Friday, October 21, 2011

Enforcement of an Internet Usage Policy

Consequently, the most effective way to eliminate or control Internet misuse is to eliminate Internet use when it is not utterly necessary. However, in most modern businesses today, Internet use is an integral part of everyday business operation. In respect to enforcement, the American Managment Association recommends implementing an online activity management software. As stated in Fortune magazine, simply informing your employees of a software in place, usually drastically reduces Internet misuse, but without proper enforcement  you risk increasing misuse.

Online Activity Management software should address the three key issues raised in the development of the usage policy. In essence, OAM software should allow customized Internet access by individuals and groups in the workplace, as well as access by day and time to specific sites as established by the usage policy. It should also classify Internet sites into different categories such as pornographic or shopping, and permit or deny access accordingly. Classification lists are usually provided with the software and maintained by subscription.

In addition, a company should choose an activity management software that addresses all their needs; i.e., it should be able to manage the web, e-mail, chat rooms and newsgroups. The software should offer client-side protection, to cover virtual offices and laptops, thereby closing the cyber back door. To combat the growing number of new web sites and variety of content types the software should be capable of examining text, images, and link relationships to determine classification. Once a policy has been defined, it needs to be integrated into the company’s culture. The policy should be explained during recruitments, training and hiring.

Employees should ultimately realize, work is a no-privacy zone. Understand that and you can save yourself embarrassment. The implementation of these policies not only guard against Internet misuse, but also limit the risk of  Identity theft, and creates an otherwise impossible wall of privacy that keeps other colleagues and hackers out of your personal life while at work. For more info, read this article.

http://money.cnn.com/magazines/moneymag/moneymag_archive/2006/12/01/8395149/index.htm

No comments:

Post a Comment