THIS IS HOW TIME
WASTING LOOKS LIKE!
CASE STUDY ON:
Monitoring Employees on Networks:
Unethical or Good Business?
PRESENTED TO:
Mr. A.T. M. Jakaria Khan
Lecturer, Institute of Business Administration
University of Dhaka
PRESENTED BY:
Md. Atiqul Basher, ID: 31, Batch – MBA -52D
Raisa Tasneem Zaman, ID: 32, Batch- MBA- 52D
CASE SUMMARY
•The Internet and email are
important tools
•Employees abuse the Internet and
e-mail during work hours
In a fast paced,
competitive
business world,
some employee:
QUESTION 1:
Should manager monitor employee e-mail and
Internet usage? Why or why not?
WHY MANAGERS
SHOULD
MONITOR
EMPLOYEES?
1
OUT OF 3 US COMPANIES HIRE
INDIVIDUALS TO MONITOR
EMPLOYEES
- Proof point plus study, 2010
UNRESTRICTED USAGE CAUSES CLOG TO
NETWORK
(COMPANIES LIKE PNG PAID A
HUGE PRICE FOR THIS!)
14%
EMPLOYEES ADMITTED THAT THEY SENT
COMPANY
SECRET AND POTENTIALLY
EMBARASSING MAILS TO OUTSIDERS
$6,50,000
AVERAGE LITIGATION COST OF SEXUAL AND
ANY OTHER HARRASSMENT CAUSED BY
MISUSE OF INTERNET AT WORK
NOT ALLOWED ALLOWED
According to the law, US companies
are…
QUESTION 2:
Describe an effective e-mail
and Web use policy for
a company.
Step 1:
Lay out specific
procedures
Step 2:
Adapt
spectorsoft
Step 3:
Adopt Zero
tolerance
Step 4:
Introduce
Written policy
Step 5:
Introduce IS
department
Step 6:
Specific
personal usage
time
STEPS TO FOLLOW
Lay out specific procedures and
accountabilities:
Identify which users and organizational
units can share information, where
information can be distributed, and
who is responsible for updating and
maintaining the information.
Spector Soft Corporation:
Record all Web site employee visit, time spend at
each site and all e-mail sent.
E-mail monitoring software flags certain type of
messages and keywords within messages for further
investigation.
Zero tolerance policy:
Use of the Internet/E-mail to discuss or distribute information
related to the company’s trade secrets, policies or practices.
Monitoring software will be employed to scan outgoing e-mail for
company sensitive terminology and related subject matter
Use of the Internet causing disruption to the facility’s services
including reduction of bandwidth available for company business.
Transmission of harassing, discriminatory or otherwise
objectionable e-mail or files (as determined by the recipient) is
strictly prohibited.
The Internet must not be used to access, create, transmit, print or
download material that is derogatory, insulting, obscene, or
offensive, such as slurs, epithets, or anything that may be
construed as harassment or disparagement based on race, color or
religious. Monitoring software will be employed to block the
availability of these types of sites
Written policy must include
explicit ground rule:
By position or level
Under what circumstance employee can use
company facilities for e-mail, blogging, or Web
surfing.
Information Services
Department:
To monitor employees to provide
weekly reports detailing Internet
and e-mail usage during normal
business hours per employee.
Specified personal usage
time
Personal e-mail or Internet surfing
is permitted ONLY during the
following periods: before stated
company business hours, after
stated company business hours, or
an employee’s lunch hour.
A good policy will detail exactly
what type of activity is acceptable
and what is not allowed.
QUESTION: 3
Should managers inform employees that
their Web behavior is being monitored? Or
should mangers monitor secretly? Why or
why not?
Yes
Should managers inform employees that their Web behavior
is being monitored?
Good Business Practice:
•An automatic message
• Warns all employees of the written
policies
• Reminds employees about monitoring
software
Letting employees know that their computers are monitored
can urge them to avoid using the Internet for personal
purposes.
More productive work hours
Improved efficiency
IN CONCLUSION
EMPLOYEE SURVEILANCE IS AN ACCEPTED PRACTICE, AT AND
DURING WORKING HOUR ONLY.
HOWEVER IT MUST BE TAILORED IN SUCH A MANNER SO
THAT WORK DOES NOT GET HAMPERED.
VIDEO PRESENTATION
THANK YOU !

Monitoring employees at office - Good or bad practice?

  • 1.
    THIS IS HOWTIME WASTING LOOKS LIKE!
  • 2.
    CASE STUDY ON: MonitoringEmployees on Networks: Unethical or Good Business?
  • 3.
    PRESENTED TO: Mr. A.T.M. Jakaria Khan Lecturer, Institute of Business Administration University of Dhaka PRESENTED BY: Md. Atiqul Basher, ID: 31, Batch – MBA -52D Raisa Tasneem Zaman, ID: 32, Batch- MBA- 52D
  • 4.
  • 5.
    •The Internet andemail are important tools •Employees abuse the Internet and e-mail during work hours
  • 6.
    In a fastpaced, competitive business world, some employee:
  • 7.
    QUESTION 1: Should managermonitor employee e-mail and Internet usage? Why or why not?
  • 8.
  • 9.
    1 OUT OF 3US COMPANIES HIRE INDIVIDUALS TO MONITOR EMPLOYEES - Proof point plus study, 2010
  • 10.
    UNRESTRICTED USAGE CAUSESCLOG TO NETWORK (COMPANIES LIKE PNG PAID A HUGE PRICE FOR THIS!)
  • 11.
    14% EMPLOYEES ADMITTED THATTHEY SENT COMPANY SECRET AND POTENTIALLY EMBARASSING MAILS TO OUTSIDERS
  • 12.
    $6,50,000 AVERAGE LITIGATION COSTOF SEXUAL AND ANY OTHER HARRASSMENT CAUSED BY MISUSE OF INTERNET AT WORK
  • 13.
    NOT ALLOWED ALLOWED Accordingto the law, US companies are…
  • 14.
    QUESTION 2: Describe aneffective e-mail and Web use policy for a company.
  • 15.
    Step 1: Lay outspecific procedures Step 2: Adapt spectorsoft Step 3: Adopt Zero tolerance Step 4: Introduce Written policy Step 5: Introduce IS department Step 6: Specific personal usage time STEPS TO FOLLOW
  • 16.
    Lay out specificprocedures and accountabilities: Identify which users and organizational units can share information, where information can be distributed, and who is responsible for updating and maintaining the information.
  • 17.
    Spector Soft Corporation: Recordall Web site employee visit, time spend at each site and all e-mail sent. E-mail monitoring software flags certain type of messages and keywords within messages for further investigation.
  • 18.
    Zero tolerance policy: Useof the Internet/E-mail to discuss or distribute information related to the company’s trade secrets, policies or practices. Monitoring software will be employed to scan outgoing e-mail for company sensitive terminology and related subject matter Use of the Internet causing disruption to the facility’s services including reduction of bandwidth available for company business. Transmission of harassing, discriminatory or otherwise objectionable e-mail or files (as determined by the recipient) is strictly prohibited. The Internet must not be used to access, create, transmit, print or download material that is derogatory, insulting, obscene, or offensive, such as slurs, epithets, or anything that may be construed as harassment or disparagement based on race, color or religious. Monitoring software will be employed to block the availability of these types of sites
  • 19.
    Written policy mustinclude explicit ground rule: By position or level Under what circumstance employee can use company facilities for e-mail, blogging, or Web surfing.
  • 20.
    Information Services Department: To monitoremployees to provide weekly reports detailing Internet and e-mail usage during normal business hours per employee.
  • 21.
    Specified personal usage time Personale-mail or Internet surfing is permitted ONLY during the following periods: before stated company business hours, after stated company business hours, or an employee’s lunch hour.
  • 22.
    A good policywill detail exactly what type of activity is acceptable and what is not allowed.
  • 23.
    QUESTION: 3 Should managersinform employees that their Web behavior is being monitored? Or should mangers monitor secretly? Why or why not?
  • 24.
    Yes Should managers informemployees that their Web behavior is being monitored?
  • 25.
    Good Business Practice: •Anautomatic message • Warns all employees of the written policies • Reminds employees about monitoring software
  • 26.
    Letting employees knowthat their computers are monitored can urge them to avoid using the Internet for personal purposes. More productive work hours Improved efficiency
  • 27.
    IN CONCLUSION EMPLOYEE SURVEILANCEIS AN ACCEPTED PRACTICE, AT AND DURING WORKING HOUR ONLY. HOWEVER IT MUST BE TAILORED IN SUCH A MANNER SO THAT WORK DOES NOT GET HAMPERED.
  • 28.
  • 29.