preview

Job Case Study

Better Essays

Depending on the size and scope of the company, the option exists to simply not have IT Security Personnel and operate using Gmail and a platform like Google Business to communicate and manage projects involving multiple employees and locations. This works well for some companies, but for others, it could be viewed as unprofessional to not have their own dedicated email service and business software. It also puts company information on a 3rd party platform and could involve other various risks and legal aspects of not having their own closed off and secured network. It does solve the problem of not having an IT Security employee looking through other employees’ emails. It would also allow managers or project leaders to include only …show more content…

Would this change if the employee was using their personal email to leak company information, financial information, company trade secrets, etc.? Or if they were just suspected of such activity? They did use the company network. However, they didn’t know they were being monitored by IT Security Personnel. Obviously, this would result in company policies being broken and the employee would be fired and possibly have legal action taken against them. Although the employee could possibly have a legal counter action towards the company, in that the employer covertly monitored them in order to break into their personal email to gain the knowledge to begin with. Most large companies would have clauses in their policies and procedures that they have new employees sign, and also possibly nondisclosure forms to prevent this from happening and being fought over in the legal system which can be costly, time consuming, and create negative public images for both the employee and employer. What if the employee suspected of leaking company information actually was just emailing some personal information using the company email system, and IT Security still used keystroke log software to break into that email and view it? Again, the company would probably have it stated in their policies upon hiring the employee, that if they use the company computer network to log into personal email, any and all computer activity could be monitored

Get Access