Journal #6

Cyber technology is prevalent everywhere nowadays, creating an opportunity for workplace deviance. Workplace deviance occurs from an angered employee that has access to vital information that they can use against the company. This employee can download information and take with them to possibly “steal” customers from the company. The gruntled employee could also take pertinent information to a rival company and sell it, or simply delete files from the company before leaving. Another example of workplace deviance would be compromising the network where it is not secure, thus allowing for security threats to pass through into the company from hackers.

Cyber technology has made it extremely difficult to locate exactly where the deviance took place over a computer rather than this happening in person. Before the digital age, it was easier to pinpoint such deviant activity on an individual by catching them going through paper files, photo copying records or having them access restricted areas via a security camera.

It is not uncommon for workplaces to experience some sort of deviance from employees when one of them feels like they should have received a promotion, got terminated or if they want to “punish” their company in some way. In today’s world, nearly all important and private information is stored online and available at the employee’s fingertips. Disgruntled employees could, in fact, do a lot of damage to the company by downloading important files and taking it with them to their next job, having the network not as secure as it should be, erasing files, the list goes on.

Because of the risk of having a company’s important and private information stolen or compromised, each company should have some guidelines in place such as employee log on passwords so certain tasks can be traced as to what information is accessible to each employee and what they have access to. By having a proactive plan in place, this would help alleviate the possibility of having information compromised, or at least being able to pinpoint the employee who made the infraction.

Leave a Reply

Your email address will not be published. Required fields are marked *