In today’s modern world, nearly everyindustry has readily available access to, or uses computers in some capacity ona daily basis.
From a simpleproductivity standpoint to something much more severe such as the jeopardizationof proprietary information, it has become necessary for companies monitor theiremployees use of their computing resources. Even though it may not be the most popular practice for some employees,if proper measures and precautions are taken, employee monitoring can prove tobe both a time and money saving practice for businesses.SocialMedia Use/Policies With social media such as Facebook,Snapchat, Twitter, Instagram, etc. taking a more and more prevalent role in ourdaily routines, many companies have incorporated a social media policy in orderto increase productivity and minimize time wasting (Allan, 2016). Even so, a 2016 Pew Research Center surveyrevealed that 77% of employees still use social media during the course of anormal workday, regardless of any policies in place (Hyman, 2016). Imagine how many man-hours and/or money couldbe saved if this number was minimized.
MonitoringSoftwareEven though it causes a reduction inproductivity, social media use’s consequences could be considered minimal whencompared to a system crash or other devastating event that could occur by anemployee unknowingly downloading a virus from a malicious emailattachment. Harmful worms, viruses, Denialof Service attacks, etc. can appear to be harmless in an email and/or may noteven present itself at all until commanded to do so by its threat agent. For this reason, many companies use emailfiltering software to prevent phishing, Denial of Service, spam, malware,etc. These security programs scan everyincoming and outgoing email for potential threats and are constantly updatingtheir databases in order to keep abreast of and stay up to date with the mostrecent security threats (Barracuda, 2017).
PhysicalSecurityBesides having monitoring software andpolicies in place, the easiest way for a company to monitor its employees’computer usage is to physically limit which areas, machines, programs, etc.they have access to. For example, aworker in an Amazon Fulfillment Center whose job is to package orders to beshipped, should have no need to access any payroll or financial informationfrom the accounting department. Physically denying his/her access to the areas/rooms where thesecomputers are housed via swipe card, key codes, etc. is the most basic way tomonitor employees.
Assuming an employeehas authorized access to such areas, the physical security systems surveilwhen, where, and by who certain areas are accessed. Unique usernames and passwords are also usedto monitor and limit employees’ access to confidential and proprietaryinformation/data.ConclusionRegardless of whether or not someemployees view monitoring as an invasion of privacy or lack of trust, havingsuch systems, practices, and policies in place is extremely beneficial to acompany as they provide safety and security for their information.