Top Special Offer! Check discount
Get 13% off your first order - useTopStart13discount code now!
The use of personal websites by employees cannot be prohibited. Their favored websites cannot be stopped. To control how much time employees spend online while engaging in personal activities, the corporation may develop some internet usage guidelines. The rules will not only maximize the amount of time spent on tasks but also efficiently manage employees’ time. It’s also critical to remember that these rules are intended to prevent employees from using the internet in ways that are inappropriate or illegal and could harm their performance in their jobs. All employees, including volunteers, interns, contractors, and anyone else who uses our internet services to browse, are subject to these policies.The policy will require development of a third party user that will enable the administrator to monitor the activities of each employee using the internet service. The third party can be software designed to be installed to every computer that is connected to internet services of the company. The policy will itself be equipped with the following guidelines
Preventing download of movies and obscene material. This will involve regulation and suppression of immoral and offensive materials that is considered obsolete. The websites offering movies for downloads should therefore be blocked from access using company computer devices. The obscene materials that are blocked can pornography sites and those that offer nude photos.
Prohibit sending of confidential company’s information. This can be done by making sure that each employee has a corporate email for communication purposes. Moreover, the company files in computer devices should be encrypted. This can done with end user passwords that can be accessed by limited persons in the company. No communication should be allowed from private emails.
The third party user (software installed) should also end incognito websites and communicate to the administrator of such malicious activity. The administrator will be able to identify the employee using the device and penalize as appropriate.
The software in place will only allow employees of the company to browse only during working hours. That is from 8 am to 5 pm. However, they will only be allowed to access work related matters online during that period.
The third user party will record the history of each employee’s activity undertaken on internet services. The administrator through encryption password that will only allow the manager to see such activities will only access the history. Failure to protect this history, employees can visit other websites not beneficial to the company and later erase such history. This will be the monitoring system, as it will keep record of each employee’s activities in the computer assigned to him/her.
The penalty of ignoring these guidelines on the proposed policy shall therefore in monetary terms. Violation to this policy shall only be through huge fine of 100$ and above depending on the extent of violation. When this policy is affected, it will show significant impact on resourceful use of company’s internet services.
References
Bruce S. (2006). “The Eternal Value of Privacy ”. Wired.com. Retrieved 2016-07-19
Graepel, T. (2013). “Private traits and attributes are predictable from digital records of human behavior” (PDF)
Hire one of our experts to create a completely original paper even in 3 hours!