Internet Policy
Diane Silversmith
Internet Use Policy
This memo provides justification for providing Internet access primarily as a business tool, but permitting incidental personal use at America West Finance. Extensive research uncovered significant issues related to Internet misuse that require immediate action. Further, the application of electronic surveillance was found to be an industry best practice that in necessary to protect a company's best interest. An evaluation of all Internet use options is included in this memorandum to facilitate a thorough understanding of the pros and cons for any given course of action and an implementation recommendation offers guidance for creating formal written policies that will help America West Finance achieve its objectives for Internet use.
Issues of Misuse
Internet use should not be viewed as a trivial matter. Research reveals serious issues related to lost worker productivity, the destruction and/or theft of corporate assets, and legal liability. Given these risk factors, America West Finance must act immediately to regulate Internet use.
Although America West Finance may not currently be aware of lost productivity due to Internet misuse, sometimes referred to as "cyberslacking" in its own operations, a survey from Vault.com, shows that ninety percent of the nation's workers admit to surfing recreational sites during office hours (Naughton, 1999). And, eighty-four percent of workers say they send personal email from work. Estimates show that that nearly one third of American workers' time on the Internet is spent on recreational surfing rather than company business, with the problem increasing all the time. Given this national data, it's highly likely that America West Finance, like most companies, is experiencing a drain on its employee productivity.
In addition to the lost time, the employees' Internet activities can present significant liability for America West Finance if we cannot show that we have taken reasonable steps to prevent the activities (Wulffson, 1999). E-mails and exposure to sexually explicit or otherwise offensive material on a computer screen are now at the center of many sexual harassment and discrimination claims. Further, certain material such as downloaded child pornography, may lead to criminal liability not...
In the United States and other part of the world where internet is rapidly developing, cyber threats have continued to be on the increase. Essentially, online shopping has become a modern way of doing business, and in the United States, millions of people purchase goods and services online. To make an online shopping, individuals will need to submit their credit cards or other private information to make a purchase.
President Obama's Cybersecurity and Internet Policy In the recent past, cyber attacks have become commonplace in the U.S. And also in other parts of the world. The said attacks are also increasingly becoming sophisticated. In that regard, there exists an urgent need to rein in this problem before it gets out of hand. In this text, I discuss the benefits of President Obama's Cybersecurity and Internet Policy. President Obama's Cybersecurity and
Internet Censorship The internet came to prominence as a tool and pursuit of the masses starting in the early 1990's. The capabilities, depth and breadth of what the internet has to offer have increased exponentially over the ensuing two decades. Such expansion has greatly eased the spread of information (Palfrey, 2010). The ease in which people communicate and disseminate information has created a cause for concern among many different parties that
According to the current laws, which are not really up to speed yet, an employer can monitor employee email if he or she has a legitimate business purpose for doing so. There is a belief that, because the employer has an email and computer system for employee use, the computer system (as well as the resulting email and browsing history) is the property of the employer. While this makes sense,
At the bottom line, the issue at hand is with the sanctity and safety of the students and the responsibility of the university to preserve and develop that. Moreover, many of these students are dallying into multi-dimensional virtual worlds that are beginning to closely resemble the physical world and that are having their own ethical issues arise (Wankel & Malleck, 2010). Universities need to educate themselves as to what those
Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now