Cutting down on Internet abuse at work

The Internet is proving to be a useful and very accessible tool for businesses. Many companies provide employees with access to the Internet.But let's face it, we all know that a lot of web surfing during working hours is not work related. Looking up a work-related news story easily leads to checking the baseball standings or a movie review.

09/01/1998


The Internet is proving to be a useful and very accessible tool for businesses. Many companies provide employees with access to the Internet.

But let's face it, we all know that a lot of web surfing during working hours is not work related. Looking up a work-related news story easily leads to checking the baseball standings or a movie review. It will only take a couple of seconds, right? A couple of seconds is no big deal in the greater scheme of things. The problem is when the seconds turn to minutes then add up to hours. And it's not always baseball scores people are looking at either.

Elron Software (Cambridge, Mass.) a developer of Internet security software recently completed an independent study on Internet usage and abuse at work. The results show that 62% of companies in the study report that employees accessed sexually explicit web sites at work; 93% report they have or are considering policies formally defining acceptable Internet usage; 27% of the companies have taken action against abusers, including verbal warnings, written reprimands, payroll deductions, and termination. More details are available on the Elron web site at surf-abuse.elronsoftware. com.

Internet abuse causes productivity losses, increased Internet security costs, unnecessary load on networks, data security problems, and risk of civil and criminal liability, according to the Secure Internet Filtering Technology (SIFT) Consortium of the International Computer Security Association (ICSA, Carlisle, Pa.)

Some companies attempt to curb the abuse of Internet privileges by limiting access to employees who provide written justification for using the Internet. These sorts of policies often turn into bureaucratic nightmares. Employee work requirements change, and while one day they may not really "need" the Internet, a project could come up where the Internet would be a source of valuable information. If they don't have immediate access, they can lose productivity.

So, how do companies deal with Internet abuses? Formal corporate access policies that define appropriate Internet use at work are a start, but they have to be enforced. The ICSA recommends using Internet filtering and monitoring software to manage net access. Filtering tools actually block access to certain web sites, newsgroups, and other Internet resources. With filtering, companies can compile lists that either limit or block access to specified resources. Filtering can weed out some prime time-wasting sites, but with millions of sites on the web, it's hard to catch them all. These software packages also provide monitoring capabilities that track where people go when on the Internet.

Gordon Ross, president of NetNanny Software International (Vancouver, British Columbia, Canada) says in the SIFT guide to managing Internet access, 'People are more cautious when their Internet use is monitored." The guide provides an example where one company publicly posted usage of the 25 users who accessed the Internet the most. Another company posted the traffic by departments. Hopefully, companies will not use monitoring and filtering software by implementing KGB-style "Big Brother is watching you" policies. Stringent monitoring can waste different corporate resources. But people will be more conscious of how they use and abuse their Internet privileges if they know they could be held accountable.

The SIFT Consortium certifies Internet filtering and monitoring software. Its certification process includes checking that software appropriately blocks and monitors, cannot be circumvented, does not disable desirable Internet functions, and produces accurate activity logs and reports. Details on certification are available at www.ncsa.com/services/consortia/sift/certification.htm .

The NCSA SIFT document "Managing Employee Internet Access: A Guide for Creating and Administering Corporate Access Policy with Monitoring and Filtering Software" provides an overview of the problems of Internet policy abuse and sample Internet access guidelines. The guide can be downloaded from the NCSA site at www.ncsa.com .


Author Information

Matthew Bellm, internet editor mbellm@cahners.com




No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Big Data and IIoT value; Monitoring Big Data; Robotics safety standards and programming; Learning about PID
Motor specification guidelines; Understanding multivariable control; Improving a safety instrumented system; 2017 Engineers' Choice Award Winners
Selecting the best controller from several viewpoints; System integrator advice for the IIoT; TSN and real-time Ethernet; Questions to ask when selecting a VFD; Action items for an aging PLC/DCS
This digital report will explore several aspects of how IIoT will transform manufacturing in the coming years.
Motion control advances and solutions can help with machine control, automated control on assembly lines, integration of robotics and automation, and machine safety.
This article collection contains several articles on the Industrial Internet of Things (IIoT) and how it is transforming manufacturing.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Future of oil and gas projects; Reservoir models; The importance of SCADA to oil and gas
Big Data and bigger solutions; Tablet technologies; SCADA developments
SCADA at the junction, Managing risk through maintenance, Moving at the speed of data
Automation Engineer; Wood Group
System Integrator; Cross Integrated Systems Group
Jose S. Vasquez, Jr.
Fire & Life Safety Engineer; Technip USA Inc.
click me