Escolar Documentos
Profissional Documentos
Cultura Documentos
Work place monitoring : Watching what you say and what you do in the worklace
: Monitoring of employees at work place can be done for number of reasons.
However, everyone has the right to some degree of privacy in the workplace and
the law does set some limits on monitoring activities.
Employee or customer safety : Most f the time the monitoring at work place is
done for the safety of the employees. To avoide attacks, robberies, violence,
workplace mishaps, and for other work place safety issues monitoring is essential.
Network and system performance : most of the employees download, share and
use large audio and video files, internet surfing and and there are chances of virus
attack too which will further disable network . so to maintain the performane of
network monitoring is required
Other needs: To establish facts are relevant to the business, to check that
procedures are being followed or to check standards, ex. Listening in to phone
calls to assess the quality of the work(BPO or call centres).
To make sure that electronic systems are working effectively, i.e to prevent any
viruses entering the system.
Hardware monitoring
Software monitoring.
Magstripe cards : The magnetic strip of plastic film contains thousands of small
magnetic particles. This is now commonly integrated in to employees ID’s, to track
the employee’s movement.
In addition, employers have the right to track the websites visited by their
employees, to block employees , to block employees from vising specific internet
sites, or to limit the amount of time an employee may spend on a specific
website.
Spyware : The term spyware is given to software that is installed without the
user’s permission and which covertly gathers and transinits data about the usage
of the machine.
Once installed, spyware starts monitoring the way the computer is used and feeds
back the information to the website operators which have often sponsored the
programme’s distribution.the employer’s want to understand precisely how an
employee travels through their site, which other sites are visited and for how long
.They also want to know which applications are installed on the user’s computer.
This can be gathered from the user’s e-mail address or the phone number
programmed in to the modem.
Poorly written spyware programmes can , and often do , cause PC’s to crash and
networks to slow down. Sending this data back to the data base also takes time
and consumes network bandwidth, thus slowing down the websurfing and e-
mailing. This can cause to the employer’s money if they are paying for network
bandwidth according to total or peak usage.
1) User key strokes : user’s single key press on key board is called key stroke.
The keystrokes can be used to get user’s passwords and other sensitive
data.
2) Copies of Email : the e- mails in the inbox and sent mail of a user can be
sent to the third party.
3) Copies of Instant Messages: Any type of chat and instant messages may
also be copied and sent to third party.
This records video and static images detailing the contents , or screen capture,
of the entire or the content of the screen activity within a particular
programme or computer application. Monitoring tools may collect real time
video, accelerated or video or screen shots or may take video or still image
captures at regular intervals . they may collect images constantly or only
collect information while the user is interacting with the equipment(Ex;
capturing screens when the mouse or key board is active).
Data monitoring tracks the content of and changes to files stored on the lcal or
in user’s private network share. Idle time monitoring keeps track of time when
the employee is away from the computer or the computer is not being used.
Monitoring Prevents Efficiency : while surveillance has its benefits, it also has
drawbacks that contribute to employee turnover and anxiety. Productivity can
be negatively affected if wrker observation becomes too intrusive. He consta
fear of being watched and reprimanded for their behaviour or work can cause
employees stress and hinder efficiency as a result. Excessive monitoring will
also lead to employee turnover.
Computer Security – precautions taken to keep computers and the information they
contain safe from unauthorized access
Encryption – the process of encoding messages before they enter the network or
airwaves, then decoding them at the receiving end of the transfer
– Make backups
Most of the time the employees who palgiarise do not necessarily know
they are doing anything wrong. In some instances, they might no know how
to appropriately conduct research or cite sources. If this is the case, it is
important for the management to understand the circumstances so
appropriate training can be put in place.
Using others images: web and graphic designers often use images to
enhance the aesthetics of marketing collateral and branding tools,
such as websites, brochures, and logos. If a designer uses graphics
created by another designer or pictures taken by a photographer
without permission, it is plagiarism. One can use images and graphics
that others are created with written permission .
Taking Credit for an idea : In a workplace employees take ideas off of
their co-workers, if an employee shares a work related idea with
another employee, and that employee takes the idea to management
or to a fellow employee and passes it off as his own is a plagiarism.
Failing to list a Source : if an employee is using the information which
he has not discovered on his own, it is important to cite the sourse,
failing to cite the sourse, is called as plagiarism. If an employee is
wring a piece inline, he /she should mention the soure and link back
to the original web page.
Stealing blog content : companies that use other companies website
contents are plagiarising if the content is exact or matches very
closely.
Reproducing an E-book : consultants, coaches, and marketing experts
create electronic books to provide advice to potential clients, build
their credibility and earn additional money. If a company redesigns
the cover of another author’s e-book but keeps the same content, it
is plagiarism.
Personal integrity : plagiariam can damage the reputation and credibility and
have a severe nehgative impact on an employee’s career.