SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
GFI White Paper

   Web monitoring for employee
    productivity enhancement
                        By Amy Babinchak

 Employees both want and do not want to have their Internet use
restricted. The key to success in gaining productivity and employee
       acceptance of the problem is the perception of fairness,
                  clear goals and self-enforcement.
Contents
                 Introduction                                                 3
                 Why employees don’t want Internet blocking                   3
                 Why employers are afraid of Internet blocking                3
                 Why employees want Internet controls                         3
                 How employers can gain employee support for web monitoring   4
                 Conclusion                                                   4
                 About GFI®                                                   4




Web monitoring for employee productivity enhancement                              2
Introduction
All too often when web monitoring and Internet use restrictions are put into place it hurts company morale
and does little to enhance employee productivity. Not wanting to create friction in the work place many
employers shy away from using what could be a significant employee productivity enhancement tool.
Wasting time through Internet activities is simple and it’s a huge hidden cost to business. Just answering a few
personal emails, checking the sports scores, reading the news headlines and checking to see how your bid is
holding up can easily waste an hour of time each day. If the company has an eight-person department and
each of them spends an hour a day on the above activities, that is a whole employee wasted!

Why employees don’t want Internet blocking
»» They don’t know what is blocked and what is allowed. This uncertainty creates fear that they may do
     “something” that could hurt their advancement opportunities or worse jeopardize their job.
»»   Someone ruined it for everyone and that person still works here. When everyone is punished, no one is
     happy. Resentment builds against the employee known to have visited inappropriate websites.
»»   There is no procedure in place for allowing an employee access to a blocked website. When an employee
     finds that a website they tried to access is blocked, what do they do? Certainly this indiscretion is going
     to show up on a report somewhere. What if they really need that site? Is there a procedure in place for
     allowing this person to access it?
Uncertainty is fodder for loss of morale. In today’s economic climate, employees are especially sensitive to
any action that can be perceived as clamping down on them. Therefore a web monitoring program must be
developed that can be viewed in a positive light by all employees.

Why employers are afraid of Internet blocking
»» The potential of adding to IT costs and human resources headaches takes away the value from web
     monitoring. The Internet is a big place and employees are smart. Employers don’t want to get into a
     situation where they are simply chasing their tail, trading one productivity loss by incurred costs and
     frustration elsewhere.
»»   Employers want to allow employee freedom. There is general recognition by employers that a happy
     employee is a loyal productive employee. Allowing certain freedoms creates a more satisfying work
     environment. The impact of taking that away may cause good employees to leave and an increase in turn
     over can be costly.
The fear of trading one cost for another or trading one headache for another has prevented many employers
from implementing internet monitoring and blocking. A mistrust of IT services may also come into play.
Technology got us into this situation, where up to 20% of employee time is spent on the Internet; many
employers don’t trust that technology can also help them gain that productivity back. A monitoring program
needs to be simple to implement and maintain.

Why employees want Internet controls
»» Employees are very aware of what their co-workers are doing or not doing. If an employee in the office
     spends an hour every day monitoring their auctions on ebay, or reading personal email or chatting on IM
     every other employee in the office knows it and resents it. If they are working hard, everyone else should be too.
»»   Unfortunately pornographic and other offensive material finds its way into the office when the Internet is
     unrestricted. Exposure to this material puts the employee in a difficult situation. Do they tell the boss? Do
     they try to ignore it? Do they talk to the employee themselves? The employee would rather not be put
     into this situation.
»»   Employees want to work for successful, growing companies. Solid corporate policies that are seen as
     a necessary means to continue to propel the company forward add to employee satisfaction. Web
     monitoring can be one of those policies.


Web monitoring for employee productivity enhancement                                                                  3
How employers can gain employee support for web monitoring
»» Provide a clear, fair policy statement and expose the reasoning and goals. Keep it simple. Employees won’t
     read a long policy position paper. Stick to the facts and use positive language.
     •»   Policies that make sense to staff are easy to enforce
     •»   Policies with goals are easy to measure
     •»   When the goal has been reached, celebrate with your employees in a big way. Everyone likes to feel
          like part of the team.
»»   Empower your employees. Let each employee actively participate in deciding which sites are allowed
     and which are not for them. Let the employee tell you what they need to be most productive and then
     provide it, no questions asked.
     •»   Most job positions will require between five and 20 websites. Employees know what they need. Ask
          them to provide a list.
»»   Show employees the web monitoring reports. Let them see the before and after and let them see the
     on-going reports. This will encourage self monitoring. This is an enforcement tool in disguise. Employees
     know that management can view these reports too and will take care that they make them look good.
     •»   Send employees a weekly report on their Internet usage. They will look at and will act upon to make
          sure they are portrayed to management in the best light and may even compare themselves against
          others.

Conclusion
Web monitoring is good for business. The Internet as a productivity tool has wide acceptance but recent
changes have brought new distractions costing business some of those productivity gains. The Internet
can be controlled but needs to be done in a way that allows for employee buy-in, self monitoring and self
enforcement to be successful.

About GFI
GFI Software provides web and mail security, archiving, backup and fax, networking and security software
and hosted IT solutions for small to medium-sized enterprises (SMEs) via an extensive global partner
community. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both
delivery models. With award-winning technology, a competitive pricing strategy, and a strong focus on the
unique requirements of SMEs, GFI satisfies the IT needs of organizations on a global scale. The company has
offices in the United States (North Carolina, California and Florida), UK (London and Dundee), Austria, Australia,
Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations
worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a
Microsoft Gold Certified Partner.
More information about GFI can be found at http://www.gfi.com.




Web monitoring for employee productivity enhancement                                                             4
USA,»CANADA»AND»CENTRAL»AND»SOUTH»AMERICA
15300 Weston Parkway, Suite 104, Cary, NC 27513, USA
Telephone: +1 (888) 243-4329
Fax: +1 (919) 379-3402
ussales@gfi.com



UK»AND»REPUBLIC»OF»IRELAND
Magna House, 18-32 London Road, Staines, Middlesex, TW18 4BP, UK
Telephone: +44 (0) 870 770 5370
Fax: +44 (0) 870 770 5377
sales@gfi.co.uk



EUROPE,»MIDDLE»EAST»AND»AFRICA
GFI House, San Andrea Street, San Gwann, SGN 1612, Malta
Telephone: +356 2205 2000
Fax: +356 2138 2419
sales@gfi.com



AUSTRALIA»AND»NEW»ZEALAND
83 King William Road, Unley 5061, South Australia
Telephone: +61 8 8273 3000
Fax: +61 8 8273 3099
sales@gfiap.com




Disclaimer

© 2011. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners.

The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but
not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential
damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the
accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out-
of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in
this document.

If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.

Contenu connexe

En vedette

Perform basic preventive and corrective maintenance (TLE) FOR GRADE 7
Perform basic preventive and corrective maintenance (TLE) FOR GRADE 7Perform basic preventive and corrective maintenance (TLE) FOR GRADE 7
Perform basic preventive and corrective maintenance (TLE) FOR GRADE 7diosdado17
 
Andon system presentation
Andon system presentationAndon system presentation
Andon system presentationMaxpromotion
 
Precision measuring tools
Precision measuring toolsPrecision measuring tools
Precision measuring toolsCraig Kielb
 
OPC Basic Introduction in Chinese
OPC Basic Introduction in ChineseOPC Basic Introduction in Chinese
OPC Basic Introduction in ChineseTallrain Zhang
 
Measurements and precision measuring devices
Measurements and precision measuring devicesMeasurements and precision measuring devices
Measurements and precision measuring devicesCraig Kielb
 
ANDON Solutions and Large format Displays with InduSoft Web Studio
ANDON Solutions and Large format Displays with InduSoft Web StudioANDON Solutions and Large format Displays with InduSoft Web Studio
ANDON Solutions and Large format Displays with InduSoft Web StudioAVEVA
 
Dial caliper & micrometer
Dial caliper & micrometerDial caliper & micrometer
Dial caliper & micrometerCraig Kielb
 
Fluid power, Hydraulic & penumatic
Fluid power, Hydraulic & penumaticFluid power, Hydraulic & penumatic
Fluid power, Hydraulic & penumaticMusa Sabri
 
Fluid power introduction
Fluid power introductionFluid power introduction
Fluid power introductionsukusobhaa
 
Spare parts control for maintenance purposes
Spare parts control for maintenance purposesSpare parts control for maintenance purposes
Spare parts control for maintenance purposesHimalaya Kanwar
 
Format Rancangan Perniagaan (RP)
Format Rancangan Perniagaan (RP)Format Rancangan Perniagaan (RP)
Format Rancangan Perniagaan (RP)Cik Aisyahfitrah
 
Spare Parts Management
Spare Parts ManagementSpare Parts Management
Spare Parts ManagementIEI GSC
 
S6 Lec1 Maintenance Definition Note
S6 Lec1 Maintenance Definition NoteS6 Lec1 Maintenance Definition Note
S6 Lec1 Maintenance Definition Noteno suhaila
 
Root Cause Analysis By Deepak
Root Cause Analysis By DeepakRoot Cause Analysis By Deepak
Root Cause Analysis By DeepakDEEPAK SAHOO
 
Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysistqmdoctor
 
Root cause analysis - tools and process
Root cause analysis - tools and processRoot cause analysis - tools and process
Root cause analysis - tools and processCharles Cotter, PhD
 

En vedette (19)

Perform basic preventive and corrective maintenance (TLE) FOR GRADE 7
Perform basic preventive and corrective maintenance (TLE) FOR GRADE 7Perform basic preventive and corrective maintenance (TLE) FOR GRADE 7
Perform basic preventive and corrective maintenance (TLE) FOR GRADE 7
 
Andon system presentation
Andon system presentationAndon system presentation
Andon system presentation
 
Precision measuring tools
Precision measuring toolsPrecision measuring tools
Precision measuring tools
 
OPC Basic Introduction in Chinese
OPC Basic Introduction in ChineseOPC Basic Introduction in Chinese
OPC Basic Introduction in Chinese
 
Measurements and precision measuring devices
Measurements and precision measuring devicesMeasurements and precision measuring devices
Measurements and precision measuring devices
 
ANDON Solutions and Large format Displays with InduSoft Web Studio
ANDON Solutions and Large format Displays with InduSoft Web StudioANDON Solutions and Large format Displays with InduSoft Web Studio
ANDON Solutions and Large format Displays with InduSoft Web Studio
 
Dial caliper & micrometer
Dial caliper & micrometerDial caliper & micrometer
Dial caliper & micrometer
 
Fluid power, Hydraulic & penumatic
Fluid power, Hydraulic & penumaticFluid power, Hydraulic & penumatic
Fluid power, Hydraulic & penumatic
 
Fluid power introduction
Fluid power introductionFluid power introduction
Fluid power introduction
 
Spare parts control for maintenance purposes
Spare parts control for maintenance purposesSpare parts control for maintenance purposes
Spare parts control for maintenance purposes
 
Format Rancangan Perniagaan (RP)
Format Rancangan Perniagaan (RP)Format Rancangan Perniagaan (RP)
Format Rancangan Perniagaan (RP)
 
Spare Parts Management
Spare Parts ManagementSpare Parts Management
Spare Parts Management
 
Lab pneumatic
Lab pneumatic Lab pneumatic
Lab pneumatic
 
S6 Lec1 Maintenance Definition Note
S6 Lec1 Maintenance Definition NoteS6 Lec1 Maintenance Definition Note
S6 Lec1 Maintenance Definition Note
 
Root Cause Analysis By Deepak
Root Cause Analysis By DeepakRoot Cause Analysis By Deepak
Root Cause Analysis By Deepak
 
Root Cause Analysis
Root Cause AnalysisRoot Cause Analysis
Root Cause Analysis
 
Basic hydraulic circuit
Basic hydraulic circuitBasic hydraulic circuit
Basic hydraulic circuit
 
Root cause analysis - tools and process
Root cause analysis - tools and processRoot cause analysis - tools and process
Root cause analysis - tools and process
 
Root Cause Analysis (RCA) Tools
Root Cause Analysis (RCA) ToolsRoot Cause Analysis (RCA) Tools
Root Cause Analysis (RCA) Tools
 

Plus de GFI Software

Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013GFI Software
 
Network Environments
Network EnvironmentsNetwork Environments
Network EnvironmentsGFI Software
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesGFI Software
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data BackupsGFI Software
 
Master Class Series
Master Class SeriesMaster Class Series
Master Class SeriesGFI Software
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBsGFI Software
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability ManagementGFI Software
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™GFI Software
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementGFI Software
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerGFI Software
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security SolutionsGFI Software
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web SecurityGFI Software
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkGFI Software
 
How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR SpamGFI Software
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 

Plus de GFI Software (20)

Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013Spotlight on GFI EndPoint Security 2013
Spotlight on GFI EndPoint Security 2013
 
Network Environments
Network EnvironmentsNetwork Environments
Network Environments
 
The Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage DevicesThe Threats Posed by Portable Storage Devices
The Threats Posed by Portable Storage Devices
 
Hybrid Technology
Hybrid TechnologyHybrid Technology
Hybrid Technology
 
Email Continuity
Email ContinuityEmail Continuity
Email Continuity
 
Understanding Data Backups
Understanding Data BackupsUnderstanding Data Backups
Understanding Data Backups
 
Data Backups
Data BackupsData Backups
Data Backups
 
Master Class Series
Master Class SeriesMaster Class Series
Master Class Series
 
Security Threats for SMBs
Security Threats for SMBsSecurity Threats for SMBs
Security Threats for SMBs
 
Security and SMBs
Security and SMBsSecurity and SMBs
Security and SMBs
 
Vulnerability Management
Vulnerability ManagementVulnerability Management
Vulnerability Management
 
Deploying GFI EventsManager™
Deploying GFI EventsManager™Deploying GFI EventsManager™
Deploying GFI EventsManager™
 
How to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log ManagementHow to Perform Network-wide Security Event Log Management
How to Perform Network-wide Security Event Log Management
 
How to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManagerHow to configure IBM iSeries event collection with Audit and GFI EventsManager
How to configure IBM iSeries event collection with Audit and GFI EventsManager
 
Email Security Solutions
Email Security SolutionsEmail Security Solutions
Email Security Solutions
 
Maxmp greylisting
Maxmp greylistingMaxmp greylisting
Maxmp greylisting
 
Messaging and Web Security
Messaging and Web SecurityMessaging and Web Security
Messaging and Web Security
 
How to Keep Spam Off Your Network
How to Keep Spam Off Your NetworkHow to Keep Spam Off Your Network
How to Keep Spam Off Your Network
 
How to Block NDR Spam
How to Block NDR SpamHow to Block NDR Spam
How to Block NDR Spam
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 

Dernier

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Dernier (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Web Monitoring for Employee Productivity Enhancement

  • 1. GFI White Paper Web monitoring for employee productivity enhancement By Amy Babinchak Employees both want and do not want to have their Internet use restricted. The key to success in gaining productivity and employee acceptance of the problem is the perception of fairness, clear goals and self-enforcement.
  • 2. Contents Introduction 3 Why employees don’t want Internet blocking 3 Why employers are afraid of Internet blocking 3 Why employees want Internet controls 3 How employers can gain employee support for web monitoring 4 Conclusion 4 About GFI® 4 Web monitoring for employee productivity enhancement 2
  • 3. Introduction All too often when web monitoring and Internet use restrictions are put into place it hurts company morale and does little to enhance employee productivity. Not wanting to create friction in the work place many employers shy away from using what could be a significant employee productivity enhancement tool. Wasting time through Internet activities is simple and it’s a huge hidden cost to business. Just answering a few personal emails, checking the sports scores, reading the news headlines and checking to see how your bid is holding up can easily waste an hour of time each day. If the company has an eight-person department and each of them spends an hour a day on the above activities, that is a whole employee wasted! Why employees don’t want Internet blocking »» They don’t know what is blocked and what is allowed. This uncertainty creates fear that they may do “something” that could hurt their advancement opportunities or worse jeopardize their job. »» Someone ruined it for everyone and that person still works here. When everyone is punished, no one is happy. Resentment builds against the employee known to have visited inappropriate websites. »» There is no procedure in place for allowing an employee access to a blocked website. When an employee finds that a website they tried to access is blocked, what do they do? Certainly this indiscretion is going to show up on a report somewhere. What if they really need that site? Is there a procedure in place for allowing this person to access it? Uncertainty is fodder for loss of morale. In today’s economic climate, employees are especially sensitive to any action that can be perceived as clamping down on them. Therefore a web monitoring program must be developed that can be viewed in a positive light by all employees. Why employers are afraid of Internet blocking »» The potential of adding to IT costs and human resources headaches takes away the value from web monitoring. The Internet is a big place and employees are smart. Employers don’t want to get into a situation where they are simply chasing their tail, trading one productivity loss by incurred costs and frustration elsewhere. »» Employers want to allow employee freedom. There is general recognition by employers that a happy employee is a loyal productive employee. Allowing certain freedoms creates a more satisfying work environment. The impact of taking that away may cause good employees to leave and an increase in turn over can be costly. The fear of trading one cost for another or trading one headache for another has prevented many employers from implementing internet monitoring and blocking. A mistrust of IT services may also come into play. Technology got us into this situation, where up to 20% of employee time is spent on the Internet; many employers don’t trust that technology can also help them gain that productivity back. A monitoring program needs to be simple to implement and maintain. Why employees want Internet controls »» Employees are very aware of what their co-workers are doing or not doing. If an employee in the office spends an hour every day monitoring their auctions on ebay, or reading personal email or chatting on IM every other employee in the office knows it and resents it. If they are working hard, everyone else should be too. »» Unfortunately pornographic and other offensive material finds its way into the office when the Internet is unrestricted. Exposure to this material puts the employee in a difficult situation. Do they tell the boss? Do they try to ignore it? Do they talk to the employee themselves? The employee would rather not be put into this situation. »» Employees want to work for successful, growing companies. Solid corporate policies that are seen as a necessary means to continue to propel the company forward add to employee satisfaction. Web monitoring can be one of those policies. Web monitoring for employee productivity enhancement 3
  • 4. How employers can gain employee support for web monitoring »» Provide a clear, fair policy statement and expose the reasoning and goals. Keep it simple. Employees won’t read a long policy position paper. Stick to the facts and use positive language. •» Policies that make sense to staff are easy to enforce •» Policies with goals are easy to measure •» When the goal has been reached, celebrate with your employees in a big way. Everyone likes to feel like part of the team. »» Empower your employees. Let each employee actively participate in deciding which sites are allowed and which are not for them. Let the employee tell you what they need to be most productive and then provide it, no questions asked. •» Most job positions will require between five and 20 websites. Employees know what they need. Ask them to provide a list. »» Show employees the web monitoring reports. Let them see the before and after and let them see the on-going reports. This will encourage self monitoring. This is an enforcement tool in disguise. Employees know that management can view these reports too and will take care that they make them look good. •» Send employees a weekly report on their Internet usage. They will look at and will act upon to make sure they are portrayed to management in the best light and may even compare themselves against others. Conclusion Web monitoring is good for business. The Internet as a productivity tool has wide acceptance but recent changes have brought new distractions costing business some of those productivity gains. The Internet can be controlled but needs to be done in a way that allows for employee buy-in, self monitoring and self enforcement to be successful. About GFI GFI Software provides web and mail security, archiving, backup and fax, networking and security software and hosted IT solutions for small to medium-sized enterprises (SMEs) via an extensive global partner community. GFI products are available either as on-premise solutions, in the cloud or as a hybrid of both delivery models. With award-winning technology, a competitive pricing strategy, and a strong focus on the unique requirements of SMEs, GFI satisfies the IT needs of organizations on a global scale. The company has offices in the United States (North Carolina, California and Florida), UK (London and Dundee), Austria, Australia, Malta, Hong Kong, Philippines and Romania, which together support hundreds of thousands of installations worldwide. GFI is a channel-focused company with thousands of partners throughout the world and is also a Microsoft Gold Certified Partner. More information about GFI can be found at http://www.gfi.com. Web monitoring for employee productivity enhancement 4
  • 5. USA,»CANADA»AND»CENTRAL»AND»SOUTH»AMERICA 15300 Weston Parkway, Suite 104, Cary, NC 27513, USA Telephone: +1 (888) 243-4329 Fax: +1 (919) 379-3402 ussales@gfi.com UK»AND»REPUBLIC»OF»IRELAND Magna House, 18-32 London Road, Staines, Middlesex, TW18 4BP, UK Telephone: +44 (0) 870 770 5370 Fax: +44 (0) 870 770 5377 sales@gfi.co.uk EUROPE,»MIDDLE»EAST»AND»AFRICA GFI House, San Andrea Street, San Gwann, SGN 1612, Malta Telephone: +356 2205 2000 Fax: +356 2138 2419 sales@gfi.com AUSTRALIA»AND»NEW»ZEALAND 83 King William Road, Unley 5061, South Australia Telephone: +61 8 8273 3000 Fax: +61 8 8273 3099 sales@gfiap.com Disclaimer © 2011. GFI Software. All rights reserved. All product and company names herein may be trademarks of their respective owners. The information and content in this document is provided for informational purposes only and is provided “as is” with no warranty of any kind, either express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-infringement. GFI Software is not liable for any damages, including any consequential damages, of any kind that may result from the use of this document. The information is obtained from publicly available sources. Though reasonable effort has been made to ensure the accuracy of the data provided, GFI makes no claim, promise or guarantee about the completeness, accuracy, recency or adequacy of information and is not responsible for misprints, out- of-date information, or errors. GFI makes no warranty, express or implied, and assumes no legal liability or responsibility for the accuracy or completeness of any information contained in this document. If you believe there are any factual errors in this document, please contact us and we will review your concerns as soon as practical.