Prudential Financial Case Study

Superior Essays
I wanted thank you for allowing Bagley Consulting Solutions the opportunity to work with Prudential Financial. As requested, we have evaluated the email and internet usage company wide, which would include the board of directors and have made recommendations on potential policy’s that would reduce overall personal employee usage of the internet as well as prevent unethical or malicious activity. Our analysis included incoming and outgoing email, websites access, and overall internet usage by employee. Based on our assessment, we are making the following recommendations:
1. Redefine employee polices for email and internet usage.
2. Implement an annual acknowledgement/certification of said policies.
3. Implement processes for Corporate Governance.
…show more content…
Furthermore, the duty of loyalty applies to the board of directors as it stands for the principles of a corporation in making all decisions in their capacities as corporate fiduciaries, must act without personal economic conflict. The duty of loyalty can be breached either by making a self-interested transaction or taking a corporate opportunity (Velasco, 2015). .In order for Prudential Financial to prevent any violations of the duty of loyalty, it is recommended that, if a fiduciary wishes to make a self-interested transaction, or take a corporate opportunity, the fiduciary must first fully disclose both the facts of the conflict, and the details of the transaction and obtain approval for such transactions by the CEO. For employees, the uses of internet in work place has some pros and cons sometimes it may affect the violation of the duty care or duty of loyalty and sometime its uses enhance the productivity of the employee. This relates to the ethics of the employee for what purpose they are using the internet for at work place. If the employee is using to share the company stuff personally it becomes the serious concern. However, this is the whole sole responsibility of the employee to not use abuse the internet, which could potential violate the duty of care or duty of …show more content…
With the increased use of technology and Internet, it is very important to focus on the privacy policy at workplace. Internet and e-mail policy referred to the policy that controls the usage and Internet browsing behavior at workplace, which would also deter from malfeasance activity within the organizations. Corporate governance is needed in order to maintain and evaluate process and policies. The governance should include the include monitoring the activities through electronic monitoring system. This can be done with collaborative work of human resource and IT department, conducting surprise audit on a monthly or weekly basis to better control the Internet usage by the employees. In addition to having a clear and comprehensive acceptable usage policy in place, as well as ensures employees are made aware of such policy and recognize there are consequences of their non-compliance. Management should continue to review the acceptable usage policy regularly and ensure it is up to date and work to educate employees about the implications of personal use of internet at work. To ensure the reduction in internet usage, it is also recommended that management provide computers in an environment that is dedicated for

Related Documents

  • Superior Essays

    10). This quote shows that right at that point of the article, he/she is looking at the people that work within a company. Then the author also looks at the other group of people too, which are just the general audience (e.g. adults, parents, teachers, etc. ), because after the statement about how the companies should protect themselves the webpage article then states "Below are some key steps to protecting your computer…" ("Cyber Crime", n.d., Protections, para.…

    • 869 Words
    • 4 Pages
    Superior Essays
  • Decent Essays

    Each employee should supervise other two colleagues and be responsible for the trade secret in the team. Modern & Future Technology Inc. also provides different company software code for our employees to access contracts, orders, clients' lists, and company emails with permission. In the end, we guarantee the privacy from the results of marketing surveys from potential customers by disclosed the documents after the analysis and…

    • 1083 Words
    • 5 Pages
    Decent Essays
  • Improved Essays

    Monitoring Internet Activity Internet activity using AlphaTech Networks will be routinely monitored by our Security Department. Bad websites automatically reported and reviewed, and appropriate action will be taken in that regard. Auditing: Measure and procedures to be used to audit employee misconduct Improving policies of governance is critical for any organization, and auditing it’s compliance and ethics program is crucial for good governance. This section is intended to inform the reader of the practice and guidances AlphaTech will follow to complete an audit of our Ethics and Compliance program. Frequency of audits The audit will be taking place twice a year.…

    • 817 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    After more investigation, I found that many other customers have used the blog in the past to fix technology problems within their products. This is an example of how organizations should operate their business, by treating their customers like humans, rather than money. Microsoft ensures that their communities are managed in a way that reflects their concern with please their customers. The key to social customer relationship management is to keep in touch with customers and fulfill their needs over the internet. I find myself researching organizations Facebook before offering my business.…

    • 803 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    IT Internal Control System

    • 1001 Words
    • 5 Pages

    Every day, the companies have hundreds or thousands of business transactions with customers and vendors, and through these transactions, the data gets processed, collected and stored. The data collected and stored from transactions usually contains individual customer’s and vendors private and business information that must be protected and safeguarded by the company’s effective and efficient control systems. Incidents may happen to anyone, and data processed and collected from transaction may intentionally or unintentionally released to an untrusted environment and may cause more damage for the companies; therefore, these data needs to be safely and secure guarded against any data breach and must be controlled by effective and efficient IT…

    • 1001 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    Negligent Tort

    • 1373 Words
    • 5 Pages

    This portfolio project will focus on analyzing subjects that must be well planned and explained for a workplace setting. The idea behind this is to help an organization at staying productive, and to protect their assets from violations by their employers. Before this discussion goes any farther, let’s begin by mentioning that the subject at hand will focus on employee use of the internet at work. This idea for this project will aid in planning for policy assembling by one particular 5oo fortune company. This proposal is intended to support any other proposals by the company’s managing group.…

    • 1373 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Corporate privacy has become a contentious issue in the current technological world where email, voicemail, and fax is the norm for most companies. Business creates corporate privacy policies to describe how personal information and organizational information is gathered, stored and used (Boddington 1). However, with an advent of modern technology, especially the internet, ethical dilemmas which rises include how to keep the corporate and personal information private to avoid infringing on either party 's right while maintaining managerial control to enhance efficiency at workplace. To both employees and the business communication technology has redefined what is good and what is bad. In this paper, I will discuss the ethical issues that the…

    • 1494 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    A written policy is established that clearly will list acceptable uses for company computers. This policy will list consequences for not following this policy and it will also list Paradigm’s right to monitor their employees Internet usage. Consequences for improper internet usage for employees would start with a verbal warning. The next step would be a written warning if the behavior continued. A decision making leave day would be the next step and eventually termination of employment if the behavior did not improve.…

    • 867 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Confidentiality Policy Employees are exposed to confidential or proprietary information on a daily basis. A confidentiality policy, along with a confidentiality agreement, seeks to protect proprietary information from disclosure to outside entities or individuals. Many companies require their employees to maintain some measure of confidentiality as to the work in which they are involved in at the company (J. J. Keller & Associates, 2012). Protection of company information is essential to its capacity to develop new products and services and gain economic advantages in the marketplace (Hammell J. W., 2015). a.…

    • 1462 Words
    • 6 Pages
    Great Essays
  • Great Essays

    Security Camera Check for recording and function. This is important because you need to know what happens to your company during non-business hours. Was anyone there, and how did the employees close the place did anyone do anything illegal?2. Check the updates for the Toast program. This is critical because this is the main program basically running your system it must be functioning at its peak.…

    • 1574 Words
    • 7 Pages
    Great Essays