Outer Banks County is a 200-square-mile area in coastal North Carolina, and you are the IT manager. The county has about a hundred office employees who perform clerical tasks in various departments. A recent budget crisis has resulted in a wage and hiring freeze, and morale has declined. The county manager has asked you to install some type of keystroke logger to monitor employees and determine whether they are fully productive. After your conversation, you wonder whether there might be some potential privacy and security issues involved. For example, does an employer have a duty to notify its employees that it is monitoring them? Should the employer notify them even if not required to do so? From a human resources viewpoint, what would be the best way to approach this issue? Also, does a potential security issue exist? If an unauthorized person gained possession of the keystroke log, he or she might be able to uncover passwords and other sensitive data. What are your conclusions? Are these issues important, and how would you respond to the county manager’s recommendation? Before you answer, you should go on the Internet and learn more about keystroke loggers generally, and specific products that currently are available.
Outer Banks County is a 200-square-mile area in coastal North Carolina, and you are the IT manager. The county has about a hundred office employees who perform clerical tasks in various departments. A recent budget crisis has resulted in a wage and hiring freeze, and morale has declined. The county manager has asked you to install some type of keystroke logger to monitor employees and determine whether they are fully productive. After your conversation, you wonder whether there might be some potential privacy and security issues involved. For example, does an employer have a duty to notify its employees that it is monitoring them? Should the employer notify them even if not required to do so? From a human resources viewpoint, what would be the best way to approach this issue? Also, does a potential security issue exist? If an unauthorized person gained possession of the keystroke log, he or she might be able to uncover passwords and other sensitive data.
What are your conclusions? Are these issues important, and how would you respond to the county manager’s recommendation? Before you answer, you should go on the Internet and learn more about keystroke loggers generally, and specific products that currently are available.
![](/static/compass_v2/shared-icons/check-mark.png)
Step by step
Solved in 3 steps
![Blurred answer](/static/compass_v2/solution-images/blurred-answer.jpg)
![Understanding Business](https://www.bartleby.com/isbn_cover_images/9781259929434/9781259929434_smallCoverImage.gif)
![Management (14th Edition)](https://www.bartleby.com/isbn_cover_images/9780134527604/9780134527604_smallCoverImage.gif)
![Spreadsheet Modeling & Decision Analysis: A Pract…](https://www.bartleby.com/isbn_cover_images/9781305947412/9781305947412_smallCoverImage.gif)
![Understanding Business](https://www.bartleby.com/isbn_cover_images/9781259929434/9781259929434_smallCoverImage.gif)
![Management (14th Edition)](https://www.bartleby.com/isbn_cover_images/9780134527604/9780134527604_smallCoverImage.gif)
![Spreadsheet Modeling & Decision Analysis: A Pract…](https://www.bartleby.com/isbn_cover_images/9781305947412/9781305947412_smallCoverImage.gif)
![Management Information Systems: Managing The Digi…](https://compass-isbn-assets.s3.amazonaws.com/isbn_cover_images/9780135191798/9780135191798_smallCoverImage.jpg)
![Business Essentials (12th Edition) (What's New in…](https://www.bartleby.com/isbn_cover_images/9780134728391/9780134728391_smallCoverImage.gif)
![Fundamentals of Management (10th Edition)](https://www.bartleby.com/isbn_cover_images/9780134237473/9780134237473_smallCoverImage.gif)