The Pros And Cons Of Workplace Monitoring

Great Essays
Introduction ( thesis ) - James Zeigler, Justin Sanford

The use of monitoring software in a business setting carries ethical questions about the level of monitoring conducted by employers and how this monitoring and restriction of access effects employee morale, and corporate trust. Employees will shop, do their banking, check up on personal emails, catch up on social media, tweet and in extreme cases watch their favorite Netflix series or television show. While some of these employees do this on occasion or on a short break such as lunch, others will abuse this access creating a problem for the company. Access to information comes easy these days and with the ability to obtain this information with just the click of a button can create hostile, unproductive environments in the workplace and even cause legal issues within the company. Workplace monitoring not only allow a business to track productivity and keep tabs on leaked confidential company information but also uphold employee safety and security.

We will examine the pros and cons that come with monitoring software installed on employees devices for both the company and employee. We will
…show more content…
Why is there a need to implement a technology that most people would be strongly opposed to on private devices and networks. What issues are addressed for corporations who implement these types of monitoring software? To adequately do answer this, its important to pay attention to the selling points of the companies that provide this type of software. There exists a large number of companies offering this exact service with varying levels of recording and tools to restrict access. One of these offerings, Staff Cop, provides one of the most extensive tool sets for corporations. Staff Cop boasts a laundry list of

Related Documents

  • Decent Essays

    Working alone, I immersed myself in this environment and worked toward removing inefficiencies, security oversights, and business continuity issues. As I hope you’ll see, the high-security, HIPAA-compliant environments that I’ve worked in have exposed me to policies, products, and procedures that I can bring to your organization to help strengthen your information security program. Additionally, my expertise in securing iOS and Android mobile devices means that I can help mitigate threats to this increasingly significant portion of your computing…

    • 320 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    In the article, Fitbits for Bosses, Lynn Stuart Parramore wrote about the concept of employees wearing arm bands that will record your psychological and physical data, such as blood pressure or heart rate, while working to collect and examine. The authors argument is strongly yielded to the invasion of privacy this source of technology can cause among the mass. This article is well based but the method that the author used to present this argument is demanding and untrustworthy; nevertheless the authors persuasion techniques can be corrected. Parramore lacks ethos and and trust that comes with it along with the emotional connection to the debasement of human body functions being studied like lab projects. Lynn S. Parramore’s article presents the concerning idea of biosurveillance, which is a concept that is usually only used to study diseases or activities that may cause harm to nature, animals, or humanity.…

    • 1002 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    At no time should the workstation be used for personal email use, (i.e. sending or receiving), or social networking sites. The company has a secondary Internet Service Provider (ISP), and that should be used for personal email and social networking via your personal devices, such as cell phones and tablets. Again, you are not permitted to send company information using personal devices or email/social media. Key Control Maintaining constant watch over who has access to what electronic and physical key access is imperative.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Hi Professor Bowers, You presented an excellent point – that there may be some twist in the case scenario, e.g., the nurse operating remotely – away from the patient’s bedside. In cases like this, it would be well for the nurse to act on her initial assessment of the patient prior to the outage and relay on her own instincts and “reached into her knowledge base of previous learning and experience” (McGonigle & Mastrian, 2015, p. 6). In addition, as cited by Stokowski (2008) The call center is not the place for novice or inexperienced nurses.…

    • 304 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    With today’s technology, there is a rift between technology and personal privacy. Currently, no precise federal law prohibits surveillance cameras, but there is a fear with common-law confidentiality rights, which frequently leads to an evaluation of a person's "reasonable expectation of privacy. " Expectation of privacy is not an issue when overt cameras are used. A person’s expectation of privacy is also not void when on public campuses, such as Grand Valley. Surveillance cameras in public locations such as sidewalks or parking lots are no problem because there is not an expectation of privacy in such areas.…

    • 111 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Throughout the novel Brave New World by Aldous Huxley, there are numerous allusions to surveillance of individuals. However, an interesting property of the surveillance state is that it relies heavily on the fear of reprisal from other citizens. For example, in the new world, those who spend time alone or participate in monogamous relationships are chastised by fellow citizens and reprimanded by the government. Although this may appear to be a far cry from our world, there are numerous parallels that can be drawn between the two.…

    • 824 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    There were many negative and positive effects that came from 9/11. Some of these effects only lasted for a short period of time to help protect and defend the American public. However, there were also many effects that have lasted for a long time. One of those effects is how the attacks have changed America's surveillance on their citizens. The Foreign Intelligence Surveillance Act (FISA), which was put into place in 1978 and allows the government to tap into citizen's electronics and monitor them for foreign intelligence information, has changed drastically since the events of 9/11.…

    • 859 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Abstract—Chronic diseases such as diabetes, blood pressure and cardiovascular diseases are the major reasons of dies in the world. The World Health Organization announced that they are responsible for 63% of dying; with 29% have less than 60 old. Therefore, many recommendations are proposed to monitor the patients and help them to reduce the complications of these chronic diseases. However, such healthcare monitoring has a negative effect of limiting the patient’s lifestyle. Ambient intelligence (AmI), with its ubiquity, transparency, mobility, and context aware characterizations, is a promise solution for healthcare monitoring.…

    • 142 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Spying In 1984

    • 825 Words
    • 4 Pages

    Everything you do electronically can be tracked, saved, and manipulated, regardless of where you are. Widescale spying occurring today eerily mimics George Orwell’s 1984 in an imminent and frightening way, as average people are no longer as private as they used to be. In 1984, Winston is trapped within a totalitarian government that watches everything its residents do or say. These residents are spied on everywhere they go and are never immune to government overwatch. In the United States today, normal citizens are being watched by internet-connected devices, government big-data collection, and businesses looking for profit.…

    • 825 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Korn/Ferry V. Case Study

    • 1058 Words
    • 4 Pages

    FACTS: David Nosal was a self-employed entrepreneur who opened a business mimicking his former employer Korn/Ferry’s business strategy. Korn/ Ferry operated an executive search firm, which employed several workers, who were given access to the company computer systems with the use of log in credentials. This granted employees access to critical business information, such as names and contact information for clients and others. Nosal, now a direct competitor of Korn/Ferry, asked some of Korn/Ferry employees to use their computer privileges, to access and obtain pertinent information, then supply the information to him in order to gain a competitive edge. Further, Korn/Ferry had a previously established policy in place, which prevented employees…

    • 1058 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Surveillance has presented numerous challenges to the right of privacy. There is a need to develop a high technology surveillance system that will come with great benefits without intrusion. With new advances in technology each day, it is becoming easier to communicate with each other. Yet with all these new forms of communication there have been unpleasant side effects, since this new advanced technology is not only for harmless interactions between one another it is also used to plot against governments and countries. Governments have found themselves under attack a countless number of times and have had no other choice but to resort to monitoring their citizen’s online and phone activities.…

    • 729 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Introduction In the modern world, the word “smart” is used everywhere from homes, to the schools, hospitals, market and businesses-to mention but just a few. Generally, people have come to love the word smart and want to be smart or even have smart items with them. Parents would want their children to be smart; people want to buy smart products like the Smartphone. The reality is that, you cannot avoid smart products in the modern world.…

    • 977 Words
    • 4 Pages
    Great Essays