SlideShare a Scribd company logo
1 of 5
MONITORING EMPLOYEES ON NETWORKS:
UNETHICAL OR GOOD BUSINESS
By,
SINU SAJI
AVINASH M DAS
Summary
• Internet has become extremely valuable business tool, but it’s also a huge
distraction for workers on the job. Employees are wasting valuable
business time surfing inappropriate web site.
• Many companies began monitoring their employee’s internet usage
without their knowledge. They cam monitor online search file downloads
and uploads etc. Although it is legal for U.S companies to monitor their
employees at work is such monitoring unethical or is it good business?
• From the business point of view it leads to loss in revenue when
employees use the company resources for personal usage.
• Most organizations have placed bans on the private usage of internet
because any non-legal activity or offensive material sent or received using
firm network can be proven adversely for the firm.
• Leak of confidential information or other secrets about the company can
occur due to inappropriate use of internet.
• Some companies ban all personal activities on corporate networks.
Others ban access to specific websites or social sites closely monitor e-
mails or set time limit on internet. For example P&G blocks Netflix and ask
employees limit in usage of Pandora but still allow access to social
networking because employees use them for social campaigns.
• Many numbers of firms have fired employees who have stepped out of
bounds. Most of them was because the e-mails contained sensitive,
confidential or embarrassing information.
• many companies believe that companies should write corporate policies in
employee e-mail, social media and web use which include explicit ground
rules that state, by position or level, under what circumstances can
employees use company facilities like e-mail, blogging or web surfing.
• They should also inform employees whether these activities are
monitored and explain why. The rules should be tailored to specific
business needs and organizational cultures.
• Should managers monitor employee email and internet usage?
Yes managers should monitor employee email and internet usage,
because a vital part of an organisation the employees have to perform
consistently to ensure the success of the organisation. so it is
important that the employees should not waste much time on non
productive activities and also they also has sensitive information about
the company so the managers need to make sure that they dint get
stolen by others so the managers need to monitor his employees.
• Describe email and web usage policy for a company
The email and web usage policy of the company should be written
according to the type of job and the level of employees. The
employees should not be allowed to browse in entertainment sites
such as YouTube, Netflix etc. as they may lose a lot of time
unknowingly in that. The amount of time the worker spends on non
productive browsing should also be regulated his completion of work
should be evaluated and effective actions should be taken if he is not
meeting his mark. The supervision duty should be given to the
immediate managers.

More Related Content

What's hot

MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationSukanya Ben
 
Create your twitter account
Create your twitter accountCreate your twitter account
Create your twitter accountJo Shaer
 
Amazon vs flipkart /COMPARISON BETWEEN
Amazon vs flipkart  /COMPARISON BETWEEN Amazon vs flipkart  /COMPARISON BETWEEN
Amazon vs flipkart /COMPARISON BETWEEN Shivam MısHrą
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsSukanya Ben
 
Information system in business assignment
Information system in business assignmentInformation system in business assignment
Information system in business assignmentACCA Global
 
Proton Holdings Strategic Audit (Excerpt of Group Assignment)
Proton Holdings Strategic Audit (Excerpt of Group Assignment)Proton Holdings Strategic Audit (Excerpt of Group Assignment)
Proton Holdings Strategic Audit (Excerpt of Group Assignment)Farah Lee -
 
Management Information System : E-Commerce
Management Information System : E-Commerce Management Information System : E-Commerce
Management Information System : E-Commerce Aung Ko Thet
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyProf. Othman Alsalloum
 
MIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingMIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingSukanya Ben
 
Vision & Mission of Coke , PWC , Flipkart , Caterpillar
Vision & Mission of Coke , PWC , Flipkart , Caterpillar Vision & Mission of Coke , PWC , Flipkart , Caterpillar
Vision & Mission of Coke , PWC , Flipkart , Caterpillar Saugata Palit
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesSukanya Ben
 
Google vs. Microsoft Strategy Business Models
Google vs. Microsoft Strategy Business ModelsGoogle vs. Microsoft Strategy Business Models
Google vs. Microsoft Strategy Business ModelsMita Angela M. Dimalanta
 
Flipkart Strategy Analysis and Recommendation
Flipkart Strategy Analysis and RecommendationFlipkart Strategy Analysis and Recommendation
Flipkart Strategy Analysis and RecommendationRahul Jain
 

What's hot (20)

MIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and CollaborationMIS-CH02: Global e-Business and Collaboration
MIS-CH02: Global e-Business and Collaboration
 
Create your twitter account
Create your twitter accountCreate your twitter account
Create your twitter account
 
Amazon vs flipkart /COMPARISON BETWEEN
Amazon vs flipkart  /COMPARISON BETWEEN Amazon vs flipkart  /COMPARISON BETWEEN
Amazon vs flipkart /COMPARISON BETWEEN
 
Role of it in finance
Role of it in financeRole of it in finance
Role of it in finance
 
MIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation SystemsMIS-CH04: Ethical and Social Issues in INformation Systems
MIS-CH04: Ethical and Social Issues in INformation Systems
 
Information system in business assignment
Information system in business assignmentInformation system in business assignment
Information system in business assignment
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Case study 1
Case study 1Case study 1
Case study 1
 
Proton Holdings Strategic Audit (Excerpt of Group Assignment)
Proton Holdings Strategic Audit (Excerpt of Group Assignment)Proton Holdings Strategic Audit (Excerpt of Group Assignment)
Proton Holdings Strategic Audit (Excerpt of Group Assignment)
 
Management Information System : E-Commerce
Management Information System : E-Commerce Management Information System : E-Commerce
Management Information System : E-Commerce
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
 
MIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision MakingMIS-CH12: Enhancing Decision Making
MIS-CH12: Enhancing Decision Making
 
Vision & Mission of Coke , PWC , Flipkart , Caterpillar
Vision & Mission of Coke , PWC , Flipkart , Caterpillar Vision & Mission of Coke , PWC , Flipkart , Caterpillar
Vision & Mission of Coke , PWC , Flipkart , Caterpillar
 
MIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging TechnologiesMIS-CH05: IT Infrastructure and Emerging Technologies
MIS-CH05: IT Infrastructure and Emerging Technologies
 
Wipro
WiproWipro
Wipro
 
Google vs. Microsoft Strategy Business Models
Google vs. Microsoft Strategy Business ModelsGoogle vs. Microsoft Strategy Business Models
Google vs. Microsoft Strategy Business Models
 
Flipkart presentation
Flipkart  presentationFlipkart  presentation
Flipkart presentation
 
Flipkart Strategy Analysis and Recommendation
Flipkart Strategy Analysis and RecommendationFlipkart Strategy Analysis and Recommendation
Flipkart Strategy Analysis and Recommendation
 
Case Study on WIPRO
Case Study on WIPRO Case Study on WIPRO
Case Study on WIPRO
 
Mis ch01
Mis ch01Mis ch01
Mis ch01
 

Similar to MONITORING EMPLOYEES ON NETWORKS

Presentation1
Presentation1Presentation1
Presentation1AlanAnto3
 
8 Steps to Intranet Optimization
8 Steps to Intranet Optimization8 Steps to Intranet Optimization
8 Steps to Intranet OptimizationAciron Consulting
 
Monitoring employees at office - Good or bad practice?
Monitoring employees at office - Good or bad practice?Monitoring employees at office - Good or bad practice?
Monitoring employees at office - Good or bad practice?Atiqul Basher
 
Internet monitoring
Internet monitoringInternet monitoring
Internet monitoringCorrje
 
Social networking issues for HR
Social networking issues for HRSocial networking issues for HR
Social networking issues for HRYolk Recruitment
 
performance management- work place stress.pptx
performance management- work place stress.pptxperformance management- work place stress.pptx
performance management- work place stress.pptxAnitha Ishu
 
Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work PlacePepovski Darko
 
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docxM3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docxsmile790243
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkGary Chambers
 
The principles of social media strategies and how it differs from personal use
The principles of social media strategies and how it differs from personal useThe principles of social media strategies and how it differs from personal use
The principles of social media strategies and how it differs from personal useDebbie Hamilton
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Matthew Charles
 
Group assignment 2
Group assignment 2Group assignment 2
Group assignment 2Farah Azudin
 
How to Implement a Work From Home Policy
How to Implement a Work From Home PolicyHow to Implement a Work From Home Policy
How to Implement a Work From Home PolicyBizSmart Select
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureThe Pathway Group
 
Work From Home Benefits And Challenges.pptx
Work From Home Benefits And Challenges.pptxWork From Home Benefits And Challenges.pptx
Work From Home Benefits And Challenges.pptxJayantaRaj
 

Similar to MONITORING EMPLOYEES ON NETWORKS (20)

Presentation1
Presentation1Presentation1
Presentation1
 
Case study 10
Case study 10Case study 10
Case study 10
 
8 Steps to Intranet Optimization
8 Steps to Intranet Optimization8 Steps to Intranet Optimization
8 Steps to Intranet Optimization
 
Monitoring employees at office - Good or bad practice?
Monitoring employees at office - Good or bad practice?Monitoring employees at office - Good or bad practice?
Monitoring employees at office - Good or bad practice?
 
Internet monitoring
Internet monitoringInternet monitoring
Internet monitoring
 
Social networking issues for HR
Social networking issues for HRSocial networking issues for HR
Social networking issues for HR
 
Social Media Policy
Social Media PolicySocial Media Policy
Social Media Policy
 
Cyberloafing presentation
Cyberloafing presentationCyberloafing presentation
Cyberloafing presentation
 
Staff newsletter
Staff newsletterStaff newsletter
Staff newsletter
 
performance management- work place stress.pptx
performance management- work place stress.pptxperformance management- work place stress.pptx
performance management- work place stress.pptx
 
Social Media In The Work Place
Social Media In The Work PlaceSocial Media In The Work Place
Social Media In The Work Place
 
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docxM3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at Work
 
The principles of social media strategies and how it differs from personal use
The principles of social media strategies and how it differs from personal useThe principles of social media strategies and how it differs from personal use
The principles of social media strategies and how it differs from personal use
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
 
Group assignment 2
Group assignment 2Group assignment 2
Group assignment 2
 
How to Implement a Work From Home Policy
How to Implement a Work From Home PolicyHow to Implement a Work From Home Policy
How to Implement a Work From Home Policy
 
code of conduct
code of conductcode of conduct
code of conduct
 
Computer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and ProcedureComputer, E-mail and Internet Usage Policy and Procedure
Computer, E-mail and Internet Usage Policy and Procedure
 
Work From Home Benefits And Challenges.pptx
Work From Home Benefits And Challenges.pptxWork From Home Benefits And Challenges.pptx
Work From Home Benefits And Challenges.pptx
 

Recently uploaded

WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Skynet Technologies
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxFIDO Alliance
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctBrainSell Technologies
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentationyogeshlabana357357
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTopCSSGallery
 

Recently uploaded (20)

WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 

MONITORING EMPLOYEES ON NETWORKS

  • 1. MONITORING EMPLOYEES ON NETWORKS: UNETHICAL OR GOOD BUSINESS By, SINU SAJI AVINASH M DAS
  • 2. Summary • Internet has become extremely valuable business tool, but it’s also a huge distraction for workers on the job. Employees are wasting valuable business time surfing inappropriate web site. • Many companies began monitoring their employee’s internet usage without their knowledge. They cam monitor online search file downloads and uploads etc. Although it is legal for U.S companies to monitor their employees at work is such monitoring unethical or is it good business? • From the business point of view it leads to loss in revenue when employees use the company resources for personal usage.
  • 3. • Most organizations have placed bans on the private usage of internet because any non-legal activity or offensive material sent or received using firm network can be proven adversely for the firm. • Leak of confidential information or other secrets about the company can occur due to inappropriate use of internet. • Some companies ban all personal activities on corporate networks. Others ban access to specific websites or social sites closely monitor e- mails or set time limit on internet. For example P&G blocks Netflix and ask employees limit in usage of Pandora but still allow access to social networking because employees use them for social campaigns.
  • 4. • Many numbers of firms have fired employees who have stepped out of bounds. Most of them was because the e-mails contained sensitive, confidential or embarrassing information. • many companies believe that companies should write corporate policies in employee e-mail, social media and web use which include explicit ground rules that state, by position or level, under what circumstances can employees use company facilities like e-mail, blogging or web surfing. • They should also inform employees whether these activities are monitored and explain why. The rules should be tailored to specific business needs and organizational cultures.
  • 5. • Should managers monitor employee email and internet usage? Yes managers should monitor employee email and internet usage, because a vital part of an organisation the employees have to perform consistently to ensure the success of the organisation. so it is important that the employees should not waste much time on non productive activities and also they also has sensitive information about the company so the managers need to make sure that they dint get stolen by others so the managers need to monitor his employees. • Describe email and web usage policy for a company The email and web usage policy of the company should be written according to the type of job and the level of employees. The employees should not be allowed to browse in entertainment sites such as YouTube, Netflix etc. as they may lose a lot of time unknowingly in that. The amount of time the worker spends on non productive browsing should also be regulated his completion of work should be evaluated and effective actions should be taken if he is not meeting his mark. The supervision duty should be given to the immediate managers.