Monitoring Employees On Networks

Page 10 of 50 - About 500 Essays
  • Premium Essay

    Electronic Surveillance of Employees

    their investments, and increase employees’ productivity. Because of this, employees cannot reasonably expect to have privacy within the workplace. Although employees would like privacy in their office, on their computer, and during phone conversations, there is no law legally granting privacy to employees in the workplace. The only place an employee could have a reasonable expectation of privacy is in the restroom. Also, since the employers need to know all employees are providing a proper job, that

    Words: 563 - Pages: 3

  • Premium Essay

    Southern Management Corporation Case Stuy

    these practices, both theoretical and practical knowledge is required. To this end, Southern Management Corporations managerial practices were studied and analyzed to understand how the managements work practices affected its residents and also its employees. The outcome of our study has identified

    Words: 2942 - Pages: 12

  • Premium Essay

    Privacy Laws

    Privacy Laws and Policies Debate Many employees embark on their employers violating their privacy. Employers are becoming more aggressive on how they screen new potential hires as well as their current employees. Normally employers will conduct criminal background checks, drug testing and sometimes a credit check. The question I am asking is how far is too far? Employees need to become more aware of this situation. Employee privacy laws are limited, which makes it easier for employers to invade

    Words: 410 - Pages: 2

  • Free Essay

    Access Control Systems

    were examined to determine if a network based system would be more reliable and beneficial. Two major systems were determined to be very beneficial to the company. In contrast, the systems would consume a great deal of resources in order to be put into full working order at all sites worldwide. Together these findings suggest that using a network based system can ultimately serve the company better and create a more secure environment for the research and the employees. Keywords: Access control

    Words: 2919 - Pages: 12

  • Premium Essay

    Employee Monitoring Controversy

    The idea of employee monitoring has become increasingly controversial throughout the past few years. With the introduction of social media, the widespread use of global positioning satellite (GPS) technology, and cameras in many public locations, it has become ever more difficult to keep our lives private. It is the need for privacy that has raised tensions between employers and employees. With the rise of employee monitoring many employees feel that employers target them, or even discipline the

    Words: 714 - Pages: 3

  • Free Essay

    Nt2580 Research Project Part 2

    these into a public network presence with security in mind. The Digital revolution of the 21st Century has not been achieved without its consequences. Real time business requirements and economic drivers have forced rapid changes to the methods used to conduct business-to-business and business to client communication. The Internet has now become a convenient and economic deployment medium for global business. Richman Investments Computer users’ policy: Although employees are given PCs so they

    Words: 1544 - Pages: 7

  • Premium Essay

    Information Security for Managers

    security of person and an enterprise. Security can be understood as a condition to protect against unauthorized access. In terms of IT, security can be categorized into application security, computing security, data security, information security, and network security. Source: (Whitman & Mattord 2007, p.5) Even though all of these security fields need to be monitored in an enterprise, for instance in this document we are concerned only with information security. Information security is responsible

    Words: 2401 - Pages: 10

  • Premium Essay

    Monitoring Employees

    Monitoring Employees on Networks William C. Bridges IT/205 February 28, 2014 Professor Song Tang   The e-mail process benefits organizations by allowing for inter-company communications faster and more direct. . Email benefits an organization in speed of communication between its employees as well as management and also the decreased cost of this method of instant communication. Using e-mail lets employees communicate with each other and management immediately for purposes of meetings, lunch’s

    Words: 626 - Pages: 3

  • Premium Essay

    Inventory of Assets

    serious security concerns involved. According to Mitnick and Simon, “Even when security is being well handled within a company, there is too often a tendency to overlook the corporate network, leaving an opening that attacker(s) can take advantage of. Laptops and home computers that connect to the internal network must be secure; otherwise, the employee’s computer system may be the weak link that’s exploited” (Mitnick & Simon, 2006). It is important for organizations to have a well-planned and

    Words: 2212 - Pages: 9

  • Premium Essay

    Acceptable Use Policy

    the acceptable use of Cooley’s assets regarding Internet and email access and the actions that are prohibited. Cooley Investment’s computers, computer files, e-mail system, Internet access and any software furnished to employees are company property and subject to monitoring and unannounced review. They are to be used for company business only, and not for excessive personal use to communicate with friends or family or to access the Internet for personal purposes. While use of the computer,

    Words: 805 - Pages: 4

Page   1 7 8 9 10 11 12 13 14 50