Almost all software has updates every now and then to meet with the new demands of technology. Internet Explorer is not exempted from needing updates. If updates are not made to enable the product cater to new services that might be available especially online, then this product may slowly fade as it was not able to meet the demands of the present generation. As an IT specialist, it is important for us to be able to explain these to our heads especially CIO’s the importance of updates as these may incur additional expenses on the part of the company. Although, we acknowledge the importance of these updates, this doesn’t mean that one must have to adopt every new version or update available. Before making the big decision of adopting or not the new version, some considerations must be done first. First, before clicking the update button, check first the specific feature that is provided in the update. Second, determine if this new update will needed in the current demands of work. Some updates are not really needed by some of us, and remember that updates usually means additional hardware resources. If these two have been compared then that’s the only time that you can decide if you forgo or not the installation of the update. Of course, fees if any are also to be considered.
Majority of companies resort in restricting applications users can open in their workstations as part of their efforts in increasing security of their systems. This is specially so if these work stations are networked or connected to the Internet. As a CIO, I consider this as a good practice for companies. Not only is the security of the company is ensured since only authorized applications are installed and opened by each employee. In addition to this, productivity of the employee is somewhat increased since he is not disturbed by other applications which may get in the way while the employee is doing his job. One good example of this is the installation of social media where personal social media accounts can be open. We all know that sometimes people have the tendency to “forget of the time” when they are in front of their social media accounts. If I were the user, I may regard the company insensitive at first, but upon careful thinking, I might realize that this just fair as the company is paying me for the time I work and this should not include the time that I do other things which are not within the scope of my work.
Personally, I consider the search made by the supervisor as reasonable since it may have been the easiest way to search for unlicensed software used by the employees. In addition, although the employees are the ones personally using these computers that are installed with unlicensed software, these are still the property of the company, and this just means that these are still under the responsibility of the company, in which one of their responsibilities is to ensure that they are using licensed software. The employees may not have the right to resist such because they are employees which should not add software to their computers that are not authorized by the company.
In terms of alternatives to identify computers installed with pirated software, software that could detect these may be installed however, this may take time in addition to the additional cost it may have on the company. (SoulSkill, 2009) Another way is to manually asked the employees if they have installed pirated software but with this you will never know the degree of honesty of the employees to you the truth.
Berzai, Lou (2012). Ethical Problems in Computing. Retrieved from http://www.aitp.org/news/98451/
Relkin, Jeff (2006). 10 Ethical Issues confronting IT managers. Retrieved from http://www.techrepublic.com/article/10-ethical-issues-confronting-it-managers/
SoulSkill (2009). How do you deal with pirated programs at work? Retrieved from http://ask.slashdot.org/story/09/03/24/1524242/how-do-you-deal-with-pirated-programs-at-work