In: Operations Management
Laura, a recent graduate from a human resources diploma program from a local community college, has just landed her first role as a human resources coordinator at a small bottling company. Upper management has made it clear that they want Laura to make the updating of the current human resources manual her first priority. During her second week on the job, Laura was strolling down the hallway toward the break room to get herself a cup of coffee when she passed the director of marketing’s office. As she passed, she noticed an inappropriate picture of a woman visible on his computer. Shocked at what she had just seen, Laura continued down the hall, not sure what to do next. Upon returning to her office, Laura decided the best way to start revising the manual was to introduce a policy on appropriate computer use. She felt this would address the problem as she didn’t want to start her new job on a negative note by reporting the director of marketing to the CEO without a clear policy in place.
Do you agree with how Laura handled this situation? If so, why? If not, what would you have done differently?
Is it important for this company to have such a policy in place? If so, how can the employment (labour) standards act in your province/territory help in drafting a policy on appropriate computer use?
Laura handled the situation correctly as in this case there was no clear policy manual on the usage of IT assets. Also, the director of marketing was not present in the room at the time so it can also be that someone else might have used the computer. Without definite proof, it would be unwise to report a person of such position. Hence it is imperative to create a policy which holds the user of an asset responsible in case anything inappropriate usage happens.
It is very important to have an IT policy in place especially in this digital era. Misuse of company infrastructure can hurt a business and create a negative atmosphere in the company. Also, IT assets can be used to access social media sites where it is easy to leak data. Hackers can access computers through remote access if an asset is misused by employees.
Employment acts help in protecting companies against frauds and data leaks. Some companies are held to ransom by hackers who target and lock the computers and demand fees for providing keys to access the computers. Phishing of data also happens with employees which compromises a companies positions. Local acts enable companies to frame policies within the ambit of law and also to take legal action against people for damages caused.