In the course of a normal workday, regardless

In today’s modern world, nearly every
industry has readily available access to, or uses computers in some capacity on
a daily basis.  From a simple
productivity standpoint to something much more severe such as the jeopardization
of proprietary information, it has become necessary for companies monitor their
employees use of their computing resources. 
Even though it may not be the most popular practice for some employees,
if proper measures and precautions are taken, employee monitoring can prove to
be both a time and money saving practice for businesses.Social
Media Use/Policies            With social media such as Facebook,
Snapchat, Twitter, Instagram, etc. taking a more and more prevalent role in our
daily routines, many companies have incorporated a social media policy in order
to increase productivity and minimize time wasting (Allan, 2016).  Even so, a 2016 Pew Research Center survey
revealed that 77% of employees still use social media during the course of a
normal workday, regardless of any policies in place (Hyman, 2016).  Imagine how many man-hours and/or money could
be saved if this number was minimized.Monitoring
SoftwareEven though it causes a reduction in
productivity, social media use’s consequences could be considered minimal when
compared to a system crash or other devastating event that could occur by an
employee unknowingly downloading a virus from a malicious email
attachment.  Harmful worms, viruses, Denial
of Service attacks, etc. can appear to be harmless in an email and/or may not
even present itself at all until commanded to do so by its threat agent.  For this reason, many companies use email
filtering software to prevent phishing, Denial of Service, spam, malware,
etc.  These security programs scan every
incoming and outgoing email for potential threats and are constantly updating
their databases in order to keep abreast of and stay up to date with the most
recent security threats (Barracuda, 2017).Physical
SecurityBesides having monitoring software and
policies in place, the easiest way for a company to monitor its employees’
computer usage is to physically limit which areas, machines, programs, etc.
they have access to.  For example, a
worker in an Amazon Fulfillment Center whose job is to package orders to be
shipped, should have no need to access any payroll or financial information
from the accounting department. 
Physically denying his/her access to the areas/rooms where these
computers are housed via swipe card, key codes, etc. is the most basic way to
monitor employees.  Assuming an employee
has authorized access to such areas, the physical security systems surveil
when, where, and by who certain areas are accessed.  Unique usernames and passwords are also used
to monitor and limit employees’ access to confidential and proprietary
information/data.ConclusionRegardless of whether or not some
employees view monitoring as an invasion of privacy or lack of trust, having
such systems, practices, and policies in place is extremely beneficial to a
company as they provide safety and security for their information.