Assignment 4
Assignment 4
BMEM5103
ETHICS FOR MANAGERS
MAY 2015
i) Introduction – The Company Profile
The Dow Chemical Co. was founded in 1947 and is headquartered in Midland,
Michigan. The company manufactures and supplies products used primarily as raw
materials in the manufacture of customer products and services. The company serves the
chemical processing, electronics, furniture, housewares, oil and gas, packaging, paints,
coatings and adhesives, personal care, pharmaceutical, processed foods, pulp and paper,
textile and carpet, utilities, and water treatment. The company operates though five
biotechnology products and technologies, urban pest management solutions, and healthy
oils. The business invents, develops, manufactures, and market products for use in
agricultural, industrial, and commercial pest management and food services. The Consumer
Solutions segment consists of three global businesses such as Consumer Care, Dow
Automotive Systems, and Dow Electronic Materials. These global businesses develop and
market customized materials using advanced technology and unique chemistries for
adhesives and foams used by the transportation industry, and cellulosic for innovative
industrial coating applications, building insulation, adhesives, microbial protection for the
oil and gas industry, and water technologies. The Performance Materials & Chemicals
1
advantaged through integration and driven by innovative technology and solutions such as
supporting a low-cost manufacturing base and consistent, reliable supply. The Performance
Employee’ internet misuse and abuse has gotten to be such a problem that has
become one of the leading causes of job termination with high-profile cases such as The
New York Times, Xerox, Dow Chemical, and Merck & Company who have disciplined
and dismissed employees for internet abuse. The Dow Chemical Co.’s problem started in
the early 2000 with employees transmitting pornographic email. In September 2000, Dow
Chemical Co. fired 24 employees for alleged violating the company’s email policy by
circulating violent or sexually explicit material at its plant in Freeport, Texas. Other 235
It started with one person was harassed; therefore, the company downloaded
everybody’s email. As in this case, when employees make a specific complaint, it triggered
an investigation which included a review of the servers which host the 6,000 email
accounts. This action comes as company scrutinizing what they perceived as abuse of the
electronic communication privileges they offer their employees. Most of the material was
off-color jokes, nude pictures and photos of car wrecks. Employees who had pornographic
or violent materials in their accounts were investigated. Those who actively brought in,
2
saved, and disseminated the materials, those who had material that was extremely graphic
or violent in nature, and those with histories of violating Dow policies were singled out for
termination. On the other hand, employees who innocently received pornographic materials
weren’t investigated.
While the internet is a practical tool, it can easily be misused in the workplace.
employees were spending work hours shopping online even after the company distributed
book outlining policies which included the prohibition of computer use for personal and
objectionable subject matters. Other illegal internet’s activities includes play interactive
games, chat with friends, accessed Penthouse thousands of times each month. From the
investigation conducted, some of the employees told that they were unaware of Dow’s
While there is not much dispute that companies have both the power and the legal
right to monitor emails sent on the company network, ethical conflicts arise when managers
are faced with the task of monitoring communications. There is an argument saying that
Dow is violating privacy right. On the other hand, some argue that Dow wasn’t violating
privacy rights because an employer has the right to view email in employees’ corporate
accounts. However, Dow had to look at the email to determine if the claims of sexual
Dow Chemical Co. had to investigate the pornographic emails to avoid appearing to
support a hostile work environment. This action is rightful consistent with D’Arcy and
Devaraj (2012) that argue misusing company technology is morally wrong. Dow Chemical
lost over four billion dollars a year due to lost employee productivity and organizational
efficiency when wired workers utilize internet access at work to view news sites, send and
received personal emails. Dismissals based upon internet abuse result in significant
3
production delays and repeated turnover costs that cut into the corporate bottom-line. While
the focus has revenue losses generated by poor worker productivity and job turnover
increases, dollar estimates haven’t even been placed on the cost to the growing climate of
corporate distrust and low employee morale generated by such monitoring practices and
When Dow Chemical fired employees for abuse, new issues emerge. Employee
termination for internet abuse may solve one problem, i.e. the abuse. However, it can lead
to new problems such as expanded job turnover and recruitment costs. Frequent job
turnover can result in productivity slowdowns due to increased job vacancies and
production delays while recruiting for open positions. Zero-tolerance policy for employees
due to internet abuse costs company extraneous expenses in the recruitment for
replacements. And once hired, these new recruits must be trained, and during that training
period are not as efficient in the capacity that is expected to increase organizational
efficiency.
Besides that, the integrity of sensitive data on a computer system such as company
risked due to information security breaches caused by internet misuse. When the employees
are surfing in the unnecessary web, this can easily result in the spread of computer viruses
that lead to complete network shutdowns or corrupt valuable databases that stop daily
operations and lead to costly repairs, especially if efficient disaster emergency plans are not
in place. Ultimately, such abuses may leave company vulnerable to hackers and
In addition, the internet misuse may cause network slowdowns and system failure.
Employees who utilize the internet for other than job tasks place a significant drain on
network energy only to decrease responsiveness of the system for job related functions.
4
Access to the internet costs business’s money, either in fees to Internet Service Providers,
or in hardware costs necessary to accommodate increased network traffic and data storage.
An employee's inappropriate use may negatively affect others employees' speed of access
or storage space for work product. Or worse, system slowdowns can delay data retrieval
Moreover, for every minute, hour, or day that an employee utilizes work access to the
internet for recreation use that is a minute, hour, or day the employee is not working, which
results in billions of dollars of lost productivity for the company. The estimation from a
cross section of industry analysts show that employee internet abuse is a serious financial
concern for any company that provides online access to workers (Mubarak & Sitnikova,
2009).
The one thing a Dow Chemical strives to build is its reputation. It’s reputation for
being a strong and reliable company. It’s reputation for being able to succeed. It’s
reputation for quality and customer service. As wired workers surf during hours, they are
slower to respond to customer needs, unable to meet deadlines, and fail to complete tasks.
Employees who abuse the internet under-perform. This translates into poor quality and
compromised because the company is unable to meet consumer needs and/or delivery
quality products. Over time, these factors will create a negative brand image as the
reputation of the company becomes tarnished and the firm is labelled unreliable and
unresponsive.
company that equally impact organizational productivity, efficiency, and cohesion. First,
employee internet misuse and abuse compromise customer goodwill. As customers learn
about firings due to internet abuse at the firm, consumers are less trustful of the integrity of
5
the company. Customers may turn to competitors who they view as more dependable and
reliable, which results in lost revenue for the company. Secondly, employee goodwill is
compromised when employers decide to monitor all internet use and take a zero-tolerance
stance on any incidents of internet misuse. Often, employees fear employers and this
creates poor morale among wired workers that can lead to poor job motivation and output.
will look for alternative employment. While this individual may not have been the best
employee for the company, repeated turnover due to poor morale is an unhealthy trend for
any company. Finally, investor goodwill is hurt due to underlying production delays and
sale losses created by employee internet abuse. Specifically, the stock value of the company
may decline or it may be more difficult for the firm to obtain new financing. Business
longevity is significantly hindered and potential revenue is lost to competitors and that
email by employees are a major employee internet abuse concern. In Dow’s case, a
supervisor sent inappropriate e-mail to female employee, and the e-mail was used as
evidence from which a reasonable jury could find that failure to promote a woman was
based on gender. Jokes emailed to co-workers may seem like just an innocent way to
brighten up another’s day; however, these jokes can also lead to costly harassment suits as
harassment lawsuit. And it is not just the person who sent the email, but the entire company
may be liable if the email was sent over a firm’s intranet or network mailing system. A
6
supervisor sent the discriminatory email, but the entire company was held liable because it
was sent during work hours and on the work email system.
The investigation team found serious issues regarding the internet abuse on Dow
Chemical and a lack of procedures to ensure that employees are following the company’s
policies. Dow doesn’t normally monitor employee email and has no intention of starting
regular screening despite the latest incident. One factor behind the rise of computer ethics is
the lingering suspicion that employees may be unprepared to deal effectively with the
ethical issues that arise in their workplace. Over the years, this suspicion has been
reinforced by mostly anecdotal research that seems to show that employees simply do not
recognize when ethical issues are present. More surprisingly, a significant minority of
employees held to their belief that no ethics issue was present even in cases of email abuse.
Many internet abuse catastrophes are the result of unintended actions and, as such, offer
From the investigation conducted, some of the employees were not aware of the
technology resources. The Policies are available to employees on the company intranet and
were outlined separately in a booklet, called “Respect and Responsibility” that was
distributed to all Dow workers. The Dow’s Computer Use Policy prohibited personal use
during the working hours. However, the Policy did not present an objective standard
the other hand, some other employees didn’t take them seriously.
Besides that, this issue is directly related to workforce education because abuse of
technology in the workplace has the ability to cause a human performance problem while at
the same time obstructs labour market advantage for the individual.
7
iv) Moral Principles
With respect to internal activity, employers have a greater right to restrict employee
use of technology because companies own their equipment, and it is generally understood
that the intended use of company equipment is business purposes. These circumstances
generally can establish that employees do not have a right to privacy when using an
assigned computer or any other technology tools, including email. When determining
discovered on an assigned work computer, the company held the employees did not have
privacy interest by relying on: (1) the employers' computer use policy prohibiting personal
use of the systems; and (2) the fact that the equipment was owned by the company. The
company acknowledged, however, that the employee did establish a subjective expectation
of privacy as evidenced by password protections and a locked office door. This subjective
Overall, the employer has a legal right to control the use of the equipment they gave
to employees for business purposes. The 1986 Electronic Communication Privacy Act
grants employers the right to review stored communications such as email on the
company’s computer system. Dow Chemical Co. is not in the habit of snooping at
employee emails on a regular basis. But, on the back of the complaint, it decided to monitor
all email use during a one week period. The US chemical company said the action was
According to Kennedy and Kanan (2004), in the US, Courts generally recognize that
a company may access email stored on its own system for business purposes, especially
after a warning has been given. In addition, the US law gives employees few protections
8
conversations, read messages sent to and from corporate email accounts, and record and
disclose the contents of employee communications. Employees that bring legal challenges
combat the problem. First, the incident has prompted the company to increase efforts to
internet use and abuse policy to protect the company from corporate liability. Developing a
comprehensive electronic communications policy is perhaps the best tool for avoiding
potential risks associated with the internet, blogs, text messages, email, and other electronic
The Internet Use Policy is a visible tool that not only provides guidance on
appropriate online behavior but also outlines how violations will be handled. This policy is
a written agreement that establishes the permissible workplace uses of the internet. In
addition to describing permissible uses, an effective Internet Use Policy should specifically
set out prohibited uses, rules of online behavior, and access privileges. Among others, the
policies should be clearly stated that the company is prohibits potentially harassing emails,
internet or other computer use. Besides that, the use of company equipment for
may properly be forbidden. Most important, the company should include a notification that
workers have no privacy expectation in any technology provided by the company, including
9
examined at the company’s discretion. Penalties for violations of the policy, including
security violations and vandalism of the system, should also be covered. Anyone using a
company's internet connection should be required to sign the policy, and know that it will
A comprehensive policy will help minimize employee internet abuse, shield the
employer from possible sexual harassment suits, prevent drains on network resources for
frivolous use, and reduce corporate risk and liability, especially in the event of legal action
downloads, copyright issues, security, online harassment, and how violations will be
handled. In addition, the policy should include provisions prohibiting discriminatory, lewd,
or competitors. Employees should be reminded that, when using company technology, they
must comply with all other company policies, such as policies against sexual harassment
and discrimination. The company also should regularly alert employees that their online
activities may be monitored and that inappropriate use may result in disciplinary action.
In addition, in order to combat these morale issues, the company must learn how to
effectively implement appropriate policies and monitoring strategies that cultivate an open
and positive work environment for wired workers. It would be very hard for the company to
prevent employees from making some personal use of this technology. Even if this could be
done, it would require diverting substantial resources to do it, and the cost in goodwill and
workplace harmony would be huge. Rather than attempt this, the company may tolerate a
certain level of personal use. Having these policies in place, and enforcing them promptly
10
against transgressors, can help the company keep insulating distance between it and its
enforce policies. Once appropriately communicated, the next level of employees’ internet
enforce policies. The company should begun to rely upon filtering software and firewalls to
block access to inappropriate areas of the internet and employ the use of monitoring
software to detect incidents of employees’ internet abuse. To avoid giving a litigant the
opportunity to show the policy is a pretext, the company should comply with the policy and
potential abuse and to enforce existing policies. Monitoring methods include direct
which as its name implies allows reconstruction of every computer action, and keyword
flagging, which alerts management to use of specific words in email or internet searches.
This keyword flagging is useful not only for locating sexually or racially oriented material
but also for tracking the company’s proprietary information. Software for all these purposes
is commercially available, and consultants are able to provide monitoring at almost any
level of detail required. When the company is using monitoring software to deter potential
abuse, awareness that employees’ email, computer, and internet use are monitored by the
company should be given to the employees. The company must make constant reminders
by techniques such as splash screens. Employees should be made to realize that they are in
effect copying their supervisors on all emails, and that their supervisors are in a position to
11
Given the mass of employees to regulate and supervise, it is not surprising that large
firms reported the greatest benefit from electronic monitoring, which provides a systematic
review of internet usage among numerous employees. Electronic monitoring allows large
firms to accurately track users efficiently, helping them detect patterns of abuse at an earlier
stage of development. Furthermore, Internet Use Policies were found moderately effective
among large firms and policies offer an added benefit with respect to corporate liability to
protect sizable organizations from potential lawsuits due to firings or dismissals results
Besides that, filters are an effective deterrent as they disable an employee’s ability to
access sites that the company finds unproductive or objectionable. The main target can be
blocked access to adult entertainment web sites. In addition, any problematic web site or
area of the internet can be filtered. While filters are effective, they are not full proof, as
computer-savvy employees can disable the filter or pass through the firewall with ease.
Employers must also monitor employee internet accounts with software that generates
internet usage reports that tracks an employee’s online activities such as web sites visited
and duration of use. Excessive time spent at entertainment sites, sport sites, or online
shopping can be detected or visits to adult entertainment sites can be tracked. Here again, a
computer-savvy employee may be able to apply software that erases their internet tracks
Having policies and monitoring software build an excellent foundation, but while the
company has put forth these measures, it must routinely communicate these policies to
employees and utilize seminars to educate employees about internet use and its potential for
abuse. Therefore, the material contained in the booklet will teach employees additional
12
acceptable Internet Use Policy and enhance their cohesion with workplace technologies in
Finally, the key thing is training and education for their employees. Young and Case
(2003) found that both large and small firms rated management training an equally effective
deterrent suggesting that training may be a viable strategy when dealing with relatively few
or relatively many employees. Dow Chemical Co. should educate and re-educate
employees of company policies to increase compliance. Once the company has developed
an appropriate policy, the next step is to clearly communicate these policies to employees.
What is the best method to communicate an acceptable internet use policy that will achieve
employee compliance? The answer varies. Dow Chemical may include the Internet Use
Policy within an employee manual given to new hires, or the company may utilize policy
management software to distribute and update policy information via emails. Each method
has its own set of unique problems to overcome. Perhaps new hires don’t actually read the
employee handbook, or they don’t fully absorb what they sign, or the policy management
In the past, the company relied upon written communication alone to convey the
importance of appropriate internet use within the workplace. However, the employees’
internet abuse is on the rise despite the implementation of an acceptable Internet Use Policy
due to unawareness of the employees. Another difficulty that company face is how to
communicate policy updates that stay current with new technologies in the workplace. The
company must then modify the internet acceptable use policies to incorporate these new
updating policies, leaving themselves at great corporate risk if an employee abuses the new
13
The training regarding employee internet use and its potential for abuse is one of the
best methods to communicate policies and aid in the prevention of internet abuse. These
corporate training programs are akin to sensitivity training for sexual harassment or
diversity training that increases employee awareness of the issues, reduces the occurrence
of future incidents, and decreases corporate liability. Ultimately, these type of corporate
seminars are a proactive response on the part of management to implement education that
increase employee awareness about such topics as clearly defining what is acceptable and
unacceptable internet use, identifying the warning signs and risk factors for abuse, and how
to address underlying problems in an employee’s life that contribute to internet abuse. Such
seminars utilize didactics, small group discussions, and concrete exercises to convey
material in an organized and meaningful fashion. Some of the benefits from awareness
training program includes enhances employees’ understanding about what is acceptable and
Internet Use Policy, provides training to long time employees as well as new hires,
v) Conclusion
Abuse of workplace technology has been an important topic of discussion over the
past several years. In fact, Dow Chemical Co. identified that their employees have admitted
using email for transmitting pornographic email. This employees’ internet abuse costs
billions of dollars in lost productivity, lost goodwill, and lost potential sales. The employees
should be acknowledged that computers and programs are entirely the property of the
14
employer, and employees should have little or no expectations of privacy when using the
employer’s property. Many of the problems caused are due to employees’ ignorance of the
Besides that, employers generally claim ownership of employee’s email. They argue
company time, they should be able to inspect it. They make similar claims about other
online employee communications when they use company-owned computers and the
company’s network. This has generally been accepted by the courts, as long as employees
are informed that they are being monitored and they receive due process before any
punitive action is taken However, another issue is the consent of the employees being
monitored. Employer claim that employees know, or should know, that email and other
Therefore, the company must employ effective internet use management strategies
technologies and enable then successfully integrate the internet within the company. Dow
Chemical Co. increasingly finding it necessary to watch for and regulate emails and other
online workplace communications that could be taken as harassing, in order to protect their
employees and protect themselves from liability. Even when there is no question of
showing how employees are spending their time, what they are accomplishing, and so on.
Or it can help managers track the progress of a project by seeing what work is being done,
what problems have been encountered and what responses have been tried.
15
vi) References
security management among law firms. Proceedings of the 7th Australian Information
Security Management Conference, Perth, Western Australia, 1st to 3rd December 2019
Young, K. S. and Case, C. J. (2003). Employee internet abuse: Risk management strategies
16