Question

In: Computer Science

"IT Security Policy Enforcement and Monitoring" Please respond to the following: Describe how monitoring worker activities...

"IT Security Policy Enforcement and Monitoring" Please respond to the following:

Describe how monitoring worker activities can increase the security within organizations.  Describe the rationale that managers should use to determine the degree of monitoring that the organization should conduct.
Explain the extent to which you believe an organization has the right to monitor user actions and traffic. Determine the actions organizations can take to mitigate the potential issues associated with monitoring user actions and traffic.

Solutions

Expert Solution

There are many ways to eliminate the the threats and improving the security within a organisation one such method is use of surveillance and tracking methods,there are lots of valid reasons in favour of monitoring workers,it can help to reaffirm compliance with regulations, videos monitioring or other surveillance helps as a evidence in case of lawsuit and helps to build corporate culture,the main goal behind monitoring workers are to prevent internal work thefts,to make sure that companys resources is being used properly,in case of attendance helps you to check on their overtime and holidays record,it makes worspace safer as the email tracking helps in resolving any kind of harassment claims,not only that it helps in managing workers security if the employess do not respond or are found missing gps look up can be very useful
When it comes to workers monitoring there are various factors you should consider off as there are not many laws regarding that company can monitor the workers but if someone has given a valid legal consent that he can be monitored its legal
There has to be set written policies that workers have to follow:
*Rules:The foundation of any good organisation checks and balances ,a high level manager should be appointed to supervise the monitoring and make sure no personal data is being collected or wrongfully being used they have to set rules for acceptable use of phone,calls messaging,emails and content download from internet there has to be a code of conduct on how monitoring will be done and how the data will be collected

*Transparency :you have to gain there trust and explain the risks for the company from improper use of resources provided to workers


*Proper tools for monitoring or surveillance
like filtering and block the some websites which are not required in a workspace,all the computers and phones provided by company will be monitored but the pc and phones brought by workers has to be monitored with workers consent and some keyword triggers should be used to ignore the data,conference video records are stored to analyse and improving their workers which is good and tracking phone calls is usually used in call services company to ensure customer satisfaction,employer should have moral code to hang up or not record any personal calls and proper equipments should be used to track the employees and main thing they should only be tracked when they are in a office work.

there are no official legal rules regarding the ways in which the employer should monitor so the ethics should be maintained and the consent from the workers should be taken to proceed on surveillance
The actions organizations can take to mitigate the potential issues associated with monitoring user actions and traffic are :


*Formalized and good engineered monitoring program should be established

*Consistently enforce policies and control

*Take a proper consent from the workers and explain about how they will be monitored.

*They have to protect their important assets

there are many examples where the monitoring the workers have saved the company from huge losses and the workers from being harrased;

many insider trading was stopped

Celeste O'Keefe The chief executive of DANCEL Multimedia has fired nearly 5-8 employees for wrongful use of company resources and leaking company data.

Dow Chemical Company fired 50 workers for sending and storingporn or violent emails.


The New York Times fired 20 employees for sending offensive email.


IBM employees spend average of 250hrs in surfing the stuff which were not required.


Related Solutions

Question 1 Describe the roles of change management, security enforcement, accountability, monitoring, and auditing for a...
Question 1 Describe the roles of change management, security enforcement, accountability, monitoring, and auditing for a successful security operations management. Provide real-world examples. Question 2 List and describe common technical and regulatory steps of a forensic investigation from beginning to the end.
Please respond to ONE of the following prompts. Describe an example of how you as a...
Please respond to ONE of the following prompts. Describe an example of how you as a professional nurse have used ethical theories or ethical principles in a clinical practice setting. OR In your clinical setting, consider the many times and various ways in which you acted as a patient or family advocate. Which model did you follow in advocating for the patient: rights protection model, values-based model, or respect for persons model? Would having used a different model have changed...
Respond to the following scenario: Security Insurance, Inc., issued an insurance policy to a company providing...
Respond to the following scenario: Security Insurance, Inc., issued an insurance policy to a company providing an employee, Jessica Garcia, with disability insurance. Soon thereafter, she was diagnosed with “panic disorder and phobia of returning to work.” Garcia lost her job and sought disability coverage. Security denied coverage, doubting the diagnosis of disability. Garcia and her employer sued Security. During pretrial discovery, the insurer learned that Garcia had stated on the policy application that she had never been treated for...
v "Healthcare Leadership"  Please respond to the following: How has healthcare policy and legislation affected the decisions...
v "Healthcare Leadership"  Please respond to the following: How has healthcare policy and legislation affected the decisions managers must make in an effort to achieve quality care at a reasonable cost? What do you believe are the most critical competencies for a leader to possess? Provide at least two (2) examples to support your opinion.
Describe the three key cash-related activities of a firm. URGENT: NEED ANSWER ASAP PLEASE RESPOND WITH...
Describe the three key cash-related activities of a firm. URGENT: NEED ANSWER ASAP PLEASE RESPOND WITH COPY AND PASTE, NOT ATTACHMENT USE ORIGINAL CONTENT NOT USED BEFORE ON CHEGG PLEASE ANSWER THROUGHLY TO ALL ANSWER TO BEST ABILITES ORIGINAL SOURCE NEVER USED BEFORE!!!
Discuss briefly the role of the airport security coordinator and that of airport law enforcement. How...
Discuss briefly the role of the airport security coordinator and that of airport law enforcement. How do you envision them working together in the common goal of providing security at airports?
Marry Ellen : Social worker please explain the Information on the cause and activities the leader...
Marry Ellen : Social worker please explain the Information on the cause and activities the leader is known for? and the impact that the individual has had on the profession and society.
Please describe how you would account for the following: A company's fixed asset policy is that...
Please describe how you would account for the following: A company's fixed asset policy is that they capitalize purchases > $2,500. 1. A laptop costing $2,000 is purchased Oct 1 2020. What are the journal entries for Oct, Nov, and Dec 2020? 2. A copier costing $5,500 is purchased Oct 15 2020. What are the journal entries for Oct, Nov, and Dec 2020?
How are State and Local law enforcement bound up into homeland security? What is the value...
How are State and Local law enforcement bound up into homeland security? What is the value proposition of fusion centers?
Describe with examples, the various layers of security that are critical to your security plan policy.
Describe with examples, the various layers of security that are critical to your security plan policy.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT