Professional Documents
Culture Documents
Karthik Margabandhu
Ottawa University
Introduction
The advance of the Internet created a wave of changes to how the world does business.
However, with computers and the Internet integrated into nearly every aspect of business,
companies are becoming increasingly aware of the risks of Internet misuse posed by employees
using the ubiquitous Internet for personal online transactions or to check their social media
newsfeeds (Siau et al., 2002). Or what sports fan hasn't visited ESPN.com during work hours to
check the latest football score for his or her favorite team? A study found that at least 64 percent
of employees visit non-work-related websites daily (Schwartz, 2015). Sending personal emails,
online shopping, downloading music, private banking, browsing the Internet for sports or other
content, or visiting social networking sites such as Facebook, Instagram, or Twitter are examples
Theft of employee time can have a negative impact on a company, resulting in a decline
in productivity and profit. Using company computer software and the Internet for personal
business is one of the most common ways employees abuse company resources (Ferrell,
Fraedrich, & Ferrell, 2019). Even though the aforementioned issue may be minor in comparison
to other unethical problems at work, it may have a ripple effect on employee productivity. Few
hundred dollars is a relatively modest amount of money. However, for many small businesses, a
few hundred dollars can be a significant sum. When an employee switches between a work-
related task and a personal online website, they lose some focus and concentration. For instance,
when an employee leaves a website like Facebook, it takes a few moments for his or her brain to
fully refocus on the previous task (Anderson, 2020). Many businesses that previously allowed
unrestricted Internet access are beginning to implement strict internet policies by blocking
According to a survey, 47% of employees send up to five personal emails per day, while
32% send up to ten. 28% receive up to 20 emails per day (Vault.com, n.d).
According to Frank Rauchfuß, CEO of intelliAd, the busiest time of day for online
shopping is between 2 and 6 p.m. on weekdays. In terms of device usage, he added that
dollar earned in the United States is lost to employee theft. Another study found that time
theft costs U.S. employers over $400 billion in lost productivity annually (Bowersox,
2018).
HR concern. My personal case study discusses the increasing use of the Internet for personal
purposes by employees at work and corrective measures that companies can take, drawing on my
The Internet has revolutionized how businesses operate, communicate, and conduct
business. Statistics indicate that the inappropriate use of the Internet by employees during work
hours raises moral and legal concerns. According to studies, employees use the Internet
extensively for personal reasons during work hours. Businesses strive to effectively regulate
Internet usage and increase employee productivity. Sending personal emails, online shopping,
downloading music, internet banking, browsing the Internet for sports information, and logging
into social media platforms such as Facebook or Twitter are typical examples of internet abuse
on a business network (Ferrell, Fraedrich, & Ferrell, 2019). Currently, mobile networking
devices, laptops, and other Internet-capable technologies enable employees to access the World
ETHICAL CASE STUDY 4
Wide Web from anywhere, a capability that could affect workplace operations if employers do
In this case study, I will discuss the ethical issues, concerns, and difficulties associated
with internet abuse and internet addiction at my place of employment (ABC). As a strategic
measure to combat the misuse of the Internet by employees, we will also consider possible
courses of action, such as employee training and the implementation of internet usage policies.
Parties Involved
Employees, employers, the IT department, and the Human Resources department are
stakeholders in this ethical issue, and each has a unique set of rights and obligations.
Employees who use the company's Internet for personal purposes, resulting in decreased
The IT department and the Human resource department are stakeholders because
implementing an internet usage policy and monitoring employee internet usage is typically the
responsibility of both departments, as they seek to protect both the employee and the networking
divisions is necessary to ensure that a comprehensive internet usage policy and guideline are
developed in accordance with the needs of the organization (GFI Software, n.d.).
Company ABC (employers) are stakeholders because the Internet has altered the scope of
employment laws and employer liability for workplace harassment and discrimination. For
instance, coworkers who engage in harassing behavior, such as making inappropriate comments
about another employee's disability on a social networking website, may be guilty of workplace
Ethical Issues
Should employees be allowed to use the Internet for any lawful purpose? Is Internet
access at work a privilege, a right, or a luxury? ABC considers Internet access a privilege and
seeks to restrict it to maximize business use, business connectivity, and employee productivity
(IP) rights, privacy, sexual harassment, and cyber security, businesses must implement an
internet usage policy (IUP) to address issues arising from employees' inappropriate Internet use.
The following are some of the ethical challenges ABC and its employees face:
1. Initial research on the effects of using the Internet for personal purposes during work
as telephones, computers, printers, email, and Internet access. When employees abuse
3. Internet Surveillance in the Workplace As both the employer and the employees must
protect their own interests, ABC may result in a conflict between the two parties.
Employers will want to ensure that company resources are not being abused, whereas
activities, businesses can develop ethical monitoring policies regardless (Burks, 2016).
Companies that monitor the internet usage of their employees while ensuring that they do
2006). By documenting employee accountability for internet use, employers can identify
employees who misuse company internet. Employers should use monitoring software to
record their employees' secure browsing history for accountability purposes (Martin
& Freeman, 2002). There may be some employee apprehension as a result of the fact
that greater transparency means less privacy (Burmester et al., 2006). A benefit to
accountability is the fact that employees are not liable for the inappropriate use of the
Failure to investigate policy violations and take appropriate disciplinary action may
demonstrate to employees that the company (ABC) was aware of the illegal or unethical
behavior and did nothing about it, thereby undermining employee confidence and trust in the
home to purchase. He visits real estate websites such as Zillow.com, Trulia.com, and
Realtor.com frequently. During work hours, he spends at least one to two hours searching for
homes that meet his requirements or conversing with a real estate agent about the home's
specifics.
distracted while monitoring stock prices on Robinhood.com using company internet. As a result
action may be viewed as employee training and development by others within the organization.
Nonetheless, this employee is watching these videos to improve his software skills for a
freelance project. This employee is misusing company resources for personal gain.
As stated previously, many employees frequently check stock prices, search for travel
discounts, and send personal e-mail using company internet while at work despite their
employers' prohibitions (R. Johnson & Rawlins, 2008). If employees abuse the Internet,
employers may incur civil and criminal liability in both state and federal courts. Employee X can
file a complaint against the employer if, for example, Employee Y in my organization sends
sexually explicit or harassing e-mails to Employee X, even though the behavior does not benefit
my company or advance its business objectives (e.g., for the toxic environment or sexual
harassment). Vicarious liability renders company ABC (employer) inevitably liable for damages,
regardless of whether they were aware of the email. Employer Y is liable in this instance because
it permitted Employee Y to send the email and is responsible for monitoring Employee Y's
behavior.
Ethical dilemma
Employees who use the Internet for non-work-related purposes deplete network resources
and reduce the system's responsiveness to work-related tasks. Due to the need for subscriptions
to internet service providers and hardware to accommodate growing network traffic and data
storage, Internet connectivity costs company ABC money. A major technology company audited
its internal network for one week in order to examine online communications. The remainder of
online communications, such as accessing sports pages, news channels, and online games,
As outlined in the ethical issues, inappropriate use of the company's internet by company
ABC employees can slow internet access for other employees and eventually lead to system
failure. There are billions of dollars in lost productivity for every minute, hour, or day that an
employee uses the Internet for personal reasons. Fifty percent of employees surveyed by an
Internet management company admitted to using company Internet for personal reasons
(Saalfield, 2005). Internet usage is one of the greatest obstacles to employee productivity, as
approximately 34 million of the 68 million U.S. employees who use the Internet at work do so
for personal reasons. Continued Internet use for personal purposes by U.S. employees costs
businesses $178 billion annually, or $5,000 per employee (Saalfield, 2005). Websense Inc.
estimates that Internet abuse in the workplace costs U.S. companies $63 billion in lost
advancing the goals of company ABC. The unwarranted use of the company's Internet for
personal purposes during working hours should be prohibited, but the occasional and reasonable
ABC's internet usage policy must not be violated in any way using the company's
Internet.
• The use of business Internet for personal purposes should not have negative effects on the
Internet and new technologies have a substantial impact on the workplace and how work
is performed. In the workplace, technology has proven to be both beneficial and detrimental.
Employers are increasingly required to address issues associated with the misuse and abuse of
employee communication systems. The case study focuses heavily on technology misuse in the
workplace.
Course of Actions
More than 700 businesses were surveyed by Telemate.com where they asked senior
executives, information technology managers and human resource managers about employee
Internet abuse and Internet misuse was reported by 70% of them where misuse attributed to the
real costs to their companies, and 83% were worried about how to resolve the problem (Young,
2001).
The following courses of action will help ensure employees stay within acceptable internet
1. Evaluate the present risk of the company due to Internet harassment of employees
2. To protect the business from corporate liability, create a robust employee, appropriate
1. Evaluation of current risk: If the company currently does not employ Internet usage
policies, employee monitoring, and training on acceptable internet usage, your business is
at significant corporate risk, and it essential that the company takes action.
2. Internet usage and abuse policy: Unlimited employee use of the Internet seems to have
the potential to drain internet connectivity and decrease employee productivity. The
internet usage. The policy should clearly define employee internet usage behavior and
should also include consequences for violations. This policy can act as a legal document
for all employees with internet access privileges. A comprehensive policy will safeguard
the employer from corporate risk and liability due to lawsuits such as employee internet
misuse termination. It will also prevent the excessive drain of the company internet.
3. Collaboration between IT and HR: Crossing training between the IT team and the HR
team is essential for the HR teams to understand the technology involved in employee
monitoring to assist in prompt response in case of potential problems. The IT team needs
to be involved in the process of compiling an internet usage policy along with the HR
teams.
4. Monitoring internet usage: Using a filter to block websites that reduce employee
productivity and are objectionable to company policies. Companies can monitor time
spent on news sites, online shopping, etc. and track employee activities. Employee Y in
my organization sends harassing emails, and Employee B browses the internet surfing
sports sites; Employee Y's use will be most likely to be deemed a policy violation due to
ETHICAL CASE STUDY 11
the online activity's sensitivity even though Employee B spends a large amount browsing
sports sites.
5. Educate employees: Companies need to provide training to existing employees and new
The above-listed courses of actions will result in improved employee accountability and
ethical integrity when online. It also enhances employee morale and job productivity and
However, when employers employ filters as a part of employee monitoring, while filters
are useful, they are not full-proof, as computer-savvy employees can disable the filter or pass
through the firewall with ease. Using software that erases their Internet tracks and removes any
traces of inappropriate or objectionable online use can also hinder the monitoring process
(Young, 2001).
Employers face legal dilemma when deciding to monitor employee activities. The
concern is that if they do not monitor their systems, they may be held liable where abuses of
computer systems occur. However, if they choose to monitor their systems, employers may risk
actions for invasion of privacy. In such cases, employers can take preventive measures by asking
employees to sign an acknowledgement indicting that use of the employer has the right to
monitor systems and that employees are forbidden from excessive usage of company resources
While deciding which employee needs to be monitored, the company should determine if
job status influences their decision. If all employees are monitored, how will senior management
ETHICAL CASE STUDY 12
react to this decision? Many businesses may choose to monitor middle to lower management to
cope with this situation, providing senior management with unlimited Internet access. The
expectation is that, because of their job duties, senior managers would not misuse the Internet.
Senior-level managers, however, are equally prone to develop excessive or abusive Internet
habits.
Terminating employees who misuse company internet results in ending internet abuse;
however, it generates hidden costs for the employer, such as recruitment expenses. Termination
of an employee can also create fear, mistrust, and hostility in the workplace. Therefore, ABC
In the given scenario, I would choose the second course of action: to enforce an extensive
employee Internet usage and abuse policy to safeguard the company from legal responsibility. In
addition to the Internet usage policy, I will employ an employee internet monitoring system.
employee usage of the Internet can drain the internet network and lower employee productivity
by implementing an internet usage policy (IUP) that will delineate acceptable and unacceptable
The Internet Usage Policy is an important document that all employees must sign when
starting employment (GFI Software, n.d). In addition to defining acceptable uses, an internet
usage policy will clearly outline prohibited uses, online conduct rules, and privileges for access.
ETHICAL CASE STUDY 13
Violation of the policy will lead to employee termination. This signed document by the
The policy will have details on computer and internet access, unacceptable behavior,
security, copyright issues, acceptable means of communication via the company internet, and
consequences in violations. Some of the questions that will be answered in the policy are as
below:
1. Computer and Internet Access: Any Internet data that ABC's computer systems generate,
send, and receive will be regarded as official data. It is subject to disclosure and can only
be revealed for lawful reasons. The company will deem any equipment and technology
used to access the Internet as their property, and the firm will have the right to monitor
music or movies will be prohibited. Browsing potentially harmful websites that might
3. Security: Our company will ensure that anti-virus software will be installed on all
company laptops and computers. Employees found that disabling firewalls without
Al these points that will be included in the Internet Usage Policy will keep the company free
To protect company ABC from compliance issues that could occur if employees are
found misusing work computers for improper or unlawful networking practices, or if the
productivity of the employees is declining due to use of the Internet for personal purposes during
working hours, once the Internet Usage policy is implemented, the company can employ internet
usage monitoring at the workplace. The Internet Usage policy will delineate the penalties for
violating the company Internet usage policy and the its right to monitor Internet use. For
example, suppose I notice that Employee A's monitor has a gaming website open in such cases.
In that case, company ABC has legal grounds to be doubtful that Employee A is misusing the
company internet and wasting company resources for online gaming during work hours which an
Ethical decision making for me, is rooted in the Utilitarian Approach. Using the
utilitarian method, we first define the different courses of action open to us in order to examine a
problem. Secondly, we ask who is impacted by each action and what advantages or liabilities are
created by each action. Thirdly, we choose the action that will yield the best advantages and the
If I were in the same scenario before learning about professional ethics, I would have a
chat with Employee C, who claims to be watching tutorial videos to help him during his
freelance work since he is my teammate and works on the same project that I am working on.
ETHICAL CASE STUDY 15
Being unproductive directly affects the team's productivity and, therefore, brings a bad reputation
to the company.
By applying what I know about professional ethics, ethical decision-making will help me
identify unethical behavior and act accordingly. The ethical culture of my organization shows
that my company is ethically conscious. The opportunity for unethical behavior cannot be
eradicated without the implementation of codes and rules (Ferrell et al., 2019). My values
influence my ethical decision and responsibilities in the workplace. My values resonate with the
When the company implements an Internet Policy, by signing the Internet Usage Policy
and having other employees sign the policy, I will be obligated to ensure I make the right choice
and follow the company's guidelines and moral rules. If I report Employee C to the H.R.,
Employee C will have to face the consequences of violating the Internet Usage Policy and might
get terminated. This type of policy enforcement illustrates how the opportunity to commit
unethical acts can be eliminated or at least significantly reduced (Ferrell et al., 2019).
Employees are unlikely to start browsing the Internet for personal use when they are
Reviewing employee behavior helps the company track employees that don't follow
company standards. For example, that company will be able to track an employee indulges in
watching a sports league or browsing a social media platform like Instagram for a large amount
of time; time-tracking tools help monitor the number of hours your team works and how often
ETHICAL CASE STUDY 16
employees report late to the office. By reviewing this data, the company can monitor employee
productivity.
Any form of virus or malware could seriously interrupt a business; this could be harmful
to productivity and will have an impact on company profits. Tracking employee activities on the
Internet drastically lowers the risk of an employee visiting a malicious website and ensures that
only work-related tasks are carried out. The cost of setting up an internet monitoring solution
would be significantly cheaper than coping with a substantial disruption caused by a virus
outbreak.
With the internet usage policy in place, most employees will not misuse their internet
privileges, and the internet monitoring system guarantees that internet access is only used for
business purposes.
The Internet Monitoring System might lower the morale of employees who have been
efficient, loyal to the company, and hard working. Employees may feel that their managers don't
trust them to do their job right. A decline in productivity is often caused by low employee
Employees feel their privacy is being abused as a result of internet monitoring. For
example, if an employee wants to access internet banking during his/ her break time, he/she
There are pros and cons as employers maintain productivity and while trying to keep
My action can be backed by statistic data that shows that an estimated 60% of companies
globally monitored social media accounts in 2015 (Long, 2017). Companies chose to monitor
internet activity to track idle time, showing how often the employee is away from their desk and
Studies on Internet monitoring have revealed that many employees indulge in gambling
and theft during work hours. Companies have discovered that significant amounts of time were
spent watching cat videos on YouTube and shopping on eBay. Statistics suggest that 63% of
U.S. employers monitor their employees' Internet connections, and the studies have revealed that
64% of employees use the Internet for personal reasons during business hours (Long, 2017). 77%
of major US companies monitor employees at work through email, web browsing, phone calls,
Conclusion
The purpose of this case study was to examine the misuse of company internet by
employees at workplace. The case study analyzed a review of the case, case analysis, and a
recommended case solution. Previous experiences, case studies and statistical studies as well as
current research were used to frame the discussion. The course of action was selected based on
the pros and cons of the different course of action. The conclusion is to enforce an Internet Usage
References
Ferrell, O.C., Fraedrich, J., & Ferrell, L. (2019). Business ethics: Ethical decision making and
Case, C. J., & Young, K. S. (2002). Employee Internet Management: Current Business Practices
https://doi.org/10.1089/109493102760275608
Lichtenstein, S. (2011). Ethical issues for internet use policy: balancing employer and employee
https://doi.org/10.1504/ijtm.2011.039316
Long, P. (2017, September 15). The Case for Employee Monitoring and Usage Policies.
https://www.askbis.com/employee-monitoring-usage-policies/.