top of page
Search
  • Writer's pictureAdmin

Kacil Tech Tip

Updated: Jul 10, 2018

You're At Risk!


Do You Know What Your Employees Are Doing Online?

If you don’t, You’re At Risk


The Internet and e-mail have become indispensable tools for business, but many companies are finding employees are using these tools as much or more for personal activities than job-related tasks. In fact, many business owners have recognized that unrestricted use of the Internet by employees has the potential to drain, rather than enhance productivity and, at worst, can even have dire legal consequences.


A Two Pronged Approach

To reduce the risk and minimize non-productive activities, business owners are utilizing a two pronged approach (1) Implementing an Internet Acceptable Use Policy (IAUP) and (2) installing a monitoring system to restrict and police employees’ online activities.


An IAUP is nothing more than a written agreement that sets out the permissible workplace uses of the Internet and e-mail. In addition to describing permissible uses, an IAUP should specifically set out prohibited uses, rules of online behavior, and access privileges with penalties for violations of the policy spelled out, including security violations and vandalism of the system.


Not only does an IAUP reduce wasted hours on the net, it can reduce bandwidth and equipment needs, as well as shield you, the business owner, from possible sexual harassment and other lawsuits arising from your employee’s inappropriate use of the web.


An IAUP Is a Good First Step, But It’s Only Half the Battle Won

Unfortunately, not everyone follows policies, and some accidentally will violate your AUP. To ensure company policies are being followed, businesses are choosing to monitor all Internet activity initiated by their employees using a web content filtering software (or hardware).


Tools available today, make monitoring of employee Internet usage simple and easy. Most companies choose to regularly monitor summary level activity like hours connected to the web, number of sites visited, and illegal or banned sites visited by the company while leaving detailed transaction reviews as necessary on a case-by-case basis.


And if someone complains that this is a violation of their privacy, rest assured that nothing could be further from the truth. It’s not only legal but good business. After all, they are using your company assets and if employees are focused on productive work and minimize personal use of the Internet, you’re likely to never need to address their Internet usage. Just be sure to include a clause about Internet monitoring in your IAUP and have your employees sign the agreement.


If you’d like a FREE comprehensive Internet Acceptable Use Policy template or would like to discuss the simple options available to monitor your employee’s Internet usage, visit

www.kaciltechnology.com

Or give us a call at 816-410-1116. Don’t wait until it’s too late to put the tools in place.


Your FREE IAUP template includes:

  • 4 common rules that should always be included.

  • Detailed sample language for areas including system activities, email activities, blogging and social media.

  • Sample definitions for security and proprietary information, general use and ownership and exactly what is acceptable and unacceptable in your company

Don’t wait until it’s too late to put the tools in place!

Call us today: 816-410-1116


(this free offer is no longer available -if you have a need for this service, please contact our office at the number above for current details)


11 views0 comments

Recent Posts

See All

March of the Cyborgs Posted on Monday, May 01, 2017 12:38 PM March of the Cyborgs - By Jocelynn Smith Privacy Invasion April 7, 2017 This is an article I thought was extremely important to securit

5 Critical Questions Posted on Wednesday, July 05, 2017 8:30 PM How Fast Could Your Business Be Back Up And Running After A Hacker Attack, Virus Infection Or Other Data-Erasing Tragedy? How fast you c

THE NIGHTMARE ON YOUR CONNECTED HOME STREET Last month we devoted an article to exploring security for your home and business.  The article this month focuses more on your home, but it could be your

bottom of page