To: The
CEO
From: Asterina
Sapphire, Manager of Information and Technology
Date: 28
January 2013
Subject: Installing Electronic Auditing
Procedures To Monitor The Computer Use
of Employee
Nowadays, several of our competitors have installed electronic
auditing procedures to monitor the computer use of employees. Thus, as manager
of information and technology I am responsible to investigate this trend. Electronic
auditing is computer-assisted auditing that uses electronic records to complete
all or part of the audit. If we use a computer to record our business activity
and maintain this data electronically, we are a candidate for an electronic
audit.
To do this, we use a combination of purchased and custom-designed
software to perform electronic data conversion and analysis. Electronic
auditing uses various audit techniques including electronic detail auditing and
sampling. It is common to use more than one technique in the same audit. For
example, sales and purchases of fixed assets could be audited using the
electronic detail technique, while expenses could be audited using a sampling
method. Then, when performing an electronic audit, it may be possible to review
every transaction in a file, eliminating the need for sampling. If we can
perform a detail audit within the same amount of time as a sample, a detail
audit will be performed.
Meanwhile, sampling involves taking a segment of a much larger group
or population and making a conclusion about the population based on the sample
results. Generally, a sample can be conducted much faster than a detail audit
and is, therefore, less costly for you and the organization.
For your info sir, purpose why are other companies doing this
because the list can be
designed to record the various activities in the levels of systems,
applications, and users. If implemented correctly, provide an audit trail of
control detection is important to help realize the goals of security policy.
The audit trail usually consists of two types of audit data that is typed on
each detailed listing and list-oriented events.
In this procedure,
electronic auditing can detects unauthorized access to the system in real-time
or after the event. The main purpose of detection to penetrate the control
system. In reconstruction of events, analysis
of the audit can be used to reconstruct the various stages that can lead to a
variety of events such as system failures, security offenders by someone.
In my opinion, I think we should
doing electronic auditing procedure in our organization. This because, electronic
auditing often offers additional functionality such as the ability to perform
sample selections or to assist in the detection of fraud. Audit samples can quickly be drawn using a
variety of sampling techniques, such as random selection, fixed interval or
conditional sampling. The ability to assist in fraud detection may be
accomplished in various ways. For instance, it can search the data set for
unusual biases such as excessive expense reimbursement requests that are just
below the thresholds that require a manager's approval. Or the data may be
searched for patterns of fraud based on Benford's Law which is the mathematical
theory relating to the normal distribution of digits in a series of numbers.
The software will detect and identify unusual numerical patterns so they can be
investigated.
Electronic auditing also offers many
advantages but there are also some issues to be addressed before the techniques
can be implemented. The first step is to
decide what tests should be performed. Whether we are searching for fraud or
performing audit tests based on risk assessment, we will need to determine what
information should be tested and what data elements we will need to complete
the tests. Some test ideas might be to
compare vendor addresses with employee addresses or to search for unusually
high OT or bonuses in the payroll data.
The test options are only limited by the information available to our
understanding of the data.
Next, we will need to consider how
to get the information and how to get it into the software. This is where
electronic auditing software offers some additional benefits such as the
ability to read many different file types allowing the software to use
information from many different kinds of systems. Some of these programs also
provide “wizard” utilities to assist us through the import process.
With this, our employees will not
have to consider this thing is an invasion of their privacy because electronic
auditing can increase personal accountability. The audit trail can be used to
monitor user activity on the lowest level of detail. This capability is a
preventive control that can be used to influence behavior.
In instituting our employees
monitoring system, there are a lot advantages and disadvantages. However, each
of these things has its own explanation. First advantage is Higher Employee
Productivity which discourage employee from surfing the internet for personal
purpose such as paying their bills through internet banking, surfing social network
website such as Facebook, Twitter and etc.
In addition, it also can Increase in
Security. Any kind of viruses or malware could severely disrupt a business's
day to day activities. This could become detrimental to productivity and have a
knock on effect on profits. By monitoring employee internet use and ensuring
only business surfing is carried out this significantly reduces the risk of an
employee browsing to an infected website. The cost of having an internet
monitoring solution setup would be far less than dealing with a major
disruption due to a virus infection.
Next is proper internet use. The
majority of employees will never abuse internet privileges but as with anything
there will always be someone who will abuse the freedom. With an internet
monitoring system we can ensure that the internet connection is only used for
business activities. We can ensure that none of the staff will use the internet
to go to adult websites (porn). And we can also ensure that the staff won't
download any unnecessary staff such as movies, clips, songs and etc.
And the last advantage from
electronic auditing is it can protection from legal issues. It can protection
from legal issues. This is because many companies nowadays implement employees computer monitoring
policies simply because they want to protect themselves from potentially
expensive lawsuits and legal problems. According to the Texas Workforce
Commission, companies can be held liable for employee misuse of company email,
such as threats of violence or any type of harassment. In some extreme cases,
the employer may be included as a liable party if an employee uses the company
computer to view and send child pornography or other illegal materials. Beside,
protection from Information theft (hacked by hackers) will protect our
organization and its employees from theft of confidential or private
information including trademarked and copyrighted materials.
On the other hand, disadvantage from
electronic auditing are employee morale which is the benefits of internet
monitoring are pretty obvious but what's not so obvious is the dent in staff
morale. Employee who were always loyal, productive and actively working hard
may suffer from a blow to self-esteem. They may feel that their bosses don't
have any trust in them to do their job. Low employee morale always causes a
decrease in productivity and this can outweigh all the benefits of internet
monitoring.
Meanwhile, second disadvantage for
doing electronic auditing in our organization is privacy. As a result of
internet monitoring many employees will feels like their privacy is being
violated and let's face-it no one likes to be watched. It would obviously be
quicker for an employee to carry out online banking at lunchtime rather than go
down to the bank and have to wait in a queue. Employees may feel uneasy about
carrying out their online banking if they knew their connection was being
monitored.
However, the third disadvantages of
implementing employee computer monitoring programs I mean doing electronic auditing in our organization
can create a tense work environment. Some employees may feel as if the
management team doesn't trust them and this can lead to job dissatisfaction and
turnover. Most young workers are so accustomed to the different Internet tools,
they may be discouraged from working for a company that blocks them from
certain websites or prohibits any type of non-work-related computer activities.
Next is devious employees. An
employee surveillance system can sometimes lull you into a false sense of
security. When you have active surveillance, you automatically assume that you
have all of the necessary angles covered. Employees that want to defeat your
monitoring system can find methods that you may have missed when you installed
the system. Employees with expertise tend to tries to breach (hack) the
security policy applied in the office just to test their skills and try the
security level of the security policy.
Lastly is expense. Making use of an
employee surveillance program requires additional staff members to monitor the
surveillance and watch for significant events. There is also the additional
expense of the equipment necessary to do surveillance, the software needed to
integrate surveillance in with the computer network and the cost of ongoing
maintenance and upgrades to our monitoring materials. As our company expands so will the need for
more surveillance to keep up with new staff members and additional company
locations.
From the above, Employees should
have the right to privacy, yet at the same time they should respect the
workplace and not abuse the Internet for personal purposes. There are many
offices that do still allow liberal policies, but their employees also realize that
they cannot spend their day surfing the web and neglecting their jobs; it is a
privilege that should not be abused. Respect goes both ways.
The bottom line is the computers and
networks they are connected to are company property, so when it comes to rights,
it is the company's right to make this decision. The workplace is an
environment to work if employees are worried about their electronic privacy
with all the technology available today they can do their personal business off
hours.
There are clearly many pros and cons
for using internet monitoring. Many companies go for other options such as
filtering solution rather than monitoring. By using filtering software in the
internet connection, certain types of websites are permanently blocked and certain
are only block during office hours. This option is much less obtrusive and will
often be easier to implement as staff won't feel that their privacy is being
invaded.
Fairness is also a big issue. For
example, I am not a smoker. There are other people that work under certain
employer are smokers. Given the number of smoke breaks those heavy smokers take
a day, estimated that time to add up to as much as 30-40 minutes per day, spent
outside and away from their desks and phone. With other that is not a smoker,
is it fair to them that they don't get that extra time in breaks? If they are
surfing the web, they are still at their desk able to answer the phone. That's
better than not being there at all. What about employees spending time talking
on personal cell phones and sending text messages? Many phones also have
Internet access on them, but how would you monitor that?
Another thing to consider in regard
to monitoring employees is who gets the task of actually doing the monitoring.
It will require work from the IT department or whoever does the computers to
set up logs for keeping track of web usage. If you want some kind of keylogging
software installed, this also requires extra work. Does this job go to
department managers? If so, what if that department manager is part of the
problem? How high up the corporate ladder do you have to place this monitor in
order to make it fair? Many factors must be considered before jumping into a
heavy handed monitoring policy.
And for your reference sir, you
might have heard about keyloggers but really don’t know what they are reading
this article will clear your mind. A keylogger also know as keystroke logger is
software or hardware device which monitors each and every key typed by you on
your keyboard. You cannot identify the presence of keylogger on your computer
since it runs in background and also it is not listed in task manager or
control panel. It can be used by company owner to spy on their employes.
In other word, Keylogger is an ‘Access Control Software’. It enables us to
control, restrict and record access and usage of our organization PC. We can prevent the use of
specific programs, block access to certain websites, restrict access to Windows
functions and more. In addition to access control, Keylogger can also record
all user activities including keystrokes, websites visits, applications ran,
chats and more.
Keylogger runs hidden in the
background to Spy on our Windows PC. It helps users secretly record keystrokes,
reveal passwords, track websites, monitor applications or files and take
screenshots and more. All the logs will be automatically sent to email box by
users. Keylogger assists us to keep track of what is happening on our computer.
The invisible Keylogger enables us to secretly track the keystrokes, Passwords
(Website passwords, Facebook passwords, Yahoo passwords, Google mail passwords,
Game passwords, World of Warcraft passwords, Skype passwords, AIM passwords)
and many more website and application passwords from all computer users and
automatically receive logs by email.
Keylogger is also professional in
blocking websites and applications as a parental control tool. Adding the
keywords of the website category or the launch file of an application to the
Blacklist of the filter built into Keylogger, users are able to easily block
all sorts of websites and programs. There are two types of keylogger hardware
keylogger and software keylogger. Software keylogger is install in our
organization’s computer where as a Hardware keylogger is attached to the keyboard.
Meanwhile, keylogger is a hardware
device or a software program that records the real time activity of a computer
user including the keyboard keys they press.
Keyloggers are used in IT
organizations to troubleshoot technical problems with computers and business
networks. Keyloggers can also be used by a family or business to monitor the
network usage of people without their direct knowledge. Finally, malicious
individuals may use keyloggers on public computers to steal passwords or credit
card information.
Some keylogger software is freely
available on the Internet, while others are commercial or private applications.
Most keyloggers allow not only keyboard keystrokes to be captured but also are
often capable of collecting screen captures from the computer. Normal
keylogging programs store their data on the local hard drive but some are
programmed to automatically transmit data over the network to a remote computer
or Web server.
Keyloggers are sometimes part of
malware packages downloaded onto computers without the owners' knowledge.
Detecting the presence of a keylogger on a computer can be difficult. So-called
anti-keylogging programs have been developed to thwart keylogging systems and
these are often effective when used properly.
In my opinion, I think a carefully
worded Internet usage policy combined with a strict punishment system is better
than constantly keeping tabs on your employees. Having actually worked in a ‘Big
Brother’ type environment, I can personally attest to the attitude it creates
among employees and the way it contributes to the company's rather high
turnover rate. If employees are spending too much time on the Internet, then I
would first consider that a management issue. If those employees are playing on
the web because they have too much free time then Internet usage may not be
your only problem.
(2593 Words)
There are many software out there but Activity management software & best employee management software are in high demand since it helps a lot in tracking the regular activities of the employees. Visit here smartmanager.com.qa
ReplyDelete