2. Presentation Agenda
Overview of internet policy within a company
Pros and Cons of internet policies
Real life examples of company internet policies
Conclusion: agree or disagree with having an internet policy
3. Internet Policy
Internet Policy provides employees with rules and
guidelines about the appropriate use of company equipment,
network and company internet access.
Having this policy helps to protect both the business and
employee
Employees are made aware browsing certain cites and
downloading certain files are prohibited.
Employees must adhere to policy or face serious
repercussions.
4. Internet Policy
By adhering to this policy, along with the potential for serious
repercussions, leads to fewer security risks for the business.
Internet usage on company time, is authorized to conduct
company business only.
Internet usage also creates the possibility of contamination to
the company system via viruses or spyware.
Under no circumstances may company computers or other
electronic devices be used to obtain, view or reach any
pornographic, or otherwise immoral, unethical, or nonbusiness related internet sites.
5. Email Policy
Like the general internet policy, email is also to be used for
company business only.
You are not to conduct personal business using the
companies computer or email.
Forwarding non-business emails to associates, family, or
friends wastes company time and attention.
Keep in mind that the company owns any communication
sent via email or that is stored on company equipment.
Management and other authorized staff have the right to access
any material in your email or on your computer at any time.
6. Internet Policy
Every company, no matter their size, that uses computers,
should have a written internet policy.
Make all employees sign the company internet policy on their
first day on the job.
Even upper level managers in a company should sign this
policy, if only to show everyone throughout the company that
any violations will not be tolerated no matter your status
within the company.
7. If you suspect someone is abusing your computer system
and internet policy, at first, talk to them or even send out
company-wide reminders about the policy.
You want to trust all of your employees. In order to not seem
like you are constantly peeking over their shoulders, there is
a way to monitor their internet usage discretely.
Applications known as “snooping” hide on employees
computers and keep a record of what he or she does.
This record can be set to email you regular reports to keep
track of employees activity.
Laws and courts have given employers wide discretion in
watching what happens on their company computers.
8. Pros of Internet Policy
Higher employee productivity
Reduce risk of malware and SPAM problems
Reduce risk of potential legal problems
Written policy so there is no confusion
Having a policy protects both the company and the employee
9. Cons of Internet Policy
It is costly to implement and maintain protective measures
Decreased morale as employees feel they are not trusted
Low morale could lower productivity
Potential violation of employee privacy if being monitored
10. Internet Policy Example
The following hyperlink will take you to a template of sample
company internet policy:
http://www.sans.org/security-resources/policies/internet-usagepolicy.pdf
The following hyperlink will take you to a YouTube video of a
brief slideshow of an actual company’s Internet and
Computer Usage Policy:
http://www.youtube.com/watch?v=P6bOeGfluHQ
11. Companies keep an eye on
workers’ Internet use
http://usatoday30.usatoday.com/tech/news/internetprivacy/20
06-02-20-internet-abuse_x.htm
Above is an article written by the USA Today.
The article outlines many of the actions that companies such as
GM, the City of Pittsburgh, and Blue Bell Creameries in Texas.
Statistics from the article:
Top reasons for wasting time on the job:
Don’t have enough work to do: 33.2%
Underpaid for amount of work: 23.4%
Distracting co-workers: 14.7%
Not enough evening or
weekend time: 12.0%
Source: Salary.com and America Online survey of 10,044 respondents
12. Morgan Hunter Internet Policy
http://www.morganhunter.com/themes/morganhunter/pdfs/M
HC_Internet_Services_Use_Policy.pdf
Attached is another example of an Internet Services Use
Policy by Morgan Hunter which is a Job Search firm that
specializes in finding employment for individuals that need it.
The policy is very detailed and also addresses many
questions that might come from the policy itself.
13. Employers Struggle with Internet
Usage and declining productivity.
http://www.bizjournals.com/louisville/printedition/2012/05/11/employers-struggle-with-developing.html?page=all
This is an article from Business first that talks about how many
companies have added a new layer to Human Resources.
Employers are concerned with a decrease in productivity.
The internet presents many practical uses for a business but
monitoring is especially difficult.
66% of employers monitor
65% of employers filter or block sites they do not want employees
accessing.
14. Internet Policies for Human
Resources
http://smallbusiness.chron.com/internet-policies-humanresources-2243.html
This is a great explanation from Chron.com that provides ideas
and the reasons behind each item included in an internet policy.
Personal Use
Email Use
Forbidden Sites
Privacy
Consequences
15. Conclusion
In conclusion, we strongly believe that companies and firms
should indeed have an Internet Policy.
The policy should be in writing, where all new employees
must read, sign and follow for their duration of employment.
Not only does it provide a higher quality work environment,
but also makes for a lesser chance of legal issues for both
the employee and the company.
An internet usage policy provides employees with rules and guidelines about the appropriate use of company equipment, network and Internet access. Having such a policy in place helps to protect both the business and the employee.
The employee will be aware that browsing certain sites or downloading files is prohibited and that the policy must be adhered to or there could be serious repercussions, thus leading to fewer security risks for the business as a result of employee negligence.
Voice mail, email, and Internet usage assigned to an employee's computer or telephone extensions are solely for the purpose of conducting Company business. Email is also to be used for Company business only. Company confidential information must not be shared outside of the Company, without authorization, at any time. You are also not to conduct personal business using the Company computer or email. Keep in mind that the Company owns any communication sent via email or that is stored on company equipment. Management and other authorized staff have the right to access any material in your email or on your computer at any time.
The Internet Usage Policy is an important document that must be signed by all employees upon starting work. Make all employees sign our computing policy on their first day of work.
If you suspect that someone is abusing your computer system, what do you do? First, talk to them and send e-mail reminders. Tell employees that they are there to work, not to shop or to tend to their personal business. “Snooping” applications hide on the employee's computer and keep a record of what he or she does. They can be set to e-mail you a regular report. And they are difficult to detect.
Make all employees sign our computing policy on their first day of work.
According to the survey, 25% of employees use the Internet for personal use during office hours for at least ten minutes each day. Thirteen percent of workers use the Internet for at least two hours per day.