occurs people’s lives may be at stake and at the same time the reputation of the company may get jeopardized. During crisis communication as well as improper communication can play a great role. For lack of communication right things may not be done and crisis may occur. Even a rumor may spread and crisis may happen. Communication methods to be adopted during a crisis have been talked about a lot but defining crisis is not so easy. According to Heath 2006, before defining the crisis, the risks need to be identified. According to him a risk may have both negative and positive influences of different levels. If anything happens to people, communication with them can tell us a lot and it can be understood whether crisis can be overcome. Whether reputation can be left intact needs to be understood. I am acting as the director of the Regional Emergency Office and I got reports about the public water that had been infected with something fatal. The pollutant is a biological element that has life threatening effect. We know that biological agents...

Words: 1677 - Pages: 7

Premium Essay

Employee Surveillance and Testing

...their employees are doing a good job, but employees don't want their every sneeze or trip to the water cooler logged. That's the essential conflict of workplace monitoring. New technologies make it possible for employers to monitor many aspects of their employees' jobs, especially on telephones, computer terminals, through electronic and voice mail, and when employees are using the Internet. Such monitoring is virtually unregulated. Therefore, unless company policy specifically states otherwise (and even this is not assured), your employer may listen, watch and read most of your workplace communications. One company offers technology that claims to provide insight into individual employee behavior based on the trail of "digital footprints" created each day in the workplace. This behavioral modeling technology can piece together all of these electronic records to provide behavior patterns that employers may utilize to evaluate employee performance and conduct. For example, it might look for word patterns, changes in language or style, and communication patterns between individuals. Recent surveys have found that a majority of employers monitor their employees. They are motivated by concern over litigation and the increasing role that electronic evidence plays in lawsuits and government agency investigations (Ross, 1988) (Trochim, 2009). A 2007 survey by the American Management Association and the e-Policy Institute found that two-thirds of employers monitor their employees'......

Words: 3354 - Pages: 14

Premium Essay

Modifying Administrative System

...Contents Before you begin vii Topic 1: Plan for the new or modified administrative system 1 1A Identify the requirements of the administrative system 2 1B Obtain quotations from the suppliers/developers of systems 10 1C Select a system supplier or developer 14 Summary17 Learning checkpoint 1: Plan for the new or modified administrative system 18 Topic 2: Implement the new or modified administrative system 23 2A Identify and develop implementation strategies 24 2B Encourage staff to participate in the implementation process 29 2C Implement the system 32 2D Define and communicate procedures for using the system 35 2E Provide training and support on the use of the system 38 2F Deal with contingencies to ensure minimal impact on users 42 Summary46 Learning checkpoint 2 : Implement the new or modified administrative system 47 Topic 3: Monitor the administrative system 51 3A Monitor the system’s use, security and output 52 3B Modify the system to meet changing needs 57 3C Identify further modifications and notify users 61 3D Monitor staff training needs  63 Summary65 Learning checkpoint 3: Monitor the administrative system 66 Final assessment 69 Assessment information and scope Are you ready for assessment? Final assessment overview Assessment plan Final assessment tasks Record of outcome 70 71 72 73 74 101 Unit release 1 (Aspire Version 1.1) © Aspire......

Words: 5743 - Pages: 23

Premium Essay

Maxis Best Practice the firm’s community. A best company usually recognize in aspect of having the best practices in its organization. A best practice is a method or technique that has consistently shown results better than others and that is used as a benchmark. It is the process of supporting employees and helps them succeed. In addition, the employee best practice is to make the people feel good about their employers. For better understanding about the company best practice and how it leads to be a market leader in the industry, we have chosen Maxis Berhad, a well established local communications service provider in Malaysia. The objective of the study is to recognize the importance of recruiting, training and retaining good employee company sustainability as well as how the company leads to be a market leader in the industry. In the end, we would propose other new and improvement of best employee practices to our new organization. Company Background Maxis Berhad is a local communications service provider in Malaysia for both individual and business customers. In 1993, the company that was formerly known as Maxis Mobile Sdn.Bhd has obtained license to run a nationwide GSM 900 mobile network, a local fixed network and an international gateway. Then in 1999, the company first starts to introduce the popular prepaid brand “Hotlink” after they successfully provide mobile telecommunication services to corporate company and businessman. Today, Maxis serve their 13 Million customers an......

Words: 2570 - Pages: 11

Premium Essay

Inicio Elio Engineering

...customer. SCM systems allow a convenient way to manage the various steps involved in this process, covering the performance of traditional ERP and adding new features. Identify supply chain segments that supports ERP (be specific). ERP systems usually begin with the creation of an order and shipment, including transport, delivery and billing process. "It's a very direct chain logistics to the sales stage, the functionality might include some aspects of planning and demand planning. You can track customer demand and generate a forecast. Based on these data is possible to optimize the supply chain delivery. " (Kiske) Typical modules of a management suite of supply chain for an ERP system include: • Demand forecasting and planning. • Network planning supply chain to meet demand with supply. • Production planning that reflects the demand. • Detailed program that directs the production to demand. • Event Management to collect and analyze distributed data sources • Alert monitors...

Words: 1968 - Pages: 8

Premium Essay


...Week 5– Assignment 2 18 March 2014 Tim Williams Professor Afzal South University Network Design Blue Print: (Vehicle Vinyl Wrapping Design Company). The company designs vehicle graphics for commercial and private vehicles and buildings. is headquarters is located in Miami, Florida (75 employees to include corporate management). Telecommunication Network Design needs to accommodate the headquarters and 5 satellite cities with at least 35 employees to include general manager in each store. Store locations are in Savannah Georgia, Fayetteville North Carolina, Richmond Virginia, Jacksonville Florida, and Dover Delaware. The company needs to have a telecommunication system that is efficient and cut down on business trips between all the stores to include the headquarters. Video conferencing, VoiP, push to talk cell phones for sales and design, computer network to protect design ideas when they are being transferred to other stores or when accessed on the server. * Does the client already have an established network and do they want to improve on it? Update vs. full network installation. * Does the client have a network? * What is the client’s budget? * What are the clients plans for growth? (Scalability of network to accommodate the rise in business 5yr vs. 10yr. * Security Considerations. * Used, non-used/free and usable IP-networks, VLANs, equipment and software versions and generally what each component or......

Words: 5175 - Pages: 21

Free Essay

B2B Organisation interact with the company’s customers anytime and anywhere without having to meet up personally. 2.0 FIVE ADVANTEGES OG HAVING BUSINESS TO BUSINESS (B2B) 1. Removes location and availability restrictions The internet reaches across the world and spans all time zones. That means that when businesses take their operations online, they have the same capabilities. With a physical store, customers are limited by how close the store is and its hours of operation. Ebusinesses, on the other hand, are accessible from any area with internet access and open 24 hours a day. Additionally, with mcommerce on the rise, ebusiness has yet another advantage: being accessible to anyone with a mobile device. Customers are only limited by their mobile network coverage, which goes practically...

Words: 3108 - Pages: 13

Premium Essay

Ais It Governance

...“Security and Access Controls – A Conceptual Overview”). Operating Systems Controls • What are the four operating systems control categories? (just list) • What does authentication do? (one sentence) • What are three types of log-on procedures? • What does authorization do? (one sentence) • What is an access token? (one sentence) • What is an access control list? (one sentence) o What is the relation between access tokens and access control lists? (one or two sentences) • What are the three audit procedures for antivirus software (just list)? • What are the five types of antivirus software? • What are antivirus scanners looking for? Network Controls • What are three network threat and what network security measures can be used to address these threats? (list pairs of threat and security measures) • What are firewalls? (two or three sentences) • What are network level firewalls and application level firewalls (two sentences), and what is the difference between them (one or two sentences)? o How does a dual-homed firewall work (describe this by explaining what each of the three firewall components do)? • What are intrusion detection systems and intrusion prevention systems (two sentences), what is the difference between them (one or two sentences) o which one provides the best protection against denial-of-service attacks (name one)? o What is a DOS Attack? How does a SYN Flood Attack work? • What does data encryption do with clear text messages? (one sentence) • What is data...

Words: 2299 - Pages: 10