Monitoring Employees on Networks

Monitoring Employees on Networks - CheckPoint: Monitoring...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
CheckPoint: Monitoring Employees on Networks Answer the following questions in 200 to 300 words: How does e-mail benefit an organization? Why might an organization want to limit how an employee uses e-mail during work hours? What is an e-mail’s path once it leaves an organization? E-mail can offer an organization a number of benefits. E-mail makes communication between clients much easier, faster, and even clearer. An organization might want to limit how an employee uses email during work hours because productivity may decease if employees use their e-mail for personal use instead of for the business, which will result in having to pass higher prices to its customers. Another reason organization limits how an employee uses e-mail is because a company must retain all of its e- mail correspondences including personal e-mails for long periods of time or pay five to six figure fines. If the e-mail is necessary to a lawsuit, it is important that the company has availability to that e-mail. If the organization faces a lawsuit the courts are not concern if a personal account or a work account sent the e-mail, they are considered the same in the eyes of the court. “Companies that allow employees to use personal e-mail accounts at work face legal and regulatory trouble if they do not retain those messages, companies also fear leakage of confidential information and trade secrets through e-mail or blogs” (Laudon and Laudon, 2009). The path that an email takes is through organization's personal equipment, such as a firewall, to electronically proof-read an email to catch incriminating dialect or
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 09/20/2011 for the course IT 242 taught by Professor Clark during the Spring '11 term at Art Inst. Phoenix.

Page1 / 2

Monitoring Employees on Networks - CheckPoint: Monitoring...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online