Monitoring in the organization- rationale, extent and potential issues
An organization installs a range of monitoring equipment to ensure that workers are committed to their work. Monitoring systems can provide evidence, and employees get the chance to correct their mistakes in case they have committed something wrong. Monitoring can be regarded as a safety measure. Particularly in a hazardous work environment where safety issues might occur regularly, it is vital to install monitoring systems.
The need for monitoring activities of workers
In an organization, security is a vital force because organizations deal with huge information. The information is valuable, and it is necessary to combine internal controls and systems to protect that information. Breaches occur mostly due to the error of employees. Hence, monitoring is necessary to track their activities and manage their actions. Again, the physical security of the firm can be enhanced by installing networks and systems that prevent data loss or data breaches. The activities of employees can be monitored using CCTV, intrusion detector, Guards, Intrusion alarm, and Motion detectors (CISM, 2009). These systems would keep track of the activities of employees, and they are not likely to commit activities that go against the organization. Don't use plagiarised sources.Get your custom essay just from $11/page
Degree and rationale behind monitoring
Monitoring often seems like a need when managers do not trust employees. It might give a negative impression, and employees might feel controlled or being watched 24/7, which is challenging mentally (Martin & Freeman, 2003). Nevertheless, managers should suppose that monitoring would ensure organizational safety and protection of equipment, digital as well as physical assets. Managers should rationalize the fact that the protection of organizational assets should be one of the primary concerns. Therefore, they can determine the degree to which they will monitor the activities of workers.
The extent to which user actions should be monitored
Traffic and user actions should be monitored after considering an extent. Monitoring activities should not interfere with the privacy of users. Nevertheless, it is vital to know the move of every user by using the activity monitoring software. This is necessary because an organization cannot bear the cost of data loss or data breaches. It is right to monitor their activities with the help of video recordings, kernel monitoring, and log collection (De Souza & Redmiles, 2011). Apart from that, it is wrong to invade their privacy. Insider threat is a severe issue, and malicious attacks can permanently hamper the organizational operations. Therefore, securing the business environment has become a necessity.
Ways of mitigating issues related to monitoring activities of users
Insider threat mainly refers to the harmful activities of users, and therefore, the risks can be mitigated by identifying the critical assets of the firm and present state of those assets. Monitoring decisions must be based on the availability of resources, money, as well as authority. In order to mitigate the risks, it is necessary to develop a proper threat program and indicates the implementation of legal procedures, IT security, HR, and physical security. Participation of everyone should be encouraged, and it is necessary to oversee the effectiveness of the program.
References
CISM, W. (2009). Information security management metrics: a definitive guide to effective security monitoring and measurement. Auerbach Publications.
De Souza, C. R., & Redmiles, D. F. (2011). The awareness network, to whom should i display my actions? and, whose actions should i monitor?. IEEE Transactions on Software Engineering, 37(3), 325-340.
Martin, K., & Freeman, R. E. (2003). Some problems with employee monitoring. Journal of Business Ethics, 43(4), 353-361.