SlideShare a Scribd company logo
Internet Policy
By: Matt Maurice, Rebecca Vint, Chris Hudac
Presentation Agenda
 Overview of internet policy within a company

 Pros and Cons of internet policies
 Real life examples of company internet policies

 Conclusion: agree or disagree with having an internet policy
Internet Policy
 Internet Policy provides employees with rules and
guidelines about the appropriate use of company equipment,
network and company internet access.
 Having this policy helps to protect both the business and
employee
 Employees are made aware browsing certain cites and
downloading certain files are prohibited.

 Employees must adhere to policy or face serious
repercussions.
Internet Policy
 By adhering to this policy, along with the potential for serious
repercussions, leads to fewer security risks for the business.
 Internet usage on company time, is authorized to conduct
company business only.
 Internet usage also creates the possibility of contamination to
the company system via viruses or spyware.
 Under no circumstances may company computers or other
electronic devices be used to obtain, view or reach any
pornographic, or otherwise immoral, unethical, or nonbusiness related internet sites.
Email Policy
 Like the general internet policy, email is also to be used for
company business only.
 You are not to conduct personal business using the
companies computer or email.
 Forwarding non-business emails to associates, family, or
friends wastes company time and attention.
 Keep in mind that the company owns any communication
sent via email or that is stored on company equipment.
 Management and other authorized staff have the right to access
any material in your email or on your computer at any time.
Internet Policy
 Every company, no matter their size, that uses computers,
should have a written internet policy.
 Make all employees sign the company internet policy on their
first day on the job.

 Even upper level managers in a company should sign this
policy, if only to show everyone throughout the company that
any violations will not be tolerated no matter your status
within the company.
 If you suspect someone is abusing your computer system
and internet policy, at first, talk to them or even send out
company-wide reminders about the policy.
 You want to trust all of your employees. In order to not seem
like you are constantly peeking over their shoulders, there is
a way to monitor their internet usage discretely.
 Applications known as “snooping” hide on employees
computers and keep a record of what he or she does.
 This record can be set to email you regular reports to keep
track of employees activity.
 Laws and courts have given employers wide discretion in
watching what happens on their company computers.
Pros of Internet Policy
 Higher employee productivity

 Reduce risk of malware and SPAM problems
 Reduce risk of potential legal problems
 Written policy so there is no confusion

 Having a policy protects both the company and the employee
Cons of Internet Policy
 It is costly to implement and maintain protective measures

 Decreased morale as employees feel they are not trusted
 Low morale could lower productivity
 Potential violation of employee privacy if being monitored
Internet Policy Example
 The following hyperlink will take you to a template of sample
company internet policy:
 http://www.sans.org/security-resources/policies/internet-usagepolicy.pdf

 The following hyperlink will take you to a YouTube video of a
brief slideshow of an actual company’s Internet and
Computer Usage Policy:
 http://www.youtube.com/watch?v=P6bOeGfluHQ
Companies keep an eye on
workers’ Internet use
 http://usatoday30.usatoday.com/tech/news/internetprivacy/20
06-02-20-internet-abuse_x.htm
 Above is an article written by the USA Today.
 The article outlines many of the actions that companies such as
GM, the City of Pittsburgh, and Blue Bell Creameries in Texas.
 Statistics from the article:
 Top reasons for wasting time on the job:






Don’t have enough work to do: 33.2%
Underpaid for amount of work: 23.4%
Distracting co-workers: 14.7%
Not enough evening or
weekend time: 12.0%

 Source: Salary.com and America Online survey of 10,044 respondents
Morgan Hunter Internet Policy
 http://www.morganhunter.com/themes/morganhunter/pdfs/M
HC_Internet_Services_Use_Policy.pdf
 Attached is another example of an Internet Services Use
Policy by Morgan Hunter which is a Job Search firm that
specializes in finding employment for individuals that need it.
 The policy is very detailed and also addresses many
questions that might come from the policy itself.
Employers Struggle with Internet
Usage and declining productivity.
 http://www.bizjournals.com/louisville/printedition/2012/05/11/employers-struggle-with-developing.html?page=all
 This is an article from Business first that talks about how many
companies have added a new layer to Human Resources.
 Employers are concerned with a decrease in productivity.
 The internet presents many practical uses for a business but
monitoring is especially difficult.
 66% of employers monitor
 65% of employers filter or block sites they do not want employees
accessing.
Internet Policies for Human
Resources
 http://smallbusiness.chron.com/internet-policies-humanresources-2243.html
 This is a great explanation from Chron.com that provides ideas
and the reasons behind each item included in an internet policy.






Personal Use
Email Use
Forbidden Sites
Privacy
Consequences
Conclusion
 In conclusion, we strongly believe that companies and firms
should indeed have an Internet Policy.
 The policy should be in writing, where all new employees
must read, sign and follow for their duration of employment.
 Not only does it provide a higher quality work environment,
but also makes for a lesser chance of legal issues for both
the employee and the company.
References
 http://www.sans.org/security-resources/policies/internetusage-policy.pdf
 http://humanresources.about.com/od/policiesandsamples1/a/
email_policy.htm
 http://careerplanning.about.com/cs/bosscoworkers/a/net_at_
work.htm
 http://www.gfi.com/pages/sample-internet-usage-policy
 http://www.microsoft.com/business/enus/resources/management/employee-relations/why-youneed-a-company-policy-on-internetuse.aspx?fbid=vM7gP4JZzqt

More Related Content

What's hot

Cyber security training
Cyber security trainingCyber security training
Cyber security training
Wilmington University
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use PolicyJennifer Whitt
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
Gerard Lamusse
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
jubke
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
Home
 
Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
Devlog Integrated Services
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
Atlantic Training, LLC.
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
Jen Ruhman
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
PantegoChristian
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
Dominic Rajesh
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
Fred Beck MBA, CPA
 
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
Cybercrime
CybercrimeCybercrime
Cybercrime
John Ela Echon
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Dmitriy Scherbina
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
Daniel P Wallace
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
Hadeel Sadiq Obaid
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Mehjabin Chowdhury
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
Randy Bowman
 

What's hot (20)

Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
Internet Acceptable Use Policy
Internet Acceptable Use PolicyInternet Acceptable Use Policy
Internet Acceptable Use Policy
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
ICT and end user security awareness slides
ICT and end user security awareness slidesICT and end user security awareness slides
ICT and end user security awareness slides
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Internet safety at work presentation
Internet safety at work presentationInternet safety at work presentation
Internet safety at work presentation
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Cyber-Safety and Digital Citizenship
Cyber-Safety and Digital CitizenshipCyber-Safety and Digital Citizenship
Cyber-Safety and Digital Citizenship
 
General Awareness On Cyber Security
General Awareness On Cyber SecurityGeneral Awareness On Cyber Security
General Awareness On Cyber Security
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Phishing
PhishingPhishing
Phishing
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 

Viewers also liked

The Magic of Offal in Chef mag
The Magic of Offal in Chef magThe Magic of Offal in Chef mag
The Magic of Offal in Chef mag
Elizabeth Hotson
 
Reporting at GWA Parents
Reporting at GWA ParentsReporting at GWA Parents
Reporting at GWA Parents
David Gerber
 
Tooling JavaScript to ensure consistency in coding style
Tooling JavaScript to ensure consistency in coding styleTooling JavaScript to ensure consistency in coding style
Tooling JavaScript to ensure consistency in coding style
Dmitry Sheiko
 
Diez razones para contratar un agente inmobiliario
Diez razones para contratar un agente inmobiliarioDiez razones para contratar un agente inmobiliario
Diez razones para contratar un agente inmobiliario
Ims Agentes Inmobiliarios
 
Kieran Pehm | How to reduce complaints from patients with low health literacy?
Kieran Pehm | How to reduce complaints  from patients with low  health literacy?Kieran Pehm | How to reduce complaints  from patients with low  health literacy?
Kieran Pehm | How to reduce complaints from patients with low health literacy?
Sax Institute
 
Coches electricos
Coches electricosCoches electricos
Coches electricos
Daniel Luttringer
 
E twinning september_2010_web
E twinning september_2010_webE twinning september_2010_web
E twinning september_2010_web
Claus Berg
 
Making Money With Affiliate Programs for Beginners
Making Money With Affiliate Programs for BeginnersMaking Money With Affiliate Programs for Beginners
Making Money With Affiliate Programs for Beginners
Affiliate Summit
 
Proyecto
ProyectoProyecto
La venta y el servicio por teléfono por José Holmer Torres - www.josehtorresc...
La venta y el servicio por teléfono por José Holmer Torres - www.josehtorresc...La venta y el servicio por teléfono por José Holmer Torres - www.josehtorresc...
La venta y el servicio por teléfono por José Holmer Torres - www.josehtorresc...
Jose Holmer Torres Cardona
 
Cerrajeros En Alella 651 novecientos ochenta y dos 619 Apertura De Puertas E...
Cerrajeros En Alella 651 novecientos ochenta y dos 619 Apertura De Puertas E...Cerrajeros En Alella 651 novecientos ochenta y dos 619 Apertura De Puertas E...
Cerrajeros En Alella 651 novecientos ochenta y dos 619 Apertura De Puertas E...
preciousroutine81
 
Reunion rfc 201415 10_15_v2.0 (presentacion)
Reunion rfc 201415 10_15_v2.0 (presentacion)Reunion rfc 201415 10_15_v2.0 (presentacion)
Reunion rfc 201415 10_15_v2.0 (presentacion)
Alberto Arribas Almiñana
 
GE Money Work Life Balance
GE Money Work Life BalanceGE Money Work Life Balance
GE Money Work Life Balance
The Creative Collective
 
Eco actu n°18
Eco actu n°18Eco actu n°18
Eco actu n°18
AudéLor
 
Gm crops world hunger
Gm crops world hungerGm crops world hunger
Gm crops world hunger
Amor Vieira Alvarez
 
oVirt 3.5 - Einführung und Evaluierungsergebnisse
oVirt 3.5 - Einführung und EvaluierungsergebnisseoVirt 3.5 - Einführung und Evaluierungsergebnisse
oVirt 3.5 - Einführung und Evaluierungsergebnisse
inovex GmbH
 
Aire comprimido #48
Aire comprimido #48Aire comprimido #48
Aire comprimido #48
Yoko Enrique Golding Gomez
 
Cv Guillermo Grebe Ok
Cv Guillermo Grebe OkCv Guillermo Grebe Ok
Cv Guillermo Grebe Ok
guillermogrebe
 
Intro to Library Research for IB History Students
Intro to Library Research for IB History StudentsIntro to Library Research for IB History Students
Intro to Library Research for IB History Students
Jessica Breiman
 
Legislacion Adiestrador y Educador de Perros Potencialmente Peligrosos. Comun...
Legislacion Adiestrador y Educador de Perros Potencialmente Peligrosos. Comun...Legislacion Adiestrador y Educador de Perros Potencialmente Peligrosos. Comun...
Legislacion Adiestrador y Educador de Perros Potencialmente Peligrosos. Comun...
tormosmaite
 

Viewers also liked (20)

The Magic of Offal in Chef mag
The Magic of Offal in Chef magThe Magic of Offal in Chef mag
The Magic of Offal in Chef mag
 
Reporting at GWA Parents
Reporting at GWA ParentsReporting at GWA Parents
Reporting at GWA Parents
 
Tooling JavaScript to ensure consistency in coding style
Tooling JavaScript to ensure consistency in coding styleTooling JavaScript to ensure consistency in coding style
Tooling JavaScript to ensure consistency in coding style
 
Diez razones para contratar un agente inmobiliario
Diez razones para contratar un agente inmobiliarioDiez razones para contratar un agente inmobiliario
Diez razones para contratar un agente inmobiliario
 
Kieran Pehm | How to reduce complaints from patients with low health literacy?
Kieran Pehm | How to reduce complaints  from patients with low  health literacy?Kieran Pehm | How to reduce complaints  from patients with low  health literacy?
Kieran Pehm | How to reduce complaints from patients with low health literacy?
 
Coches electricos
Coches electricosCoches electricos
Coches electricos
 
E twinning september_2010_web
E twinning september_2010_webE twinning september_2010_web
E twinning september_2010_web
 
Making Money With Affiliate Programs for Beginners
Making Money With Affiliate Programs for BeginnersMaking Money With Affiliate Programs for Beginners
Making Money With Affiliate Programs for Beginners
 
Proyecto
ProyectoProyecto
Proyecto
 
La venta y el servicio por teléfono por José Holmer Torres - www.josehtorresc...
La venta y el servicio por teléfono por José Holmer Torres - www.josehtorresc...La venta y el servicio por teléfono por José Holmer Torres - www.josehtorresc...
La venta y el servicio por teléfono por José Holmer Torres - www.josehtorresc...
 
Cerrajeros En Alella 651 novecientos ochenta y dos 619 Apertura De Puertas E...
Cerrajeros En Alella 651 novecientos ochenta y dos 619 Apertura De Puertas E...Cerrajeros En Alella 651 novecientos ochenta y dos 619 Apertura De Puertas E...
Cerrajeros En Alella 651 novecientos ochenta y dos 619 Apertura De Puertas E...
 
Reunion rfc 201415 10_15_v2.0 (presentacion)
Reunion rfc 201415 10_15_v2.0 (presentacion)Reunion rfc 201415 10_15_v2.0 (presentacion)
Reunion rfc 201415 10_15_v2.0 (presentacion)
 
GE Money Work Life Balance
GE Money Work Life BalanceGE Money Work Life Balance
GE Money Work Life Balance
 
Eco actu n°18
Eco actu n°18Eco actu n°18
Eco actu n°18
 
Gm crops world hunger
Gm crops world hungerGm crops world hunger
Gm crops world hunger
 
oVirt 3.5 - Einführung und Evaluierungsergebnisse
oVirt 3.5 - Einführung und EvaluierungsergebnisseoVirt 3.5 - Einführung und Evaluierungsergebnisse
oVirt 3.5 - Einführung und Evaluierungsergebnisse
 
Aire comprimido #48
Aire comprimido #48Aire comprimido #48
Aire comprimido #48
 
Cv Guillermo Grebe Ok
Cv Guillermo Grebe OkCv Guillermo Grebe Ok
Cv Guillermo Grebe Ok
 
Intro to Library Research for IB History Students
Intro to Library Research for IB History StudentsIntro to Library Research for IB History Students
Intro to Library Research for IB History Students
 
Legislacion Adiestrador y Educador de Perros Potencialmente Peligrosos. Comun...
Legislacion Adiestrador y Educador de Perros Potencialmente Peligrosos. Comun...Legislacion Adiestrador y Educador de Perros Potencialmente Peligrosos. Comun...
Legislacion Adiestrador y Educador de Perros Potencialmente Peligrosos. Comun...
 

Similar to Internet Policy Final Project (Group 6)

Liabilty
LiabiltyLiabilty
Liabilty
Laura Breese
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at Work
Gary Chambers
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
healdkathaleen
 
Internet Misuse inside the Company
Internet Misuse inside the CompanyInternet Misuse inside the Company
Internet Misuse inside the Company
Roberto de Paula Lico Junior
 
Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_work
Shankar Myadharaveni
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward F. T. Charfauros
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
UMaine
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Vijay Dalmia
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employers
dsalmeida
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
UMaine
 
Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)
Kielentot Martinez
 
Why do you need an it policy it-toolkits
Why do you need an it policy     it-toolkitsWhy do you need an it policy     it-toolkits
Why do you need an it policy it-toolkits
IT-Toolkits.org
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?
Human Resources & Payroll
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and Blogosphere
Kelly Savage
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)
hassan777898
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
Enov8
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
Proxies Rent
 
Case study 10
Case study 10Case study 10
Case study 10
khaled alsaeh
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012
PBeisty
 
Read Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxRead Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docx
leonorepour284
 

Similar to Internet Policy Final Project (Group 6) (20)

Liabilty
LiabiltyLiabilty
Liabilty
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at Work
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
Internet Misuse inside the Company
Internet Misuse inside the CompanyInternet Misuse inside the Company
Internet Misuse inside the Company
 
Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_work
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employers
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)
 
Why do you need an it policy it-toolkits
Why do you need an it policy     it-toolkitsWhy do you need an it policy     it-toolkits
Why do you need an it policy it-toolkits
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and Blogosphere
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
 
Case study 10
Case study 10Case study 10
Case study 10
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012
 
Read Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxRead Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docx
 

Recently uploaded

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
Katrina Pritchard
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 

Recently uploaded (20)

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
BBR 2024 Summer Sessions Interview Training
BBR  2024 Summer Sessions Interview TrainingBBR  2024 Summer Sessions Interview Training
BBR 2024 Summer Sessions Interview Training
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 

Internet Policy Final Project (Group 6)

  • 1. Internet Policy By: Matt Maurice, Rebecca Vint, Chris Hudac
  • 2. Presentation Agenda  Overview of internet policy within a company  Pros and Cons of internet policies  Real life examples of company internet policies  Conclusion: agree or disagree with having an internet policy
  • 3. Internet Policy  Internet Policy provides employees with rules and guidelines about the appropriate use of company equipment, network and company internet access.  Having this policy helps to protect both the business and employee  Employees are made aware browsing certain cites and downloading certain files are prohibited.  Employees must adhere to policy or face serious repercussions.
  • 4. Internet Policy  By adhering to this policy, along with the potential for serious repercussions, leads to fewer security risks for the business.  Internet usage on company time, is authorized to conduct company business only.  Internet usage also creates the possibility of contamination to the company system via viruses or spyware.  Under no circumstances may company computers or other electronic devices be used to obtain, view or reach any pornographic, or otherwise immoral, unethical, or nonbusiness related internet sites.
  • 5. Email Policy  Like the general internet policy, email is also to be used for company business only.  You are not to conduct personal business using the companies computer or email.  Forwarding non-business emails to associates, family, or friends wastes company time and attention.  Keep in mind that the company owns any communication sent via email or that is stored on company equipment.  Management and other authorized staff have the right to access any material in your email or on your computer at any time.
  • 6. Internet Policy  Every company, no matter their size, that uses computers, should have a written internet policy.  Make all employees sign the company internet policy on their first day on the job.  Even upper level managers in a company should sign this policy, if only to show everyone throughout the company that any violations will not be tolerated no matter your status within the company.
  • 7.  If you suspect someone is abusing your computer system and internet policy, at first, talk to them or even send out company-wide reminders about the policy.  You want to trust all of your employees. In order to not seem like you are constantly peeking over their shoulders, there is a way to monitor their internet usage discretely.  Applications known as “snooping” hide on employees computers and keep a record of what he or she does.  This record can be set to email you regular reports to keep track of employees activity.  Laws and courts have given employers wide discretion in watching what happens on their company computers.
  • 8. Pros of Internet Policy  Higher employee productivity  Reduce risk of malware and SPAM problems  Reduce risk of potential legal problems  Written policy so there is no confusion  Having a policy protects both the company and the employee
  • 9. Cons of Internet Policy  It is costly to implement and maintain protective measures  Decreased morale as employees feel they are not trusted  Low morale could lower productivity  Potential violation of employee privacy if being monitored
  • 10. Internet Policy Example  The following hyperlink will take you to a template of sample company internet policy:  http://www.sans.org/security-resources/policies/internet-usagepolicy.pdf  The following hyperlink will take you to a YouTube video of a brief slideshow of an actual company’s Internet and Computer Usage Policy:  http://www.youtube.com/watch?v=P6bOeGfluHQ
  • 11. Companies keep an eye on workers’ Internet use  http://usatoday30.usatoday.com/tech/news/internetprivacy/20 06-02-20-internet-abuse_x.htm  Above is an article written by the USA Today.  The article outlines many of the actions that companies such as GM, the City of Pittsburgh, and Blue Bell Creameries in Texas.  Statistics from the article:  Top reasons for wasting time on the job:      Don’t have enough work to do: 33.2% Underpaid for amount of work: 23.4% Distracting co-workers: 14.7% Not enough evening or weekend time: 12.0%  Source: Salary.com and America Online survey of 10,044 respondents
  • 12. Morgan Hunter Internet Policy  http://www.morganhunter.com/themes/morganhunter/pdfs/M HC_Internet_Services_Use_Policy.pdf  Attached is another example of an Internet Services Use Policy by Morgan Hunter which is a Job Search firm that specializes in finding employment for individuals that need it.  The policy is very detailed and also addresses many questions that might come from the policy itself.
  • 13. Employers Struggle with Internet Usage and declining productivity.  http://www.bizjournals.com/louisville/printedition/2012/05/11/employers-struggle-with-developing.html?page=all  This is an article from Business first that talks about how many companies have added a new layer to Human Resources.  Employers are concerned with a decrease in productivity.  The internet presents many practical uses for a business but monitoring is especially difficult.  66% of employers monitor  65% of employers filter or block sites they do not want employees accessing.
  • 14. Internet Policies for Human Resources  http://smallbusiness.chron.com/internet-policies-humanresources-2243.html  This is a great explanation from Chron.com that provides ideas and the reasons behind each item included in an internet policy.      Personal Use Email Use Forbidden Sites Privacy Consequences
  • 15. Conclusion  In conclusion, we strongly believe that companies and firms should indeed have an Internet Policy.  The policy should be in writing, where all new employees must read, sign and follow for their duration of employment.  Not only does it provide a higher quality work environment, but also makes for a lesser chance of legal issues for both the employee and the company.
  • 16. References  http://www.sans.org/security-resources/policies/internetusage-policy.pdf  http://humanresources.about.com/od/policiesandsamples1/a/ email_policy.htm  http://careerplanning.about.com/cs/bosscoworkers/a/net_at_ work.htm  http://www.gfi.com/pages/sample-internet-usage-policy  http://www.microsoft.com/business/enus/resources/management/employee-relations/why-youneed-a-company-policy-on-internetuse.aspx?fbid=vM7gP4JZzqt

Editor's Notes

  1. An internet usage policy provides employees with rules and guidelines about the appropriate use of company equipment, network and Internet access. Having such a policy in place helps to protect both the business and the employee.
  2. The employee will be aware that browsing certain sites or downloading files is prohibited and that the policy must be adhered to or there could be serious repercussions, thus leading to fewer security risks for the business as a result of employee negligence. 
  3. Voice mail, email, and Internet usage assigned to an employee's computer or telephone extensions are solely for the purpose of conducting Company business. Email is also to be used for Company business only. Company confidential information must not be shared outside of the Company, without authorization, at any time. You are also not to conduct personal business using the Company computer or email. Keep in mind that the Company owns any communication sent via email or that is stored on company equipment. Management and other authorized staff have the right to access any material in your email or on your computer at any time.
  4. The Internet Usage Policy is an important document that must be signed by all employees upon starting work. Make all employees sign our computing policy on their first day of work.
  5. If you suspect that someone is abusing your computer system, what do you do? First, talk to them and send e-mail reminders. Tell employees that they are there to work, not to shop or to tend to their personal business. “Snooping” applications hide on the employee's computer and keep a record of what he or she does. They can be set to e-mail you a regular report. And they are difficult to detect.
  6. Make all employees sign our computing policy on their first day of work.
  7. According to the survey, 25% of employees use the Internet for personal use during office hours for at least ten minutes each day. Thirteen percent of workers use the Internet for at least two hours per day.