1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
allochka39001 [22]
4 years ago
14

Compare at least two examples of business Internet/email use policies. Discuss the legal and ethical issues of an employer being

able to monitor the computer use/emails of employees. What is your opinion
Computers and Technology
1 answer:
notsponge [240]4 years ago
7 0

<em>Here are sample business internet / email use policy which we are implementing in our office: </em>

<em>1. Use of email for official business transactions only. Employees are not allowed to use their personal email for business transactions. This is to prevent employees for having a copy of client's information in their emails for security purposes. </em>

<em>2. No browsing of gambling and hate sites at any times. </em>

<em>These two examples are very much common in any organization that uses internet and email. Although the purpose of these two policies are to facilitate the proper use of internet for employees, the reason for these are very much different. The use of email for official business transaction only is for security purposes of the company's right way of storing information. These data are under the privacy and ownership of the company. If in the near future, employees concern or doing the transaction might resign and they leave a copy of these information in their emails, they can use it for other purposes. Worst, they can use if for identity theft and other malicious activities. As for the browsing of gambling and hate sites, these are prohibited for ethical reasons. Companies doesn't support campaigns and deeds that are opposed to goodness and moral values. </em>

<em>My opinion regarding the use of monitoring tools by employers to their employees are normal when you are a part of an organization. Of course, this should come with proper use of the privileges by the authorities specifically, the IT admin. Whatever information they come across or whatever issues they would find out about an employee, they should not disclose it to others. They should also follow the rules and above all employees, must campaign for the ethical use of computing resources.</em>

You might be interested in
You can access decorative underlines and change their color through the ____ drop-down.
Dominik [7]
The answer is "underline gallery or underline drop-down". The user can access the decorative underlines and change the underline's color through the underline gallery. Underlines can be added for decoration purposes, to make your work look formal or creative.
4 0
3 years ago
Localize the software problem and describe it<br>​
sweet [91]

Answer:

Do you have any idea how to get the best and most importantly I

5 0
4 years ago
What is the Matrix? Should you take the blue or red pill?
Alexeev081 [22]

Answer:

THE RED PILL

Explanation:

6 0
3 years ago
Read 2 more answers
12. Because Java byte code is the same on all computers, compiled Java programs a. are nonexistent b. must be re-compiled for ea
GenaCL600 [577]

Answer:

C) Highly portable

Explanation:

This means they can run on any computer or platform that supports Java without the need for recompillation.

This idea is popularly called WORA that is Write Once Run Anywhere.

Software Applications written in Java are compiled to bytcode (.class) which are intended to run on the Java Virtual Machine (JVM) irrespective of the architecture of the computer or device.

5 0
3 years ago
Which key on the keyboard do you use when you copy using Drag and Drop? The Alt key. The Ctrl key. The Shift key. None of the ab
tamaranim1 [39]
CTRL key is used indeed
6 0
3 years ago
Read 2 more answers
Other questions:
  • The keyboard, mouse, trackpad, microphone, light pen, and voice recognition are examples of _____ devices.
    5·1 answer
  • Which two ways should a developer create this functionality? A developer is asked to create a PDF quote document formatted using
    13·1 answer
  • Anybody good with Microsoft excel? I need help with this class.
    9·2 answers
  • Isaac was assigned to work on a computer in his company’s R&amp;D department. While working on the system, Isaac received severa
    8·1 answer
  • I am wasting 20 points
    10·2 answers
  • Complex calculations show that if the universe is geometrically flat, we should observe the greatest temperature differences bet
    9·1 answer
  • What are some ways to rename a worksheet? Check all that apply.
    9·1 answer
  • A-1 grdening supply is preparing a reprt to hand out to the customerez in pointes form only.why should the reprts writers avoid
    9·2 answers
  • What is a good starting point for data mining?
    5·1 answer
  • Electronic type is often considered to be the latest step in the evolution of the written ______________.
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!