Question

Question: Justification/Recommendation Report – Read the information presented below to develop a comprehensive media use policy...

Question: Justification/Recommendation Report – Read the information presented below to develop a comprehensive media use policy for your company. Research the web to find out what other companies have done to adopt such suitable policies. Describe suitable policies in your report. Include computer monitoring and surveillance software, instant messaging use, social networking sites, blogging sites, and smartphone use. Write a convincing justification/recommendation report based upon the conclusions you made from your research from the information you learned in Chapter 9.

As a manager in a mid-sized engineering firm, you are aware that members of your department frequently use e-mail, social networking sites, instant messaging, and texting for private messages, shopping, and games. In addition to the strain on computer facilities, you worry about declining productivity, security problems, and liability issues. When you walked by one worker’s computer and saw what looked like pornography on the screen, you knew you had to do something. Although workplace privacy is a controversial issue for unions and employee rights groups, employers have legitimate reasons for wanting to know what is happening on their computers or during the time they are paying their employees to work. A high percentage of lawsuits involve the use and abuse of e-mail and increasingly more often other media as well. You think that the executive council should establish some kind of e-mail, Web use, and social media policy. The council is generally receptive to sound suggestions, especially if they are inexpensive. At present, no explicit media use policy exists, and you fear that the executive council is not fully aware of the dangers. You decide to talk with other managers about the problem and write a justification/recommendation report

0 0
Add a comment Improve this question Transcribed image text
Answer #1

As a manager in a mid-sized engineering firm, you are aware that members of your department frequently use e-mail, social networking sites, instant messaging, and texting for private messages, shopping, and games.
Our steps:-

1. Employers should also be aware of the potential pitfalls of monitoring. You could create a morale problem and hurt employee performance if your workers feel a distrustful Big Brother is lurking over their shoulders. You could inadvertently learn about people's religion, sexual orientation, political views and medical problems, creating potential privacy dilemmas or even opening your firm up to discrimination lawsuits.
2. you could run afoul of the National Labor Relations Board if you discipline employees for making negative comments about you online. A year ago, it issued guidelines affirming employees' right to discuss and seek to improve their working conditions, following a number of cases involving social media.

3.surveillance, defined as tracking an individual's activities, has "a creepy factor" that can cause pushback from employees, he says. Avoid such trouble by engaging only in focused surveillance of a person if you have well-founded suspicions of policy or legal violations and have the documented agreement of top managers and your attorney.

4. The process of General monitoring for electronic abuses, with employees' full knowledge, is a necessary practice, Flynn says. "It's a fact of business life that legal risks exist, regulatory risks exist," she says. "Employees will put your business at risk accidentally or intentionally. You need to mitigate those risks" and keep misdeeds from turning into expensive crises or lawsuits.

5. The way in company generally, employers have the right to monitor their employees use of the Internet (including visiting social networking sites, checking e-mails, and instant messaging) on computers owned by the employer, during employees on-duty hours. Although federal laws prohibits employers from discriminating against a prospective or current employee based on information on the employee's social networking site or personal blog relating to their race, color, national origin, gender, age, disability, and immigration or citizen status, employers can and do use information on such websites as a method of conducting background checks. Employees should therefore be conscious of what information they display on social media websites.

Add a comment
Know the answer?
Add Answer to:
Question: Justification/Recommendation Report – Read the information presented below to develop a comprehensive media use policy...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • "Should employers curb social media, e-mail, and other internet use?" Conduct additional research into the problem...

    "Should employers curb social media, e-mail, and other internet use?" Conduct additional research into the problem of workplace abuse of social media, e-mail, instant messaging, online shopping, another Internet browsing. If you were the administrative assistant in the scenario, how would you respond to your boss? Decide whether you support or oppose the crackdown. For your discussion post, explain your position to your classmates. Include your opinion on the following questions. Support your opinion by citing at least two sources...

  • Here, you will examine social media policy, vision, and procedure. If one cares about their personal...

    Here, you will examine social media policy, vision, and procedure. If one cares about their personal brand, they need to be careful and pay attention to what their online presence says about them. Otherwise, they run the risk of letting other people create their image for them – both good and bad. This applies to organizations as well. Preparation and Research: Do a web search (Google/DuckDuckGo/etc.) of at least two people you know, and two celebrities or other popular figures...

  • Children and teenagers spend more than 7 hours a day with a variety of different media....

    Children and teenagers spend more than 7 hours a day with a variety of different media. Television predominates, with more than 4 hours a day of screen time, although viewing may now be via a computer or a cell phone screen instead of a TV set. Media use represents the leading leisure time activity for young people—they spend more time with media than they do in any other activity except sleeping. Increasingly, preteens and teens are using new technologies (social...

  • read below and answer the question at the end HUMAN PARTICIPANTS AND ANIMAL SUBJECTS IN RESEARCH...

    read below and answer the question at the end HUMAN PARTICIPANTS AND ANIMAL SUBJECTS IN RESEARCH Any scientist who conducts research with human participants needs to protect the interest of research subjects by complying with federal, state, and local regulations and with relevant codes established by professional groups. These provisions are designed to ensure that risks to human participants are minimized; that risks are reasonable given the expected benefits; that the participants or their authorized representatives provide informed consent; that...

  • Summarize the following information in easily way and in simple words as your understanding without missing the keywords. ( the Question will be 25 on this information in final ) MARKETING RESEARCH FO...

    Summarize the following information in easily way and in simple words as your understanding without missing the keywords. ( the Question will be 25 on this information in final ) MARKETING RESEARCH FOR THE NEW VENTURE Information for developing the marketing plan may necessitate conducting some marketing research. Marketing research involves the gathering of data to determine such information as who will buy the product or service, what is the size of the potential market, what price should be charged,...

  • Read the case "Last Chance Hospital" and write a case study report, use chapter 17 as...

    Read the case "Last Chance Hospital" and write a case study report, use chapter 17 as a guide. Requirements: Write a two (2) to three (3) paragraph essay in APA format. Answer the case study and outcome of your research in detail. Reports will be graded on following chapter 17 guidelines, grammar, sentence construction, spelling, punctuation, quality of analysis, solutions, and recommendation. Last Chance Hospital (LCH) is a 254-bed, community hospital located in a small, affluent suburb just outside of...

  • Putting Your Best Cyberface Forward By STEPHANIE ROSENBLOOMJAN. 3, 2008 your nails? Have you pierced your...

    Putting Your Best Cyberface Forward By STEPHANIE ROSENBLOOMJAN. 3, 2008 your nails? Have you pierced your tongue? Is your tote bag emblazoned with the words "I'm not a plastic bag"? at the way they do for reasons too numerous to fit into any therapist's notebook. Yet we commonly shape People look and act the way they do for reasons too ir behavior or tweak our appearance in an attempt to control how others perceive us i m mon sense. Social...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

  • Read the case: Netflix Inc.: The Second Act - Moving into Streaming and complete your case...

    Read the case: Netflix Inc.: The Second Act - Moving into Streaming and complete your case analysis. Discuss the following: 1) briefly summarize the key marketing strategy issues in the case that are still relevant TODAY in addition to contemporary issues you find via research; 2) make thorough recommendations on how the issues should be handled; 3) provide a justification for the recommendations. Case write-ups should be 3-5 pages, double spaced, 12 font size in Times New Roman. The case...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT