Verified Document

Internet Policy Term Paper

Internet Policy Diane Silversmith

Internet Use Policy

This memo provides justification for providing Internet access primarily as a business tool, but permitting incidental personal use at America West Finance. Extensive research uncovered significant issues related to Internet misuse that require immediate action. Further, the application of electronic surveillance was found to be an industry best practice that in necessary to protect a company's best interest. An evaluation of all Internet use options is included in this memorandum to facilitate a thorough understanding of the pros and cons for any given course of action and an implementation recommendation offers guidance for creating formal written policies that will help America West Finance achieve its objectives for Internet use.

Issues of Misuse

Internet use should not be viewed as a trivial matter. Research reveals serious issues related to lost worker productivity, the destruction and/or theft of corporate assets, and legal liability. Given these risk factors, America West Finance must act immediately to regulate Internet use.

Although America West Finance may not currently be aware of lost productivity due to Internet misuse, sometimes referred to as "cyberslacking" in its own operations, a survey from Vault.com, shows that ninety percent of the nation's workers admit to surfing recreational sites during office hours (Naughton, 1999). And, eighty-four percent of workers say they send personal email from work. Estimates show that that nearly one third of American workers' time on the Internet is spent on recreational surfing rather than company business, with the problem increasing all the time. Given this national data, it's highly likely that America West Finance, like most companies, is experiencing a drain on its employee productivity.

In addition to the lost time, the employees' Internet activities can present significant liability for America West Finance if we cannot show that we have taken reasonable steps to prevent the activities (Wulffson, 1999). E-mails and exposure to sexually explicit or otherwise offensive material on a computer screen are now at the center of many sexual harassment and discrimination claims. Further, certain material such as downloaded child pornography, may lead to criminal liability not...

Contact with an insecure web site may result in destructive viruses being downloaded onto the company's computers or network, or can allow access to the company's computers. This can allow outsiders to obtain sensitive company information and may lead to liability if the company is blamed for allowing the confidential information to be released. Information downloaded and then distributed through the company's computers may also lead to claims of trademark or copyright infringement.
Yet another area of liability concerns use of the internet which identifies the company (Wullfson, 1999). If employees log into Internet chat rooms, or leave email messages with their company ID, statements made by the employee may be attributed to the company, leading to claims of defamation, discrimination and unfair competition. Suprisingly, employees who shop via the Internet or subscribe to online services may create liability for the employer when they do not pay their bills.

Industry Best Practice

More than two thirds of companies in the United States engage in electronic surveillance of their employees, according to a survey from the American Management Association (Naughton, 1999). It's not a question of individual privacy, but rather it's about the abuse of company assets. Obviously, there is real concern regarding violating an employee's right to privacy. However, monitoring is considered to be legal provided that employees are aware of the nature, extent and reasons for monitoring ("Introduce and Internet and Email Policy"). Further, guidelines will help to resolve some of the ambiguities that currently exist and have the potential to prevent disputes between our company and an employee.

Evaluation of Options at America West Finance

Regarding Internet use, there are several options that America West Finance can consider (Morese and Magyera).

Option #1: Don't provide the Internet resource to employees, and prohibit Internet access at work and during work hours.

Option #2: Provide the Internet resource, but don't regulate its use.

Option #3: Provide…

Sources used in this document:
Bibliography

'E-Commerce Industry Trends." Available: http://www.plunkettresearch.com/technology/ecommerce_trends.htm#a (Accessed 3 Feb. 2005)

"Introduce and Internet and Email Policy." Business Link Available: http://www.businesslink.gov.uk/bdotg/action/detail?type=RESOURCES& itemId=1074403613 (Accessed 3 Feb. 2005).

Morese, Michael J. And Magyera, Charles P. "Internet Use Policies." Available: http://www.abanet.org/genpractice/lawyer/complete/may99morse.html (Accessed 3 Feb. 2005).

Naughton, Keith. "CyberSlacking." Newsweek. 29 Nov. 1999. Available: http://facstaff.bloomu.edu/jtomlins/new_page_24.htm (Accessed 3 Feb. 2005).
Tobin, Carol. "Internet and E-Mail Policies." May 1998. Available: http://www.mrsc.org/focuspub/intpol.aspx (Accessed 3 Feb. 2005).
Wulffson, Todd. "Internet Usage Policies in the Workplace, Part I." Available: http://www.llrx.com/features/wulffson1.htm (Accessed 3 Feb. 2005).
Cite this Document:
Copy Bibliography Citation

Related Documents

Regulating Internet Policy Regulating Internet
Words: 957 Length: 3 Document Type: Research Paper

In the United States and other part of the world where internet is rapidly developing, cyber threats have continued to be on the increase. Essentially, online shopping has become a modern way of doing business, and in the United States, millions of people purchase goods and services online. To make an online shopping, individuals will need to submit their credit cards or other private information to make a purchase.

Benefits President Obama's Cybersecurity Internet Policy
Words: 678 Length: 2 Document Type: Essay

President Obama's Cybersecurity and Internet Policy In the recent past, cyber attacks have become commonplace in the U.S. And also in other parts of the world. The said attacks are also increasingly becoming sophisticated. In that regard, there exists an urgent need to rein in this problem before it gets out of hand. In this text, I discuss the benefits of President Obama's Cybersecurity and Internet Policy. President Obama's Cybersecurity and

Internet Censorship and Freedom of Expression
Words: 2943 Length: 10 Document Type: Essay

Internet Censorship The internet came to prominence as a tool and pursuit of the masses starting in the early 1990's. The capabilities, depth and breadth of what the internet has to offer have increased exponentially over the ensuing two decades. Such expansion has greatly eased the spread of information (Palfrey, 2010). The ease in which people communicate and disseminate information has created a cause for concern among many different parties that

Internet Privacy the Main Issue
Words: 1412 Length: 4 Document Type: Thesis

According to the current laws, which are not really up to speed yet, an employer can monitor employee email if he or she has a legitimate business purpose for doing so. There is a belief that, because the employer has an email and computer system for employee use, the computer system (as well as the resulting email and browsing history) is the property of the employer. While this makes sense,

Internet Abuse in Universities Why
Words: 1663 Length: 5 Document Type: Case Study

At the bottom line, the issue at hand is with the sanctity and safety of the students and the responsibility of the university to preserve and develop that. Moreover, many of these students are dallying into multi-dimensional virtual worlds that are beginning to closely resemble the physical world and that are having their own ethical issues arise (Wankel & Malleck, 2010). Universities need to educate themselves as to what those

Internet Security, Risks Internet Security Presents Field
Words: 4724 Length: 15 Document Type: Essay

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now