Network controls and monitoring

              Your company has noticed a substantial decline in productivity over the past months and wants to find out why. The CEO has asked you about network controls and monitoring that they might use within the company. Begin by researching the laws, both nationally and in your state, regarding employers and network monitoring. Next, suggest some devices and/or software the company might employ to help keep employees on task, or in the alternative, to identify when they are not. Finally, explain how you would implement the plan. Would you tell the employees that they are being monitored? Why or why not?  

Sample Solution

    Network controls and monitoring are powerful tools that companies can use to increase productivity and efficiency. In order to implement such measures, however, employers must be aware of the relevant laws governing network monitoring in their jurisdiction. These laws provide employees with a basic understanding of what they can expect from their employer when it comes to privacy and security.
At the federal level, the Electronic Communications Privacy Act (ECPA) prevents electronic communications made via email or on social media from being intercepted without consent. The law also prohibits “malicious access” to any computer system belonging to an individual or company, as well as unauthorized installation of data-mining programs. Additionally, Title VII of the Civil Rights Act prohibits employers from using surveillance technology for discriminatory purposes against employees based on race, gender or other protected characteristics. State laws may provide additional protections beyond those outlined in federal legislation; for example, California Labor Code section 98.6 requires employers to notify their workforce if they plan to monitor internet usage or emails sent over workplace devices. As part of this notification process, employers must explain how personal information will be safeguarded during the surveillance process and how employee performance will be evaluated by these new measures. There are a variety of software solutions available for businesses which seek more transparency about online activity within their organization better control over employee productivity levels. For example: Monitoring tools like Net Nanny allow managers visibility into web browsing activities while blocking inappropriate content; Network Traffic Analysis Tools like WhatsUp Gold track user trends and usage patterns; Remote Access technologies enable secure connection between remote networks so users can log-in securely at home offices; Employee Time Management systems automate time tracking processes while keeping records of hours worked and time off taken accurately up-to-date; Activity Trackers monitor application usage including chat logs across multiple devices simultaneously . In implementing a network monitoring plan for your company , it is important that you involve all stakeholders - including IT staff and Human Resources - in order to ensure compliance with applicable laws as well as adequate oversight into potential misuse by management personnel . It is also important that you thoroughly communicate the reasons behind why this measure is being implemented : what activities are forbidden , why they should not occur , etc . This should be done through clear policies outlining acceptable use protocols as well as regular training sessions given both prior and following implementation . Furthermore , it would normally advisable that all employees are notified beforehand regarding the new monitoring practices – though depending on state law they may not necessarily need formal prior notice ; rather just having knowledge that there is potential eavesdropping present could serve its purpose too . Some states even require workers who access confidential work data remotely sign acknowledgement forms stating this fact upon commencement of employment itself . Overall , it is possible for companies to achieve greater control over employee behaviour through increased network monitoring but doing so requires thorough consideration towards legal obligations along with proper communication procedures throughout entire organisation .

Unlock Your Academic Potential with Our Expert Writers

Embark on a journey of academic success with Legit Writing. Trust us with your first paper and experience the difference of working with world-class writers. Spend less time on essays and more time achieving your goals.

Order Now