Question

In: Computer Science

You are asked to install keylogger software as part of workplace monitoring. The presence of this...

You are asked to install keylogger software as part of workplace monitoring. The presence of this software isn’t noted in the monitoring policy. How do you respond? What are the two sides to this issue?

Solutions

Expert Solution

`Hey,

Note: Brother if you have any queries related the answer please do comment. I would be very happy to resolve all your queries.

As the workplace pc is the enterprise’s belongings, the enterprise may additionally install a Keylogger on a worker’s computer without problem for trespass.
Use of a networked Keylogger likely violates federal and nation privateness and wiretap legal guidelines and calls for the consent of the monitored employee. An employer has to disseminate a coverage stating that every one worker work stations are monitored and have the worker acknowledge receipt of that policy. This may satisfy the consent requirement to take the monitoring outside of the legal wiretap guidelines.
An organization has to allow no longer everybody gets admission to passwords for a worker’s private money owed which might be recovered thru the use of the Keylogger. By no means have to an employer use the passwords to browse the worker’s private account records.

Within the risk management arena, there are too many capability liabilities carried by using presenting personnel with limitless network and internet get admission to. These liabilities encompass:
• damage to business – making sure communications with folks out of doors your company are accurate, polite and regular with your commercial enterprise desires
• risk control – tracking for probably abusive conduct, together with sexual harassment, bullying or racial hate speech
• trade secret or information robbery – keeping watch for the loss of essential organization secrets and information
• unlawful conduct – consisting of administrative center robbery, embezzlement, and drug abuse
In light of these liabilities, it almost looks as if the use of Keyloggers within the workplace utilizing having to be mandatory. Simply make sure to hold in the regulation, through publicizing and receiving acknowledgement of your tracking policy, preserving the men and women with get right of entry to to the Keylogger facts to an absolute minimum, and in no way using any private passwords obtained from the Keylogger to get admission to the employee’s personal debts.

Kindly revert for any queries

Thanks.


Related Solutions

Monitoring in the Workplace
Q1: Do you consider the approach taken by Blackburn Rovers to be too strict on employees, too lenient, or just right? Q2: Consider the five moral dimensions described in the text. Which are involved in the case of Copeland v. the United Kingdom?Q3: Consider the following scenario. Your 14-year-old son attends a soccer academy. While there, he downloads unsuitable images, which he later sells to his friends. He would not have been able to download the images at home because...
You have been asked to generate a kit to assay for the presence of a novel...
You have been asked to generate a kit to assay for the presence of a novel coroma virus that has a DNA genome. You plan to base the kit on the polymerase chain reaction, so it should contain   Select one: a. a thermostable polymerase, RNA primers to a unique region of the virus and an RNA template from the patient b. a thermostable ligase, RNA primers to a region common to all coroma viruses and a DNA template from the...
1 Assume you are the Human Resource Manager of a large software firm with global presence....
1 Assume you are the Human Resource Manager of a large software firm with global presence. The employee turnover rate of the firm has hovered around 15% for the last three years, compared to the industry average of 20%. Competition for quality software professionals is expected to increase as more firms from the developed countries set up their operations offshore in developing economies. You foresee a shortage of software professionals in the labor market in the future at both entry...
IT Software Project As a senior analyst for the company you havebeen asked to evaluate...
IT Software Project As a senior analyst for the company you have been asked to evaluate a new IT software project. The company has just paid a consulting firm $100,000 for a test marketing analysis. After looking at the project plan, you anticipate that the project will need to acquire computer hardware for a cost of $450,000. The Australian Taxation Office rules allow an effective life for the computer hardware of five years. The equipment can be depreciated on a...
You are a part of a finance team in a firm, and you were asked by...
You are a part of a finance team in a firm, and you were asked by your boss to estimate the annual cash flows of a project. You estimated that the annual sales and costs of this project is $150,000 and $25,000 respectively. In order to start the project, the firm needs to invest in $300,000 in new equipment including shipping and installation, and $30,000 in working capital. The life of this asset is 3 years, and the project will...
you are asked to prepared 1-bromo-2,2,3,3-tetramethlylbuane by exposure to 2,2,3,3-tetramethylbutane to Br2 in the presence of...
you are asked to prepared 1-bromo-2,2,3,3-tetramethlylbuane by exposure to 2,2,3,3-tetramethylbutane to Br2 in the presence of light. How can yield of this monobrominated product be maximized while minimazing the formation of polybrominated product?
Project engineer found that it is necessary for his project to install new software, the purchase...
Project engineer found that it is necessary for his project to install new software, the purchase price for the software is SR 2,870,325, the software needs update every 3 years and it will cost him SR 328.854, along with a yearly operating cost of SR 47,866. This system will last for 7 years what is the amount he should invest now to cover the cost of this system, use interest rate of 9%. Don't use the negative sign in the...
Logica utilises contractors to install its software to end users. To facilitate the provision of these...
Logica utilises contractors to install its software to end users. To facilitate the provision of these goods, the company provides a standard trade finance facility to these contractors. a) Explain how trade credit operates and how both Logica and the contractor would benefit from this type of facility.
1. We have seen that, in general, workplace e-mail monitoring is legal. In the landmark Smyth...
1. We have seen that, in general, workplace e-mail monitoring is legal. In the landmark Smyth v, Pillsbury case at the start of this chapter, employees fired for messages sent through the employer's server, even when password-protected, and even when the employer had issued assurances that they would not be for retaliatory purposes, had no recourse. But what if the employer monitors messages sent on company-owned computers through a personal e-mail account, such as Yahoo? In 2008, Scott Sidell allegedly...
Imagine that you are part of the management team for Econsoft, a computer software company. You...
Imagine that you are part of the management team for Econsoft, a computer software company. You are discussing one of your products, “Econblaster,” with the company’s CEO and the other managers. You have made the software available for download on your firm’s website for download for $9.99 and you are trying to figure out how to generate more revenue from the product. Half of the management team suggests increasing the price to $11.99. The other half advocates cutting the price...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT