Advice by computer expert: Illegitimate use of the computer at work
This expert opinion/advice was based on the suspicion that employees were overusing the computer for non-work related purposes. It was performed by a computer expert. It is an example of how something that is simple for an IT expert can help reduce conflicts and increase productivity.
Technical specifications:
- Computer consulting.
- Reason for action: Abusive use of computer systems at work.
Problem raised:
A small office was experiencing frequent adware and virus infections, network and system performance degradation. A drop in productivity had also been observed among employees, who were often caught on social networks, p2p servers and other non-work related and risky internet sites. There was a desire to curb this type of behavior legally, understanding that personal use of the computer at work is acceptable if it is done in moderation, but not if it is excessive.
Procedure followed:
- Analysis of the network topology and the identification/user system.
- Establishment of a hierarchical system of users and assignment of roles.
- Establishment of protocols for the installation and/or update of software.
- Implementation of tools to control spam e-mails.
- Place limitations on Internet searches.
- Internet access control through proxy.
- Training of personnel in the use of the systems, handling of passwords and in the knowledge of the risks they assume with their behavior.
- Establishment of a code of standards for control tools, which is made known to employees and for which they are asked to give their consent.
Results obtained:
The action helped restore productivity in the office and avoid the conflict that could eventually arise. It also increased the performance of networks and systems, which were no longer burdened with non-work-related traffic and functions.