27 August 2006

My Internet activities

During last 3 weeks I’ve been measuring my „cyber slacking” Internet activities (see a pie chart). But firstly, I would like to present some important information about my duties and working time, which in my opinion is quite important in this case.
The most important duties:
- preparing financial and technical documents,
- preparing internal and external documents,
- negotiations with providers and subcontractors,
- coordination of the various departments’ work.
Approximately 60% of my working time I spend in front of my computer screen. The remaining 40% is divided into meetings, negotiations and work coordination.
Normally I spend almost 11 hours in my office including visits in the building-site and short lunch break (usually it is 30 minutes break).
Every day after the work I try to make plans for next day. Of course, sticking to those detailed work’s schedules is quite difficult, but I do my best ; ]

During last 3 weeks I’ve tried to assiduously write all my Internet activities (not connected with my work and duties). I don’t have to much time to lose, but according to my “researches” I spend 29 minutes every day! The most time-consuming activity is news reading (41,4%), checking a privet e-mails box is on the second place (24,1%). For further information see a pie chart below.
Like in other researches, it’s necessary to ask the question about the results’ credibility. I’m aware of the low objective of it, taking into the consideration that I was the guinea-pig and I didn't use a special software to monitor the Internet traffic.

10 August 2006

Internet Acceptable Use Policy (IAUP)

IAUP is a written agreement, between employer and employee, whose intent is to identify permissible workplace uses of the Internet and prohibited workplace uses of the Internet.

Employers usually have sensitive data on their computer systems - company plans, customer data, or product designs may need a clause in their Internet Policy concerning trade secrets. It should be made clear to employees that under no circumstances should proprietary company information be passed though the Internet, or that such material be encrypted if transmitted over the Internet.

Employers should institute guidelines that prohibit illegal use of the Internet in general. A directive that employees take care not to violate copyright laws should be included. Gambling via the Internet may also be a concern, and an it should contain a prohibition against such activity not only because of its potentially adverse affect on productivity but also because the activity may be illegal.


General information about IAUP
http://www.nlrg.com/lawlet/iup.htm

Some examples of IAUP
http://www.doe.state.in.us/olr/aup/welcome.html
http://www.businesslink.gov.uk/bdotg/action/detail?type=RESOURCES&itemId=1076142205

01 August 2006

CYBER SLACKING. How to prevent and monitor?

In accordance to latest comment published by blogproof, I’ve decided to find more information about the monitoring and filtering software. The results of my searches are below...

Gallup estimates that the average employee with Internet access spends more than one hour per day surfing web sites that have nothing to do with their job (such as auction sites, sports sites, stock sites, news sites, gambling or sex sites). That is more than five hours per week!!!

In accordance to latest technology is it possible to monitor or to record everything your employees do online, including instant messages, chats, emails sent and received, web sites visited, applications launched, network connections established and bandwidth consumed, files downloaded, files copied to removable media, and keystrokes typed.

The filtering software
Filtering software blocks some of the sites your employees would want to visit. Theoretically, that cuts back on some non-work related surfing, but savvy surfers can always find a similar site that serves as a good substitute for the one the filtering software is blocking.
The bigger problem with filtering software is that it blocks many of the sites you want your employees to be able to access for business purposes. Although some filtering products do allow for the “unblocking” of blacklisted sites, do you really want the headaches associated with deciding what should be blocked and what should be available?
Finally, what is appropriate for one employee in one department may be off limits for an employee in another department. Although one size does not fit all, filtering products make the assumption that one solution works across the board.

The monitoring software
The monitoring software does not block, but of course it could. Instead, it watches, observes and records what your employees do and then provides you with the most detailed accounting of everything they do online of any Internet Monitoring product in the world. It records all web sites your employees visit, all chat conversations, all incoming and outgoing emails all applications run and all keystrokes typed. In addition, the monitoring software is constantly filming each computer, taking snapshots of whatever is on the computer screen, as often as once every second – with no degradation in speed or employee performance.

Interesting, isn’t it?

What about the ethical aspect of the CYBER SLACKING?

What’s your opinion about it?

Interesting links:
http://news.bbc.co.uk/2/hi/business/2134443.stm
http://news.bbc.co.uk/2/hi/science/nature/2117581.stm
http://news.bbc.co.uk/2/hi/uk_news/734844.stm