MonitoringEmployees’ Computer use

MonitoringEmployees’ Computer Use

Inany organization, supervisors have the mandate of monitoring theactivities of workers to ensure that they stick to the outlinedpolicies. Since the inception of the internet, it has becomenecessary to retrain the employees on the use of differentapplications that are consistent with their processes. Unlike inmanual tasks, whereby, the supervisors could physically monitor theworkers’ activities, the online platform poses a challenge inexecuting the task (Strohmeyer, 2011). However, the management canapply various approaches to check on workers’ activities. TheImagineAir staff conducts most of their business using computers.This presentation will point out several mechanisms that the firm canuse to monitor the employees’ activities to ensure that theyexploit the platform responsibly.

First,the leadership should set written policies to define the corporateinternet policy. The outlined rules will make the expectations clearfor all the employees. To develop this mechanism, the managementshould consider the risks, determine the expectations of theemployees, the work description, and create a balanced check. Forexample, the company should have a decree on the use of email,Facebook, sharing software, blogging, and the use of other socialplatforms. The regulation should also spell out the methods ofdestroying unwanted data and accessing the database (Strohmeyer,2011). ImagineAir’s leadership should bestow the mandate to ahigh-level manager to idealize the monitoring mechanism. By signingthe electronic code of conduct, the workers agree to take theliability for malpractice.

Secondly,the management may consider engaging technological monitoring toolsto check on the internet activity on the premises. Various softwarecan be used to record the amount of time spent online and the sitesfrequented by the workers. They include Spectorsoft 360, WorkExaminer, StaffCop, iMonitor, and InterGuard among others (Alge &ampHansen, 2014). The applications are imperative to either filter orblock some web content that may be against the values outlined byImagineAir. The filtering should be proactive to prevent receiving orsending information that can jeopardize the business (Alge &ampHansen, 2014). Although the employees are required to abide by thecomputer use policy, the managers should be preclusive to avert anyattempt to override the objective. The primary goal is not to punishthe workers, but to uphold the business values and ethics.

Anotherway of monitoring the use of computers at ImagineAir is checking theaccess reports regularly. Through technology applications, aresponsible manager can generate reports for all employees andidentify the sites that they regularly visit (Nord et al., 2006). Itassists in addressing any indulgence regarded as a waste of time orinappropriate for the business activities. Such observations can befixed by sending a structured message to the individual workers. Inaddition, a subsequent report can identify a change in behavior ornon-compliance that can attract a specified punishment.

Inconclusion, as an intern at ImagineAir, I believe that monitoring theuse of computers can help in ensuring that the employees remain ontrack of the outlined objectives. The leadership should develop acorporate policy to guide on the prohibited use of computers,including, making publication, as well as sending and receivinginformation. It should also invest in monitoring software that helpin evaluating the time spent by the employees in different sites. Theresponsible managers should act on the reports to direct the staffand ensure its compliance with the internal electronic code ofconduct.


Alge,B. J., &amp Hansen, S. D. (2014). Workplacemonitoring and surveillance research since “1984”: A review andagenda.The psychology of workplace technology, New York, NY, 209-237.

Nord,G. D., McCubbins, T. F., &amp Nord, J. H. (2006). E-monitoring inthe workplace: Privacy, legislation, and surveillance software.Communicationsof the ACM, 49(8),72-77.

Strohmeyer,R. (2011). How to monitor your employees` pcs without going too far.PCWorld. Retrieved from