As companies continue to grow and communication continues to be one of the most important factors to a successful business there are many forms that it takes on. From e-mail, the internet, and the social media a whole companies embrace the innovation of technology to enhance the flow of communication from every level of the organization. Communication has taken on many forms, but companies and its users must have policies in place to protect themselves.
Businesses want to enhance their business through improving the way the organization communicates with its employees. Starting with their current software many businesses purchase new enhancements to their current software to make it easier for the employees to gather information and communicate with others to increase productivity and profitability within the organization. “Almost all office employees are expected to know how to navigate through the Web and to use word processing, e-mail, spreadsheet, database, and presentation software.” (pg 14) As enhancements are added the time is spent in teaching teams how to use the software to be able to use it to the fullest.
Starting with internet and the intranet, companies are using both forms to allow their employees access information with a click of the mouse. The internet allows individuals to use the social-networking tools to, “allow users to post a profile, blog, or useful links which allow workers to interact on a more personal level. Moreover, employees can share client information, and the social-networking tools may promote collaboration.” (pg. 14) The intranet allows individuals to get facts from statistics, records, logs, training, rules and regulations, and to any other form of information the company wants to share with...
... middle of paper ...
...attach these devices. Others are performing random checks of laptops to look for unauthorized or unsecured files and using scans of fingerprints, eyes, or faces to limit and track access to specific computers.” (pg. 17)
As companies continue to enhance their business through innovation and technology to increase profitability and productivity organizations will continue to evolve with the advancements. Employees need to understand that the company must protect their information and through “big brother” or the security department it is their job to secure that information. Employees know this and the vast majority follow the guidelines and policies set in place to protect the company and their job. There are a few that do not follow the policies and there are held accountability by severity of the misconduct and it could lead to documentation or even termination.
The reality is in 2013 most American lives are being logged at every step from being filmed as they buy a soda at 7-11 or doing your homework at the computer lab at a community college. And, although many have heard about this intrusion, many do not most know the extent of this information and its impact when it is combined in a profile. This profile is used in background checks for top security clearances that the Office of Personnel Management (2013) requires to obtain this credential. Today, all people that have top security clearances are at risk to be targeted in ways that are deviant and often passive. To understand the profile is used to supply background checks, a history of the former company ChoicePoint will be explained to show this security threat of this now defunct company has contributed to this risk.
Evolving communications technology has changed the way business personnel communicate within an organization. The use of technology allows companies to be more dynamic and adaptive to changes by allowing instantaneous communications via interconnected computer networks. This dependency on information and communications technology has evolved these emerging technologies as crucial tools for providing operational support to business communications tasks (Wilkinson, 2006). Remaining competitive is a primary goal of organizations and effective communications help companies achieve this goal. Competency in communications is considered the root of success for many activities including planning, organizing, team work, and leadership (Waldeck, Durante, Helmuth, & Marcia, 2012).
In recent times our right to privacy has been under fire, particularly in the workplace. With the fear of terrorists in today's world, we have been willing to sacrifice some of our individual rights for the rights of a society as a whole. A majority of these changes have taken place since September 11, 2001, in an attempt to prevent future terrorist attacks. New legislation, such as the USA Patriot Act, which decreases the limitations on the federal government's ability to monitor people, has been created for this reason. Although new legislation may be instrumental in the defense of our national security, we must take a strong look at their effect and the effect of decreased privacy in the workplace. Advances in technology, coupled with new legislation, has had a serious toll on our privacy especially at work. It is now possible to monitor an employee's keystrokes on the computer to how much time a day is spent on bathroom breaks. It is imperative for us to take a stand against these violations to our rights
Coca-Cola Security Breach Put Personal Information Of 74,000 Employees at risk. Failure here appears to be processes surrounding disposal of old equipment without doing any encryption causing data to be breached. Also some times, a criminal can act as an employee
In my opinion, employees should not be able to use the internet while at work. The computers and networks are business property and are solely used for business transactions. Thus, employers have a duty and a right to ensure proper usage of any, and all, equipment. If employers decide to, they may choose to monitor the usage of the internet to ensure the property is not abused. According to the Electronic Communications Privacy Act, 18 USC 2510, et. seq., (www.law.cornell.edu/uscode), federal law allows employers to monitor business calls, however, personal calls are an exception. Under the federal law and employer only has the right to monitor a call until they realize that it is a personal call then must cease monitoring. In the case of Watkins v. L.M. Berry & Co., 704 F.2d 577, 583 (11th Cir. 1983), the court dictated that, "...a manager must cease listening in on an employee call once the call turns personal". When businesses first started using the internet, they did not contemplate developing new technology policies and were very liberal as to the usage of the internet. Eventually allowing liberal usage led to abuse of equipment and work time. Today, people check personal emails and facebook messages (among other social networking sites), take care of online banking, shopping, surf the net leisurely, and chat online. Employers have noticed this distraction severely impacted productivity and performance. Studies show, "Currently, as many as 26 million workers in the United States are monitored in their jobs, and this number will increase as computers are used more and more within companies and as the cost of these monitoring systems goes down" (DeTienne, 1993, p. 33). "By the end of the decade, as many as 30 milli...
As technology advances so should the products and services provided by companies. In every industry, technology is becoming the key success factor to growth and profit. The ability to communicate with people all around the world has created a new marketplace for business. In order to remain competitive, it is important for companies to utilize the most current technology. At ABC Inc., the use of the latest technological tools allows the company to provide first-rate, quality architectural engineering services to its clients. As part of the company's strategic goal to increase profits and clients, the board of directors established an information technology steering committee to look at how the company could improve its' technology. The committee was tasked to make sure the company had the latest available industry computer tools and to make sure all employees were uniform in terms of the technology. One of the most important findings of the committee's research was the fact that the company and its branches were using varying types of software and hardware systems. The findings also showed that this lack of uniformity caused numerous communication problems not only with the branches and corporate offices, but also the clientele. These findings were reported to senior management. Based on the findings, recently, senior management made the decision to ensure all employees, branch offices and corporate office were working on the same software and hardware systems. Management decided to move the entire company to a Windows NT environment, in order to improve productivity, to create uniformity, to create a more functional network infrastructure and to develop an Intranet and Internet web sites. The Information Technology department (referred to as the "Team") was asked to take a look at the pros and cons of moving to Windows. The Team has prepared the following report based on its research efforts.
Dillon, Thomas W., Arthur J. Hamilton, Daphyne S. Thomas, and Mark L. Usry. "The Importance of Communicating Workplace Privacy Policies." Employee Responsibilities and Rights Journal 20.2 (n.d.): 119-39. Web.
Companies have determined what an employee does while at work or away from work on social media can greatly affect the company’s image. For example, the National Football League (NFL) has a code of conduct policy that holds employees of a team and organization accountable for the employee’s comments on social media. An employee, on their own time, is no longer a private entity, acting on their own accord without consequences from their employer. This new approach to managing a company’s image or message dictates how a company monitors and responds to acts, whether they are behavior, speech or actions they find inappropriate.
Skeels, M., & Grudin, J. (2009). When Social Networks Cross Boundaries: A Case Study of Workplace Use of Facebook and LinkedIn. Redmond: Microsoft.
There are slow adoption rates for internal corporate social networks for many reasons. Although management and organization plays a role, the technology factor is the main reasons why employees are refusing to use these internal networks. With the rate at which technology is becoming more and more advanced, social networking systems are constantly updating their software and user interface (Laudon & Laudon, 2013). This mean that employees who are used to traditional forms of networking such as email, have to take the time to learn new systems and keep up with more social networking than they would like. In the eyes of the employee, using traditional forms of networking is simply more efficient. In order to make these internal social networking programs work, companies need to make more user friendly and easily manageable sites (Altman, 2015). Management also plays a part in the slow adoption rates. Managers need to provide more incentive for employees to use these networks aside from basic social interaction. For example, instead of sending memo’s via email, or other traditional forms of communication, slowly veer employees to seek memos on the company’s social networking site. Making strides like this will give employees more incentive to at least use the sites more often and participate in discussions and posts related to the business. This will allow employees to explore the sites and discover other useful features that might help improve productivity within the office. Organization of the sites could also be greatly approved. Many companies try to mimic other popular social networking sites, this however, may not be a viable solution. Instead, IT personnel should format th...
While monitoring has been around for many years, employees think monitoring poses a bigger threat to his or, her privacy in the workplace. Even though it is unde...
Video surveillance has existed in the work place since the invention of the television. Video surveillance cameras come in all shapes and sizes, from the obvious ones to some that are small as a dime. Many employers purchase such devices to capture employees and customers who commit theft and fraud, or any other illegal activity. The increase of technology in electronic monitoring is now able to transfer images from a camera to a computer where the employer is able to zoom in and make a positive identity of the employee or customer who is committing an illegal act.
If your employees use social media to interact with their customers, this activity will need to be described and differentiated from improper use of the same social media sites. Stresses the importance of “tailoring the policy to the nature of the employer’s business, the employee’s duties and what levels of authorization and freedom they may require to perform their job.”
Employer monitoring of workplace computers is widespread but we are still finding what the legal limitations are for work-from-home employees and individuals who live on site. The monitoring of employee’s internet usage in the workplace is an unchallenged right of employers (Grodinsky, Gumbus, & Lilly, 2010). Monitoring is used to gauge employee productivity and provide feedback on how employees can work more effectively. This also allows employers to monitor the personal use of company owned computers. The estimated cost of 53 million employee’s cyber loafing is $138 billion (Grodinsky, Gumbus, & Lilly, 2010) . The legal ramifications of employee monitoring also include the loss of privacy when it comes to Personally Identifiable Information
Workplace privacy is one of the biggest issues facing businesses today. Do you feel like you are being watched all the time, all your e-mails being read, and every key stroke is being monitored by your boss? Some people feel this way and that is why privacy in the workplace is a problem with many businesses today. Employees feel like they are not being trusted, or feel the company invades on their personal privacy, or violates their fourth amendment rights. On the other hand many businesses have many federal and state laws to follow, and must keep their assets safe, and their employees. Technology makes communications of all sorts as easy as a few pushes of a button. This technology makes it easy for an employer to monitor an employee in almost any fashion, from e-mails to video surveillance. This will make it easy for an employee to abuse the technology the company lets the employee use. Employers need and have the right to monitor their employees to avoid legal liability, as a result of harassing of offensive communications, security concerns relating to intentional or accidental release of sensitive data, and for safety concerns for there employees and business assets. Employees give up their right to privacy as soon as they walk through the door.