home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker 2
/
HACKER2.mdf
/
cud
/
cud435d.txt
< prev
next >
Wrap
Text File
|
1995-01-03
|
4KB
|
102 lines
Date: Tue, 04 Aug 92 07:25:55 -0400
From: (Lorrayne Schaefer) <lorrayne@SMILEY.MITRE.ORG>
Subject: File 4--Re: SURVEY: Is Big Brother Watching You?
((MODERATORS' NOTE: As previous posts in CuD demonstrate, computer
privacy in the workplace has become an important issue in the past
year. Lorrayne Schaefer has been active in collecting data to enable a
specific assessment of the types of policies currently in place in the
public and private sectors. CuD will summarize the results of her
findings when completed.))
The purpose of this survey is to collect data for a presentation that
I will give at this year's National Computer Security Conference in
October. I would like to thank you for taking the time to fill out
this survey. If you have any questions, you can call me at
703-883-5301 or send me email at lorrayne@smiley.mitre.org. Please
send your completed survey to:
Lorrayne Schaefer
The MITRE Corporation
M/S Z213
7525 Colshire Drive
McLean, VA 22102
lorrayne@smiley.mitre.org
This survey has been posted on some newsgroups a few months ago. This
survey has also been distributed to various conferences over the past
few months. All results will be in the form of statistical
information and keywords. All participants will remain anonymous.
If you have responded to this survey, I give you my thanks. I cannot
get a realistic enough picture without those who have spent some time
answering these questions. For those who are responding to this
survey now, thank you.
SURVEY: MONITORING IN THE WORKPLACE
1. What is your title?
2. What type of work does your organization do?
3. Does your organization currently monitor computer activity? (Yes/No)
a. If yes, what type of monitoring does your company do (e.g.,
electronic mail, bulletin boards, telephone, system activity, network
activity)?
b. Why does your company choose to monitor these things and how
is it done?
4. If you are considering (or are currently) using a monitoring
tool, what exactly would you monitor? How would you protect this
information?
5. Are you for or against monitoring? Why/why not? Think in
terms of whether it is ethical or unethical ("ethical" meaning
that it is right and "unethical" meaning it is wrong) for an
employer to monitor an employee's computer usage. In your
response, consider that the employee is allowed by the company to use
the computer and the company currently monitors computer activity.
6. If your company monitors employees, is it clearly defined in
your company policy?
7. In your opinion, does the employee have rights in terms of
being monitored?
8. In your opinion, does the company have rights to protect its
assets by using a form of monitoring tool?
9. If you are being monitored, do you take offense? Managers:
How do you handle situations in which the employee takes offense at
being monitored?
10. What measures does your company use to prevent misuse of
monitoring in the workplace?
11. If an employee is caught abusing the monitoring tool, what would
happen to that individual? If your company is not using any form of
monitoring, what do you think should happen to an individual who
abused the tool?
12. Is it unethical to monitor electronic mail to determine if the
employee is not abusing this company resource (e.g., suppose the
employee sends personal notes via a network to others that are not
work related)? Why or why not?
Downloaded From P-80 International Information Systems 304-744-2253