SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Internet Policy
By: Matt Maurice, Rebecca Vint, Chris Hudac
Presentation Agenda
 Overview of internet policy within a company

 Pros and Cons of internet policies
 Real life examples of company internet policies

 Conclusion: agree or disagree with having an internet policy
Internet Policy
 Internet Policy provides employees with rules and
guidelines about the appropriate use of company equipment,
network and company internet access.
 Having this policy helps to protect both the business and
employee
 Employees are made aware browsing certain cites and
downloading certain files are prohibited.

 Employees must adhere to policy or face serious
repercussions.
Internet Policy
 By adhering to this policy, along with the potential for serious
repercussions, leads to fewer security risks for the business.
 Internet usage on company time, is authorized to conduct
company business only.
 Internet usage also creates the possibility of contamination to
the company system via viruses or spyware.
 Under no circumstances may company computers or other
electronic devices be used to obtain, view or reach any
pornographic, or otherwise immoral, unethical, or nonbusiness related internet sites.
Email Policy
 Like the general internet policy, email is also to be used for
company business only.
 You are not to conduct personal business using the
companies computer or email.
 Forwarding non-business emails to associates, family, or
friends wastes company time and attention.
 Keep in mind that the company owns any communication
sent via email or that is stored on company equipment.
 Management and other authorized staff have the right to access
any material in your email or on your computer at any time.
Internet Policy
 Every company, no matter their size, that uses computers,
should have a written internet policy.
 Make all employees sign the company internet policy on their
first day on the job.

 Even upper level managers in a company should sign this
policy, if only to show everyone throughout the company that
any violations will not be tolerated no matter your status
within the company.
 If you suspect someone is abusing your computer system
and internet policy, at first, talk to them or even send out
company-wide reminders about the policy.
 You want to trust all of your employees. In order to not seem
like you are constantly peeking over their shoulders, there is
a way to monitor their internet usage discretely.
 Applications known as “snooping” hide on employees
computers and keep a record of what he or she does.
 This record can be set to email you regular reports to keep
track of employees activity.
 Laws and courts have given employers wide discretion in
watching what happens on their company computers.
Pros of Internet Policy
 Higher employee productivity

 Reduce risk of malware and SPAM problems
 Reduce risk of potential legal problems
 Written policy so there is no confusion

 Having a policy protects both the company and the employee
Cons of Internet Policy
 It is costly to implement and maintain protective measures

 Decreased morale as employees feel they are not trusted
 Low morale could lower productivity
 Potential violation of employee privacy if being monitored
Internet Policy Example
 The following hyperlink will take you to a template of sample
company internet policy:
 http://www.sans.org/security-resources/policies/internet-usagepolicy.pdf

 The following hyperlink will take you to a YouTube video of a
brief slideshow of an actual company’s Internet and
Computer Usage Policy:
 http://www.youtube.com/watch?v=P6bOeGfluHQ
Companies keep an eye on
workers’ Internet use
 http://usatoday30.usatoday.com/tech/news/internetprivacy/20
06-02-20-internet-abuse_x.htm
 Above is an article written by the USA Today.
 The article outlines many of the actions that companies such as
GM, the City of Pittsburgh, and Blue Bell Creameries in Texas.
 Statistics from the article:
 Top reasons for wasting time on the job:






Don’t have enough work to do: 33.2%
Underpaid for amount of work: 23.4%
Distracting co-workers: 14.7%
Not enough evening or
weekend time: 12.0%

 Source: Salary.com and America Online survey of 10,044 respondents
Morgan Hunter Internet Policy
 http://www.morganhunter.com/themes/morganhunter/pdfs/M
HC_Internet_Services_Use_Policy.pdf
 Attached is another example of an Internet Services Use
Policy by Morgan Hunter which is a Job Search firm that
specializes in finding employment for individuals that need it.
 The policy is very detailed and also addresses many
questions that might come from the policy itself.
Employers Struggle with Internet
Usage and declining productivity.
 http://www.bizjournals.com/louisville/printedition/2012/05/11/employers-struggle-with-developing.html?page=all
 This is an article from Business first that talks about how many
companies have added a new layer to Human Resources.
 Employers are concerned with a decrease in productivity.
 The internet presents many practical uses for a business but
monitoring is especially difficult.
 66% of employers monitor
 65% of employers filter or block sites they do not want employees
accessing.
Internet Policies for Human
Resources
 http://smallbusiness.chron.com/internet-policies-humanresources-2243.html
 This is a great explanation from Chron.com that provides ideas
and the reasons behind each item included in an internet policy.






Personal Use
Email Use
Forbidden Sites
Privacy
Consequences
Conclusion
 In conclusion, we strongly believe that companies and firms
should indeed have an Internet Policy.
 The policy should be in writing, where all new employees
must read, sign and follow for their duration of employment.
 Not only does it provide a higher quality work environment,
but also makes for a lesser chance of legal issues for both
the employee and the company.
References
 http://www.sans.org/security-resources/policies/internetusage-policy.pdf
 http://humanresources.about.com/od/policiesandsamples1/a/
email_policy.htm
 http://careerplanning.about.com/cs/bosscoworkers/a/net_at_
work.htm
 http://www.gfi.com/pages/sample-internet-usage-policy
 http://www.microsoft.com/business/enus/resources/management/employee-relations/why-youneed-a-company-policy-on-internetuse.aspx?fbid=vM7gP4JZzqt

Weitere ähnliche Inhalte

Was ist angesagt?

Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policiesanilinvns
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Vijay Dalmia
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsNetLockSmith
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awarenesshubbargf
 
Cyber security
Cyber securityCyber security
Cyber securitymanoj duli
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesSlideTeam
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Jay Nagar
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness TrainingBuy Custom Papers
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet vimal kumar arora
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and SecurityChitra Mudunuru
 

Was ist angesagt? (20)

Password Policy and Account Lockout Policies
Password Policy and Account Lockout PoliciesPassword Policy and Account Lockout Policies
Password Policy and Account Lockout Policies
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour Information Technology Policy for Corporates - Need of the Hour
Information Technology Policy for Corporates - Need of the Hour
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Cybersecurity Awareness Infographics
Cybersecurity Awareness InfographicsCybersecurity Awareness Infographics
Cybersecurity Awareness Infographics
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
Cyber security
Cyber securityCyber security
Cyber security
 
IT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation SlidesIT Security PowerPoint Presentation Slides
IT Security PowerPoint Presentation Slides
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Cyber Security Awareness Training
Cyber Security Awareness TrainingCyber Security Awareness Training
Cyber Security Awareness Training
 
Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet Cybercrime and its effects on personal life who uses internet
Cybercrime and its effects on personal life who uses internet
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 

Andere mochten auch

The Magic of Offal in Chef mag
The Magic of Offal in Chef magThe Magic of Offal in Chef mag
The Magic of Offal in Chef magElizabeth Hotson
 
Reporting at GWA Parents
Reporting at GWA ParentsReporting at GWA Parents
Reporting at GWA ParentsDavid Gerber
 
Tooling JavaScript to ensure consistency in coding style
Tooling JavaScript to ensure consistency in coding styleTooling JavaScript to ensure consistency in coding style
Tooling JavaScript to ensure consistency in coding styleDmitry Sheiko
 
Diez razones para contratar un agente inmobiliario
Diez razones para contratar un agente inmobiliarioDiez razones para contratar un agente inmobiliario
Diez razones para contratar un agente inmobiliarioIms Agentes Inmobiliarios
 
Kieran Pehm | How to reduce complaints from patients with low health literacy?
Kieran Pehm | How to reduce complaints  from patients with low  health literacy?Kieran Pehm | How to reduce complaints  from patients with low  health literacy?
Kieran Pehm | How to reduce complaints from patients with low health literacy?Sax Institute
 
E twinning september_2010_web
E twinning september_2010_webE twinning september_2010_web
E twinning september_2010_webClaus Berg
 
Making Money With Affiliate Programs for Beginners
Making Money With Affiliate Programs for BeginnersMaking Money With Affiliate Programs for Beginners
Making Money With Affiliate Programs for BeginnersAffiliate Summit
 
La venta y el servicio por teléfono por José Holmer Torres - www.josehtorresc...
La venta y el servicio por teléfono por José Holmer Torres - www.josehtorresc...La venta y el servicio por teléfono por José Holmer Torres - www.josehtorresc...
La venta y el servicio por teléfono por José Holmer Torres - www.josehtorresc...Jose Holmer Torres Cardona
 
Cerrajeros En Alella 651 novecientos ochenta y dos 619 Apertura De Puertas E...
Cerrajeros En Alella 651 novecientos ochenta y dos 619 Apertura De Puertas E...Cerrajeros En Alella 651 novecientos ochenta y dos 619 Apertura De Puertas E...
Cerrajeros En Alella 651 novecientos ochenta y dos 619 Apertura De Puertas E...preciousroutine81
 
Reunion rfc 201415 10_15_v2.0 (presentacion)
Reunion rfc 201415 10_15_v2.0 (presentacion)Reunion rfc 201415 10_15_v2.0 (presentacion)
Reunion rfc 201415 10_15_v2.0 (presentacion)Alberto Arribas Almiñana
 
Eco actu n°18
Eco actu n°18Eco actu n°18
Eco actu n°18AudéLor
 
oVirt 3.5 - Einführung und Evaluierungsergebnisse
oVirt 3.5 - Einführung und EvaluierungsergebnisseoVirt 3.5 - Einführung und Evaluierungsergebnisse
oVirt 3.5 - Einführung und Evaluierungsergebnisseinovex GmbH
 
Intro to Library Research for IB History Students
Intro to Library Research for IB History StudentsIntro to Library Research for IB History Students
Intro to Library Research for IB History StudentsJessica Breiman
 
Legislacion Adiestrador y Educador de Perros Potencialmente Peligrosos. Comun...
Legislacion Adiestrador y Educador de Perros Potencialmente Peligrosos. Comun...Legislacion Adiestrador y Educador de Perros Potencialmente Peligrosos. Comun...
Legislacion Adiestrador y Educador de Perros Potencialmente Peligrosos. Comun...tormosmaite
 

Andere mochten auch (20)

The Magic of Offal in Chef mag
The Magic of Offal in Chef magThe Magic of Offal in Chef mag
The Magic of Offal in Chef mag
 
Reporting at GWA Parents
Reporting at GWA ParentsReporting at GWA Parents
Reporting at GWA Parents
 
Tooling JavaScript to ensure consistency in coding style
Tooling JavaScript to ensure consistency in coding styleTooling JavaScript to ensure consistency in coding style
Tooling JavaScript to ensure consistency in coding style
 
Diez razones para contratar un agente inmobiliario
Diez razones para contratar un agente inmobiliarioDiez razones para contratar un agente inmobiliario
Diez razones para contratar un agente inmobiliario
 
Kieran Pehm | How to reduce complaints from patients with low health literacy?
Kieran Pehm | How to reduce complaints  from patients with low  health literacy?Kieran Pehm | How to reduce complaints  from patients with low  health literacy?
Kieran Pehm | How to reduce complaints from patients with low health literacy?
 
Coches electricos
Coches electricosCoches electricos
Coches electricos
 
E twinning september_2010_web
E twinning september_2010_webE twinning september_2010_web
E twinning september_2010_web
 
Making Money With Affiliate Programs for Beginners
Making Money With Affiliate Programs for BeginnersMaking Money With Affiliate Programs for Beginners
Making Money With Affiliate Programs for Beginners
 
Proyecto
ProyectoProyecto
Proyecto
 
La venta y el servicio por teléfono por José Holmer Torres - www.josehtorresc...
La venta y el servicio por teléfono por José Holmer Torres - www.josehtorresc...La venta y el servicio por teléfono por José Holmer Torres - www.josehtorresc...
La venta y el servicio por teléfono por José Holmer Torres - www.josehtorresc...
 
Cerrajeros En Alella 651 novecientos ochenta y dos 619 Apertura De Puertas E...
Cerrajeros En Alella 651 novecientos ochenta y dos 619 Apertura De Puertas E...Cerrajeros En Alella 651 novecientos ochenta y dos 619 Apertura De Puertas E...
Cerrajeros En Alella 651 novecientos ochenta y dos 619 Apertura De Puertas E...
 
Reunion rfc 201415 10_15_v2.0 (presentacion)
Reunion rfc 201415 10_15_v2.0 (presentacion)Reunion rfc 201415 10_15_v2.0 (presentacion)
Reunion rfc 201415 10_15_v2.0 (presentacion)
 
GE Money Work Life Balance
GE Money Work Life BalanceGE Money Work Life Balance
GE Money Work Life Balance
 
Eco actu n°18
Eco actu n°18Eco actu n°18
Eco actu n°18
 
Gm crops world hunger
Gm crops world hungerGm crops world hunger
Gm crops world hunger
 
oVirt 3.5 - Einführung und Evaluierungsergebnisse
oVirt 3.5 - Einführung und EvaluierungsergebnisseoVirt 3.5 - Einführung und Evaluierungsergebnisse
oVirt 3.5 - Einführung und Evaluierungsergebnisse
 
Aire comprimido #48
Aire comprimido #48Aire comprimido #48
Aire comprimido #48
 
Cv Guillermo Grebe Ok
Cv Guillermo Grebe OkCv Guillermo Grebe Ok
Cv Guillermo Grebe Ok
 
Intro to Library Research for IB History Students
Intro to Library Research for IB History StudentsIntro to Library Research for IB History Students
Intro to Library Research for IB History Students
 
Legislacion Adiestrador y Educador de Perros Potencialmente Peligrosos. Comun...
Legislacion Adiestrador y Educador de Perros Potencialmente Peligrosos. Comun...Legislacion Adiestrador y Educador de Perros Potencialmente Peligrosos. Comun...
Legislacion Adiestrador y Educador de Perros Potencialmente Peligrosos. Comun...
 

Ähnlich wie Internet Policy Final Project (Group 6)

Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkGary Chambers
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxhealdkathaleen
 
Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workShankar Myadharaveni
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward F. T. Charfauros
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Vijay Dalmia
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employersdsalmeida
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Kielentot Martinez
 
Why do you need an it policy it-toolkits
Why do you need an it policy     it-toolkitsWhy do you need an it policy     it-toolkits
Why do you need an it policy it-toolkitsIT-Toolkits.org
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Human Resources & Payroll
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereKelly Savage
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)hassan777898
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfEnov8
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoringProxies Rent
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012PBeisty
 
Read Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxRead Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxleonorepour284
 

Ähnlich wie Internet Policy Final Project (Group 6) (20)

Liabilty
LiabiltyLiabilty
Liabilty
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at Work
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
Internet Misuse inside the Company
Internet Misuse inside the CompanyInternet Misuse inside the Company
Internet Misuse inside the Company
 
Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_work
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employers
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)
 
Why do you need an it policy it-toolkits
Why do you need an it policy     it-toolkitsWhy do you need an it policy     it-toolkits
Why do you need an it policy it-toolkits
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and Blogosphere
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
 
Case study 10
Case study 10Case study 10
Case study 10
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012
 
Read Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxRead Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docx
 

Kürzlich hochgeladen

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 

Kürzlich hochgeladen (20)

FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 

Internet Policy Final Project (Group 6)

  • 1. Internet Policy By: Matt Maurice, Rebecca Vint, Chris Hudac
  • 2. Presentation Agenda  Overview of internet policy within a company  Pros and Cons of internet policies  Real life examples of company internet policies  Conclusion: agree or disagree with having an internet policy
  • 3. Internet Policy  Internet Policy provides employees with rules and guidelines about the appropriate use of company equipment, network and company internet access.  Having this policy helps to protect both the business and employee  Employees are made aware browsing certain cites and downloading certain files are prohibited.  Employees must adhere to policy or face serious repercussions.
  • 4. Internet Policy  By adhering to this policy, along with the potential for serious repercussions, leads to fewer security risks for the business.  Internet usage on company time, is authorized to conduct company business only.  Internet usage also creates the possibility of contamination to the company system via viruses or spyware.  Under no circumstances may company computers or other electronic devices be used to obtain, view or reach any pornographic, or otherwise immoral, unethical, or nonbusiness related internet sites.
  • 5. Email Policy  Like the general internet policy, email is also to be used for company business only.  You are not to conduct personal business using the companies computer or email.  Forwarding non-business emails to associates, family, or friends wastes company time and attention.  Keep in mind that the company owns any communication sent via email or that is stored on company equipment.  Management and other authorized staff have the right to access any material in your email or on your computer at any time.
  • 6. Internet Policy  Every company, no matter their size, that uses computers, should have a written internet policy.  Make all employees sign the company internet policy on their first day on the job.  Even upper level managers in a company should sign this policy, if only to show everyone throughout the company that any violations will not be tolerated no matter your status within the company.
  • 7.  If you suspect someone is abusing your computer system and internet policy, at first, talk to them or even send out company-wide reminders about the policy.  You want to trust all of your employees. In order to not seem like you are constantly peeking over their shoulders, there is a way to monitor their internet usage discretely.  Applications known as “snooping” hide on employees computers and keep a record of what he or she does.  This record can be set to email you regular reports to keep track of employees activity.  Laws and courts have given employers wide discretion in watching what happens on their company computers.
  • 8. Pros of Internet Policy  Higher employee productivity  Reduce risk of malware and SPAM problems  Reduce risk of potential legal problems  Written policy so there is no confusion  Having a policy protects both the company and the employee
  • 9. Cons of Internet Policy  It is costly to implement and maintain protective measures  Decreased morale as employees feel they are not trusted  Low morale could lower productivity  Potential violation of employee privacy if being monitored
  • 10. Internet Policy Example  The following hyperlink will take you to a template of sample company internet policy:  http://www.sans.org/security-resources/policies/internet-usagepolicy.pdf  The following hyperlink will take you to a YouTube video of a brief slideshow of an actual company’s Internet and Computer Usage Policy:  http://www.youtube.com/watch?v=P6bOeGfluHQ
  • 11. Companies keep an eye on workers’ Internet use  http://usatoday30.usatoday.com/tech/news/internetprivacy/20 06-02-20-internet-abuse_x.htm  Above is an article written by the USA Today.  The article outlines many of the actions that companies such as GM, the City of Pittsburgh, and Blue Bell Creameries in Texas.  Statistics from the article:  Top reasons for wasting time on the job:      Don’t have enough work to do: 33.2% Underpaid for amount of work: 23.4% Distracting co-workers: 14.7% Not enough evening or weekend time: 12.0%  Source: Salary.com and America Online survey of 10,044 respondents
  • 12. Morgan Hunter Internet Policy  http://www.morganhunter.com/themes/morganhunter/pdfs/M HC_Internet_Services_Use_Policy.pdf  Attached is another example of an Internet Services Use Policy by Morgan Hunter which is a Job Search firm that specializes in finding employment for individuals that need it.  The policy is very detailed and also addresses many questions that might come from the policy itself.
  • 13. Employers Struggle with Internet Usage and declining productivity.  http://www.bizjournals.com/louisville/printedition/2012/05/11/employers-struggle-with-developing.html?page=all  This is an article from Business first that talks about how many companies have added a new layer to Human Resources.  Employers are concerned with a decrease in productivity.  The internet presents many practical uses for a business but monitoring is especially difficult.  66% of employers monitor  65% of employers filter or block sites they do not want employees accessing.
  • 14. Internet Policies for Human Resources  http://smallbusiness.chron.com/internet-policies-humanresources-2243.html  This is a great explanation from Chron.com that provides ideas and the reasons behind each item included in an internet policy.      Personal Use Email Use Forbidden Sites Privacy Consequences
  • 15. Conclusion  In conclusion, we strongly believe that companies and firms should indeed have an Internet Policy.  The policy should be in writing, where all new employees must read, sign and follow for their duration of employment.  Not only does it provide a higher quality work environment, but also makes for a lesser chance of legal issues for both the employee and the company.
  • 16. References  http://www.sans.org/security-resources/policies/internetusage-policy.pdf  http://humanresources.about.com/od/policiesandsamples1/a/ email_policy.htm  http://careerplanning.about.com/cs/bosscoworkers/a/net_at_ work.htm  http://www.gfi.com/pages/sample-internet-usage-policy  http://www.microsoft.com/business/enus/resources/management/employee-relations/why-youneed-a-company-policy-on-internetuse.aspx?fbid=vM7gP4JZzqt

Hinweis der Redaktion

  1. An internet usage policy provides employees with rules and guidelines about the appropriate use of company equipment, network and Internet access. Having such a policy in place helps to protect both the business and the employee.
  2. The employee will be aware that browsing certain sites or downloading files is prohibited and that the policy must be adhered to or there could be serious repercussions, thus leading to fewer security risks for the business as a result of employee negligence. 
  3. Voice mail, email, and Internet usage assigned to an employee's computer or telephone extensions are solely for the purpose of conducting Company business. Email is also to be used for Company business only. Company confidential information must not be shared outside of the Company, without authorization, at any time. You are also not to conduct personal business using the Company computer or email. Keep in mind that the Company owns any communication sent via email or that is stored on company equipment. Management and other authorized staff have the right to access any material in your email or on your computer at any time.
  4. The Internet Usage Policy is an important document that must be signed by all employees upon starting work. Make all employees sign our computing policy on their first day of work.
  5. If you suspect that someone is abusing your computer system, what do you do? First, talk to them and send e-mail reminders. Tell employees that they are there to work, not to shop or to tend to their personal business. “Snooping” applications hide on the employee's computer and keep a record of what he or she does. They can be set to e-mail you a regular report. And they are difficult to detect.
  6. Make all employees sign our computing policy on their first day of work.
  7. According to the survey, 25% of employees use the Internet for personal use during office hours for at least ten minutes each day. Thirteen percent of workers use the Internet for at least two hours per day.