Internet usage should be monitored and controlled by the company

To ensure this, policies must be reasonable for staff morale and retention. The scope of an internet usage policy is not to snoop on employees or deny them all access rights to the internet whilst at work; however, guidelines and rules need to be formulated to protect employees from being subjected to material that may be inappropriate to a work environment and that could result in legal ramifications.

However, whilst most policies cover the same grounds, each company will have its own terms and conditions according to the company infrastructure.

Thus any discriminatory content in emails sent via company email would be breaking the internet usage policy. An internet usage policy would typically cover all employees who have internet access.

By controlling downloads and browsing in real-time, the network is being protected from malware being installed. Any correspondence sent from a company email address should be treated as a professional document even if it just a one-line reply.

Is My Boss Monitoring My Internet Usage?

Web monitoring software should not be used to spy on employees but to verify that employees can be trusted to follow policies and to work efficiently during business hours. Buy Now Implementing an internet usage policy An internet usage policy dictates what is deemed to be appropriate internet browsing behaviour in the workplace.

Therefore a training session about internet security will act as a cohesive link with the internet usage policy and will likely result in users abiding by the policy once they understand the reasoning behind it. Drawing up an internet usage policy is typically the role of both the human resources department and the IT department as it endeavours to protect both the employee as well as the IT network.

Action can then be taken based on the reports provided by the software. Employees need to be warned about the dangers that downloading unknown files can present. Having an internet usage policy, which can also be referred to as an acceptable use policy AUPensures that employees are following directives that serve to safeguard their work environment and the IT network infrastructure.

The problems arise with allowed access to personal email accounts, social networking sites, auction sites, etc. There is also the prevention of data leakage through socially-engineered websites as well as reducing cyberslacking, thus boosting employee and business productivity.

Employees must realise that their internet browsing has consequences and if they ignore the policy then they must bear the consequences. Who should it apply to? Penalties for improper internet usage could start with a verbal warning, increase to a written reprimand, demotion and eventual work termination.

Furthermore web monitoring software will provide more efficient and comprehensive results as reports and data can be accessed within minutes. What should an internet usage policy include?

This policy typically enforces time restrictions for employees when browsing the internet for non work-related tasks as well as stipulating what genres of sites they are allowed to browse. Downloading software or attachments onto a work computer increases the risk of a virus infection throughout the network.

In the same way, all company information is confidential and should not be sent outside of the company without permission. Users need to know that the violation of these boundaries will have repercussions and action will be taken against repeat offenders, as well as reporting top policy breakers, otherwise the policy will not be taken seriously.

Therefore collaboration between these two departments is essential to ensure that a comprehensive internet usage policy is formulated according to the needs of the company and then enforced.

Want to ask a question?

Once the internet usage policy is drawn up and employees are made aware of its existence and its importance the monitoring of employees needs to be automated through web monitoring software, as it would be a waste of human resources to assign a single person or team to monitor the internet activities of all the employees.

Not all internet usage policies are the same, as they should be tailor-made to the needs and structure of the company; so certain companies might accept that these sites can be used during breaks.

A clear distinction needs to be made between work use and personal use. How is an internet usage policy enforced?If you own a company-sponsored laptop or connect to your company’s private network, there is a good chance that your employer is monitoring your Internet usage at work.

It is not uncommon for companies to be known for employee monitoring. Email monitoring is a hot topic these days.

Ever since Edward Snowden revealed the monitoring tactics used by, amongst others, the USA and UK governments, more and more controversies have sprung.

Implementing an internet usage policy

Controlling Internet usage saves you a great deal of money, firstly because a solid web monitoring solution would usually check that any files downloaded are free of malware, as well as offer the alternative to block certain hazardous or offensive sites. If you are using a company-provided computer, connected to the corporate network to access the Internet: I probably installed a Corporate-Trusted Certificate on the asset.

I can leverage the Corporate Cert Trusts to decrypt all of your encrypted traffic to see it. Should The Government Censor The Internet Media Essay. Print Government in some countries have responded imposing strict censorship on Internet usage by the public through monitoring, filtering and access to some site in the internet in a bid to control access to information.

UKEssays is a trading name of All Answers Ltd, a company. An internet usage policy dictates what is deemed to be appropriate internet browsing behaviour in the workplace.

This policy typically enforces time restrictions for employees when browsing the internet for non work-related tasks as well as stipulating what genres of sites they are allowed to browse.

Download
Internet usage should be monitored and controlled by the company
Rated 4/5 based on 22 review