StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Why and How Should Organizations Develop Comprehensive Email Policy - Term Paper Example

Cite this document
Summary
The paper "Why and How Should Organizations Develop Comprehensive Email Policy?" explains such regulations are needed because the internet and email become an intrinsic part of corporate culture, keeping staff informed on every aspect of organizational vision, mission, and daily progress…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.6% of users find it useful
Why and How Should Organizations Develop Comprehensive Email Policy
Read Text Preview

Extract of sample "Why and How Should Organizations Develop Comprehensive Email Policy"

Email policy Introduction In the emerging business environment of fast advancing technology, the computers have become an intrinsic part of work culture. In the recent times, internet has emerged as one of the most popular medium of communication with its wide range of applications in the ever expanding and highly competitive business environment. Internet with electronic mailing system has redefined the communication with its far reaching implications and has become one of the most important parts of any business strategy. In a business journal, author says that ‘e-mail has become a key method of communication in most industries, as common as the telephone’ (Rosenthal, 2005, 1). The vast potential of internet and email services, therefore, necessitates the organizations to re-evaluate their business strategy and incorporate business plans so that the organizations can successfully exploit its potential for business purposes. But it is equally true that the internet, with its huge scope for expansion has also wide ranging implications, which may have damaging effects for the overall development of the organization if it is not used with caution and with an approach that calls for greater control and discipline. The impact of computer has been extensive in almost every area of one’s life including professional and personal. The direct and indirect use of computer technology in every sphere has made it extremely popular which has, in turn, made it highly susceptible for misuse by one and all, in the absence of any tangible means of control. According to a report in CNN ‘the survey of 294 U.S. companies with at least 1,000 employees found that, in many cases, employees who sent e-mails containing confidential information about the organization or e-mails that were considered obscene and offensive were disciplined or terminated’ (CNN, 2006). We would, therefore, be focusing on the urgent need for addressing the proper and efficient use of internet and email services in the organization that would help to develop internet and email policy to effectively monitor its use. Why the need for effective rules and regulation? Internet has become a very cost effective and time efficient tool with its wide ranging ramifications. But at the same time, it can also be easily misused by unscrupulous people for their own vested interests that may be extremely disastrous for the organization, general public and the states at large. As is evident by the latest trend, the use of information technology and internet by the various terrorist outfits has resulted in some of the worst human tragedies in recent time. Hence, the emerging trends in the computers and information technology urgently require strict regulations and effective strategies that can curb its usage by the terrorists and unethical users. Advancing technologies, especially internet and email services have become indispensable part of corporate work methodology and therefore, they need to be regulated to help promote faster and more efficient delivery of organizational goals and objectives. Since, internet has wide popularity base among the masses, it is important that some measures of control and monitoring are used so that people in the organization are not able to misuse the technology for personal gains, at the expense of the organizational time and space. Another very pertinent point is that the indiscrete use of internet and email services, tend to expose the computer systems to external threats from viruses and scam emails which have the potential of destroying valuable organizational data and information. In a journal article, it is stated that ‘Countless other cases involving corporate e-mail never reach the public domain. They involve costly viruses, security breaches, theft of proprietary information, and workplace discrimination and harassment suits’ (Rosenthal, 2005, 2). Internet, if not monitored, can also be used by rival companies and vested interests to access valuable and confidential organization’s information through sophisticated ‘spyware software’ that can be downloaded into the computer system, whenever internet is used without adequate security and controlled measures. While internet and email services are excellent communication tools, one cannot deny the fact that internet also provides vast opportunities of entertainment and chat-rooms that promote wastage of official time, if used by employees during working hours. It is often observed that in the guise of privacy and personal space, employees tend to misuse official internet services, well beyond their personal time and space! The offices have also become a safe haven for downloading pornographic material which are not only morally improper but such sites are infested with viruses and other damaging software that can prove fatal for computer systems. Most importantly, email services are vital tools for information dissemination, within and outside the organization and it is important that this services is not misused by employees to send unethical mails or material to other colleagues and people in violation of organizational code of conduct and the wider organizational aims and objectives. In yet another survey by ePolicy Institute ‘…monitor internal e-mail between employees—the kinds of messages that can give rise to discrimination or harassment suits’ (Cormick, 2004). For majority of the users, email services and instant messages are seen as informal medium of communication and people are prone to exploit it by expressing views and opinions that may not otherwise be proper. In the recent times, the increasing use of these services, in the professional and personal lives of the individuals, has exposed the vulnerability of this medium of communication. The companies that have not developed well defined guidelines for emails and IMs, have had to face lots of problems, including litigation for a variety of reasons. Lack of internet and email related policies have led to the abuse of official internet and email services by the staff and other people through mails that contain improper messages like sexual harassment, pornographic material, leakage of confidential information etc. In the absence of any policies, the organizations are often left with little or no evidence of impropriety, committed by its employees. Another very crucial aspect is that the lack of email policy of the organization can also give opportunities to its aggrieved employees to send improper emails to rivals and other external agencies that may prove detrimental to organization’s reputation and business credibility. Looking at all the above highly pertinent points, it becomes imperative that the organization must re-evaluate its strategy to combat effectively the misuse of email and other communication services by its people in the organization. Recommendations The following recommendations would facilitate in developing a comprehensive email policy, which may also include the judicious use of other communication devices and services, in a manner that would not harm the interests of the organization. In-house training of the employees on the proper use of internet and email services. ‘To maximize the effect of the e-mail policy, the company must commit to educating its employees regarding the proper use of e-mail, and the risks inherent in e-mail use’ (Agin, MHT) Dissemination of information regarding the pros and cons of using the services at workplace to all its staff The email policy must incorporate the details of organization’s rights, vis-à-vis, the email correspondence of its employees at workplace, using official equipment and services that would facilitate better monitoring of internet and email usage by the employees and other staff through specialized software and tools. Organizational guidelines with regard to retention/removal of emails at regular period so as to promote better management of email storage at company’s website. Clear cut guidelines and policy regarding contents of the emails of the employees that not only forbid pornographic and indecent material and correspondence among the staff but the details must also include the materials that may breach the organizational ethics and code of conduct, adversely impacting its credibility and business interests. Implementation of strict enforcement measures that would deter misuse of such services, either intentionally or unintentionally. Conclusion One can therefore conclude that it is imperative that organizations must develop comprehensive email policy because the internet and email services are increasingly become intrinsic part of organizational work culture. Communication through electronic mail or e-mail, as it is popularly known, has made it easier to disseminate information among office staff of various branches, thereby, making it easy for the management to keep them informed regarding every aspects of organizational vision, mission and daily progress. It is also a fast and efficient tool of communication that leads to quality management. A well defined email policy would further improve the performance of the organization and its employees because its use at all levels of office hierarchy is crucial for the challenges and productive outcome of the visionary goals of the organization. Reference Agin, Warren E. Companies must spell out employees email policies. Mass High Tech newspaper (MHT). Available from: [Accessed on 7 July, 2008] Cormick, John Mc. 1 Sept. 2004. ePolicy Institute survey: Companies are dropping the balls on email and IM. Available from: < http://articles.techrepublic.com.com/5100-10878_11-5331888.html > [Accessed on 7 July, 2008]. Employees get canned for emailing. 7 June, 2006. CNN. Available from: [Accessed on 7 July, 2008]. Rosenthal, Mike. 22 April, 2005. Companies get smart about securing corporate e-mail with policies, protocols. Austin Business Journal. Available from: [Accessed on 7 July, 2008]. 1, 2 Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(Why and How Should Organizations Develop Comprehensive Email Policy Term Paper, n.d.)
Why and How Should Organizations Develop Comprehensive Email Policy Term Paper. Retrieved from https://studentshare.org/information-technology/1547189-report-proposal-recommendations-for-corporate-email-policy
(Why and How Should Organizations Develop Comprehensive Email Policy Term Paper)
Why and How Should Organizations Develop Comprehensive Email Policy Term Paper. https://studentshare.org/information-technology/1547189-report-proposal-recommendations-for-corporate-email-policy.
“Why and How Should Organizations Develop Comprehensive Email Policy Term Paper”, n.d. https://studentshare.org/information-technology/1547189-report-proposal-recommendations-for-corporate-email-policy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Why and How Should Organizations Develop Comprehensive Email Policy

Controlling Cyber Deviance in the Workplace

The action plan to reduce cyber deviance for the enterprise is the Internet Acceptable Usage policy (IAUP).... The company needs a comprehensive action plan to ensure that cyber deviance among its employees is minimal.... As such, it is paramount for employers and companies to develop strategies to deal with cyber deviance among employees to reduce the loss....
9 Pages (2250 words) Assignment

Keystone Mental Health Agency

& Donald K, 2000) To develop and maintain an adequate work schedule to meet regulatory requirements, complete all required program and service reports within required timeframes, develop and implement the budget, oversee fiscal operations of the program, provide leadership in the planning, development, and refinement of the program model, provide direction and support in crisis situations.... hellip; The author states that Keystone is at present working with a variety of organizations in the United States in the health sector, especially in psychological health....
6 Pages (1500 words) Assignment

Civil Servants in Cyprus and the United Kingdom: An Evaluation

The second topic will be how the training is designed (What approach is taken to training?... This proposal "Civil Servants in Cyprus and the United Kingdom: An Evaluation" contains information on a discussion and comparison of the evaluation of civil servants in Cyprus and the United Kingdom....
9 Pages (2250 words) Thesis Proposal

Security Plan- Human, Electronic Information

anagement has directed you to design a Security Plan to (1) identify and describe the potential threats to the organization's physical, human, and electronic information holdings; (2) based on the perceived threat, design concise security policy guidelines for use by staff; and (3) develop a comprehensive information security education programme for information users.... he Security Plan, which will form part of the organization's Information Security policy and Emergency Response, will be implemented to address the lack of staff awareness to achieve a security-aware workforce....
17 Pages (4250 words) Essay

The Importance of Internet Policy in Telstra Company

The paper "The Importance of Internet policy in Telstra Company " presents the relevance of internet policy so as to increase employees' productivity and minimize liabilities.... hellip; Social media dominate on young workers very quickly and it creates a tendency of posting comments related to anything they wish is a crucial situation for human resource management and efficient policy only can work out to avoid further risks.... What factors to be considered in setting and implementing such a policy has been described in this paper....
16 Pages (4000 words) Research Paper

The Advent of the Internet - A Boon or a Bane

Its application in the business processes has greatly facilitated communication among various inter-related factors through the tacit manipulation of the informed choices by the organizations.... This paper "The Advent of the Internet - A Boon or a Bane?... focuses on the fact that the rapid advancement in the field of science and technology has greatly influenced all aspects of our daily life....
10 Pages (2500 words) Case Study

Cyber Criminals and Other Data Security Dangers

Although, every online organization has a privacy policy which states how they will handle and secure customer data at the same time there are no verification criteria.... In September 2004, HFC bank that is one of the largest banks in the UK sent an email to their 2600 customers mentioning that an internal operational error has made recipients email address visible to everyone within the email.... For instance, E-commerce based organizations stores information of their customer related to credit card numbers, telephone numbers, address, bank details etc....
16 Pages (4000 words) Term Paper

Digital Marketing Strategies

These factors include understanding the Domino's Pizza missions, visions and the goals, design the customer's slogans and service directions, develop a comprehensive program of communication like the Instagram and mobile apps for the customer's experience strategy, and ensure that the strategies developed do not conflict with the strategies of other competitors like the pizza hut (Churn, 2001).... hellip; This case study proposes that Domino Pizza should embrace online marketing and distribution platform, which is far less costly and effective....
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us