11 Jul 2022

105

How Much Internet Usage is Acceptable at Work?

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 1137

Pages: 4

Downloads: 0

Pros and Cons of Monitoring Internet Usage 

The fact that something is expedient does not mean that it is right. Expediency has been defined as the convenient means to achieve an end, without paying too much reference to ethics and morality. Most of the advantages of monitoring internet usage at work are based on expediency while the disadvantages are mostly based on ethics and morality (Miller & Cross, 2015) . It must, however, be noted that the right of every employee in the organization must be balanced against the collective rights of everyone in the organization. The inadvertence of one employee can cause enough damage to bring down the organization, thus costing everyone their jobs. This inadvertence has come to be referred to as unintentional insider threat (UIT) (Slusky & Goodrich, 2016) . 

Among the advantages of business protection is avoid of internal sabotage of the company. Among the greatest assets to any company apart from human talent is secrets. This includes the patented or non-patented information that gives a commercial entity an edge over its competitors. A disgruntled or ill-informed employee can reveal such information with devastating consequences to the organization. Further, having an understanding of whether or not employees are committed is exceptionally advantageous, so is evaluating the level of employee engagement and satisfaction. This information can be used not necessarily to discipline employee but to augment ways and means of motivating them. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Among the major disadvantages lies in the fact that employees have a private life over and above being employed. They have families, religious beliefs and even political affiliations. In a free country, everyone is allowed to retain secrets about these, but this fundamental right is taken away by monitoring of internet usage at work. Private emails, for example, can easily reflect the sexual orientation of an individual which is something no one should be compelled to reveal. The second major disadvantage of monitoring internet usage lies in the fact that monitoring systems record data and as long as the data is secured in one place, it becomes susceptible to hacking and exposure. This amounts to privacy risks for the employees. 

Reflection on Whether or Not to Work for an Employer who Monitors Internet 

Employment may be based on contract but is in the real sense a relationship based on modern human management theories. In any relationship, being too close or too far is poisonous to the relationship. An employer who comes close enough to learn what I write in my private emails, what I post on Facebook, and what I text on Messenger will be too familiar. Familiarity breeds both contempt and conflict. I would, therefore, prefer a boss with boundaries, who does not seek to encroach on my privacy to a certain extent. This is the employer who only monitors my work emails, not my private ones. However, I do understand that cybersecurity is among the most important areas of security for the modern company (Slusky & Goodrich, 2016) . I would both accept and encourage monitoring if being done, not to peruse the content of the messages, but rather for security reasons. For example, plugging in a mobile device into the company's secured systems can compromise the entire system. Only careful monitoring can prevent this from happening. 

Key Points Regarding Internet Usage and Monitoring 

Expediency demands some level of computer monitoring in the workplace, but t he same must be carefully regulated and balanced. The Township High School District 113. (2016) article is an excellent example of this balance. This article reflects the dangers that internet usage poses to all stakeholders and the need for privacy by employees. On the one hand, it carefully outlines why the monitoring of internet usage benefits all stakeholders including those who are being monitored. Further, it ventures into the area of cybersecurity and morality which are among the leading grounds for internet monitoring for employees. The report also champions the right to privacy for the individual employee and argues that this right cannot be taken away unless it is necessary. 

It is such a balance that a good internet usage and monitoring policy ought to be based. For a start, employees ought to be enlightened on proper internet usage and avoidance of anything that can adversely affect the employer or colleagues. This enlightenment should be based on a carefully developed policy regarding internet usage in the office. For example, the law on internet usage is well set out on a federal and state level. Its provisions in subjects such as sexual harassment should be taught. Further, the extent to which monitoring is being carried out and what amounts to a violation should be elaborated for all employees (The Township High School District 113, 2016). 

The second key point is the subject of monitoring. The internet is too wide and too important an avenue to be left without some form of superintendence. There must, however, be careful limits on what is to be monitored and what is not to be monitored based on probable cause rules (Clarkson et al., 2014) . For example, an email will not be opened and read unless there is probable cause. The employees must be informed about the probable cause rules so they can understand on which subjects they can express themselves freely without any fear of snooping around by the employer. 

Reflection on Policy about Friending Colleagues 

Human beings are by their very nature social beings who aspire to interact in and outside their places of work. Social networks have provided an effective avenue for this interaction with "friending" one another on social media being integral to this interaction. However, friending only amounts to an indication of acquaintance and cannot be perceived as a high level of fraternization. Preventing ‘friending’ would be tantamount to preventing physical salutation or the holding of conversations in the office. Only an ill-motive can cause this. 

The concept of divide and rule, a possible ill-motive above, is very effective as a tool for control in a working environment. This is one of the reasons why some employers limit union activities and employee associations in the workplace. The divide and rule tool is also an instrument of oppression and should be discouraged at all cost. An employer who seeks to actively dissuade employees from interacting must have some ill-motive and is not an ideal employer. A good example of the same would be employee oppression which would be revealed if employees spoke freely with one another. 

Termination based on social media post 

Termination of employment is a complex issue that includes legal and ethical connotations. Any decision to terminate must be based on solid grounds and must also include the right for the employee to be informed of these grounds and present a defense against them. Social media posts vary exponentially. An employee who posts secrets about an office issue on social media thus tarnishing the image of the company, or uses racial epithets in a manner that can be associated with the employer, must be terminated as this is indiscipline. This is, however, the exception and not the norm. The image of an employer is mostly reflected in what the employees post because most social networks display employment information on social media sites. This means that termination on the basis of social media posts must be done on a case by case basis (Clarkson et al., 2014) . 

References 

Clarkson, K., Miller, R., & Cross, F. (2014).  Business Law: Texts and Cases . Independence, KY: Nelson Education 

Miller, ‎R. &Cross, F. (2015). Managerial Strategy. Many Companies Have to Revise Their Social Media Policies. Boston: Cengage Learning 

Slusky, L., & Goodrich, J. A. (2016, June). Human Factors of Cybersecurity Awareness. In  EdMedia: World Conference on Educational Media and Technology  (pp. 436-444). Association for the Advancement of Computing in Education (AACE) 

The Township High School District 113 . (2016).  Electronic Communications/Social Media Use . PP. 1-5 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). How Much Internet Usage is Acceptable at Work?.
https://studybounty.com/how-much-internet-usage-is-acceptable-at-work-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Drive: The Surprising Things that Motivate Us (2009) Review

Drive: The Surprising Things that Motivate Us (2009) is a book written by Daniel H Pink which describes how intrinsic factors motivate people into doing certain activities. The book tries to debunk lifelong theories...

Words: 1666

Pages: 6

Views: 150

How Coca-Cola's Business Model Has Changed Over the Years

According to Heraclitus, a Greece philosopher, change is permanent, and it is fundamental to the world. He aimed to descrin ofbe the significance of handling difference among human beings and the organization....

Words: 1178

Pages: 5

Views: 140

Internal Recruitment: How to Find, Hire, and Retain the Best Employees

The purpose of an internal and transfer policy is to create new opportunities for promotions and transfers within a certain department or an organization in general. The policy is to improve mobility, which is upward...

Words: 880

Pages: 3

Views: 46

How to Improve Employee Performance with SAS

SAS is a business analytics software vendor located in North Carolina. The company offers several benefits to the employees which motivate them and hence increase their performance. For instance, the company provides...

Words: 318

Pages: 1

Views: 87

O*Net Job Analysis: The Ultimate Guide

Job Description According to Phillips & Gully ( n.d. ), job analysis is a methodical procedure of describing and identifying the significant aspects of an occupation and different characteristics employees...

Words: 583

Pages: 2

Views: 184

Importance of Training Needs Analysis

Organizations are consistently working towards building a competent workforce. While recruitment processes ensure that the organization hires competent workers, their skills and knowledge progressively become...

Words: 243

Pages: 1

Views: 65

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration