StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Insider Threat-Employer Rights and Liabilities - Research Paper Example

Cite this document
Summary
The paper "Insider Threat-Employer Rights and Liabilities" states that the process is critical to employers since, through this information, they know where to make adjustments. The reality is that the amounts of money spend on replaceable sent persons is alarming. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94% of users find it useful
Insider Threat-Employer Rights and Liabilities
Read Text Preview

Extract of sample "Insider Threat-Employer Rights and Liabilities"

Insider Threat- Employer Rights and Liabilities Insert Insert Introduction The advent of new and novel technology is reshaping our lives from every other dimension. Employees and employers have their buttered and unbuttered sides of bread on this issue. These applications are very useful in the running of these institutions primarily providing efficient and effective means of handling business transactions. They have helped mitigate on liabilities, and to be more relevant to the ever increasing competitive environment. Employers now have the ability to micro-manage their employees by figuring out when they come in, leave premises and what they do from time to time. Employeestheotherhandhavebenefiteditimprovedaccurateandmorereliablesystemscomingplace However, despite these benefits, these employers need to create a warm environment one where the employee does not have to worry every time that is watching them. The latter behavior may greatly impact on the performance of the employee and significantly cripple the talent factor in the organization. A monitoring regime that is effective should motivate the employers to put in place good practices that will better how the institution performs than it is currently. That should also include how employees behave since it will impact on quality of performance by the individual and the team collectively (Ciocchetti, 2011). Excellent ways of doing things are pertinent to use of technology in monitoring and the likeliness of invading the privacy of the employees. In establishing the norms of the institution, employers try to ascertain the necessity of monitoring, suitable control techniques for the organization and how the process of monitoring may be misused by individual employees. Further, it involves management explaining the practices they are using for monitoring through the required notice channels. In addition, it covers the legal factor when there is a failure on the part of management in implementing the policy on monitoring. Some institution cares about the issues at stake and takes monitoring of employees seriously. However, some companies do not consider the psyche of their workforce or the factor on invading their privacy. The law has a duty to establish basic standards that will guide organizations, but it is the responsibility of the management in check to enforce the policies on employees morale and monitoring schemes in use. A regime that effectively monitors employees is one that constitutes best practices and gives employers an opportune to implement these practices in the quest for achieving the core purposes of monitoring. Employees are in and outside their work area. However, the outside control will involve the body tracking their vehicles and remote monitor of employees emails. The present rubrics are broad and diverse and differ from one institution to another. First is the use of access panels (Ciocchetti, 2011). They refer to devices that have been programmed that manage entry into restricted areas such as parking places, elevators, and stairwell. For authorization, employees use passwords, biometrics and use of cards. The automatic system will then unlock. In case there is a problem with approval, the concerned security personnel are alerted. Through such an approach, it is possible to limit access to particular regions of the building when there are threats. Also, the highly sensitive areas will be out of bounds, for example, the server rooms. In addition, employees will have accessibility to the facility at any time of their choice. The method can be misused by the management through witch hunting of employees. Through it, they can tell how often and long an employee spends in a particular area. In some cases, they are important to determine how often, for instance, employees wash hands after they visit the washrooms. Attendance and monitoring of time to ascertain that attendance is a vital inclusion in productivity (Ciocchetti, 2011). The approach seeks to note how much of the time the employees missed and the reasons for that. Through this, it is easy to derive patterns that can be weighed according to individual units of operation. The monitoring process is either automatic through an application or manually through recording it in a ledger book. The process is critical to the employers since through this information, they know where to make adjustments. The reality is that the amounts of money spend replaceable sent persons alarming. As a result, customer trust and satisfaction are significantly affected by such behavior in an organization. The use of an application system is better since it avoids errors made by humans and can profile the employees according to categories such as the kind of job. They also have the capability of alerting the management in case of a particular employee who is very problematic and is beyond some threshold. It is, therefore, wise for the employers to make their employees understand why they are doing some of these things to avoid misunderstanding. The company can institutionalize automatic warnings through the use of screens as a way of reminding them why the firm has to use policies on monitoring. The initial learning process may be tiresome but with time, the employees get used to it (Ciocchetti, 2011). The drafting of the warning screens should be architected in such a way as to convince the employees to accommodate the monitoring process and appreciate its importance in the firm. It should be designed and written in simple plain English as to allow employees to comprehend easily the message that is being conveyed. These warnings make up the low invasions of the privacy concerning employees thus protecting the business. The latter is in relation to countering what the employees expect of a privacy policy. Consequently, an effective monitoring scheme should employ the use of automatic screen warnings. That should include all the three purposes of a control process in an institution. Conclusion The overall perspective is that for any management in a given institution to properly implement monitoring techniques to its employees it has to follow a particular framework. The rubric chosen should not oppress the workforce in the name of monitoring them. What is important in the process is for the management to explain why it is doing so to woo the support of the workforce and ensure that employee loyalty and trust is intact. Further, the legal factors concerning a failure in management are inclusive. However, in doing all of this, the management should try as much not to invade the privacy of the employees since it affects their performance. References Ciocchetti, C. (2011). The Eavesdropping Employer: A Twenty-First Century Framework for Employee Monitoring. American Business Law Journal, 48(2), 285-369. doi:10.1111/j.1744-1714.2011.01116.x Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Insider Threat- Employer Rights and Liabilities Research Paper”, n.d.)
Insider Threat- Employer Rights and Liabilities Research Paper. Retrieved from https://studentshare.org/information-technology/1691145-insider-threat-employer-rights-and-liabilities
(Insider Threat- Employer Rights and Liabilities Research Paper)
Insider Threat- Employer Rights and Liabilities Research Paper. https://studentshare.org/information-technology/1691145-insider-threat-employer-rights-and-liabilities.
“Insider Threat- Employer Rights and Liabilities Research Paper”, n.d. https://studentshare.org/information-technology/1691145-insider-threat-employer-rights-and-liabilities.
  • Cited: 0 times

CHECK THESE SAMPLES OF Insider Threat-Employer Rights and Liabilities

Workplace Privacy

Constitution, there are certain amendments (1st, 4th, and 9th) and Acts that ensure employees privacy rights.... With the advent and rapid proliferation of technology, the world has become a smaller place where accelerated communication and networking has nearly removed the personal boundaries in all aspects of life....
48 Pages (12000 words) Thesis

Employee -Employer Relationship and Expectations

The paper 'The Changing Employer-Employee Relationship' focuses on the relationship between an employer and its employees, which is not just based merely on economic terms, but it is much more than that.... It is an important relationship that is based on mutual dependency.... ... ... ... The author states that the workplace in professional life, is like a second home to an individual, so his job is an extremely valued possession that has an effect on a lot of factors....
8 Pages (2000 words) Essay

Is Violence in the Workplace Increasing

To properly implement the civil rights requiring employers to protect employees from various forms of violence, it becomes essential for the employers to pay extra attention to each employee's activities within and outside of the workplace.... As discussed in the paper, sometimes laws meant to protect an employee's rights become an obstacle in ensuring the employer's rights....
3 Pages (750 words) Assignment

Maintaining the Garden as a Viable Business Idea

The business plan "Maintaining the Garden as a Viable Business Idea" believes in perspectives of lawn care business because there are still people willing to invest in maintaining their gardens being aware that a neat, planned and lush green lawn is a status symbol and adds pride to their property....
9 Pages (2250 words) Essay

Legal and Technological Aspects of the Idea of Workplace Privacy

Constitution, there are certain amendments (1st, 4th, and 9th) and Acts that ensure employees' privacy rights.... This thesis "Legal and Technological Aspects of the Idea of Workplace Privacy" gives an in-depth review of employers' and employees' perspectives on the issue, and considers the complex nature of privacy in the workplace....
51 Pages (12750 words) Thesis

Employee-Employer Relationship and Expectations

The paper "Employee-Employer Relationship and Expectations" is a perfect example of a management essay.... Whenever a business is started the most important to get it running is human capital.... ... ... ... The paper "Employee-Employer Relationship and Expectations" is a perfect example of a management essay....
8 Pages (2000 words) Essay

Risk Management Program for Data Mart

The paper "Risk Management Program for Data Mart" discusses that all the organization-based risk management processes are reliant on the presence of the project-level risk management providing mechanisms to surface and manage the occurring risks or to share the costs across projects.... ... ... ... Organizational risk management refers to risk management carried out at a strategic level (Lam, 2003)....
44 Pages (11000 words) Capstone Project

Mitigating the Threat of Malicious Insiders

This especially applies to the problem of the malicious insider.... The word malicious insider stems from the word insider.... An insider is an individual who is regarded as an employee or officer of a company or anyone who has access to private information concerning the company and its operations.... Additionally, an insider is also defined as a person currently or at a later time or period approved to access a company's information system, network, or data....
5 Pages (1250 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us