You are on page 1of 4

Safety and Ethic in the Workplace As an Army Platoon Sergeant on a TRADOC (U.S.

Army Training and Doctrine Command) installation there are various technologies, I use daily in order to be able to do my job successfully. It is very important that my workplace practice good safety and ethnics to protect the internet from any nonessential risk. With over 200 soldier students, using multiple computers on a military network, it is important that each soldier is monitored as well as practice good cyber safety while on the internet. This paper will cover some of my own internet experiences, how I implement my organizations policy on the technology and how I will implement new strategies for the future. As the Platoon Sergeant, I in-process about 60 soldiers for my company, were the internet is critical. Without access to the internet or a computer, life in the military is very difficult, especially when much of its training is computer or technology-based. Once the soldiers arrive from basic training I immediately begin to help them in creating an Army sponsored account for access to the internet. During their initial briefing, I give the soldiers a very detailed counseling on the importance of internet ethnics. Topics and key points disseminated are Army sponsored
internet accounts will respect the legal protection of copyright material, authorship of programs and data on the network, and setting a reasonable time for internet usage. Also I go over government policy. It

requires that access be denied to sites containing prohibited content, such as pornography, gambling and hate-crime related activities (Dao, 2010). The internet is very fundamental in their school experience for the next seventeen weeks. The military network has a growing concern about current internet security. For instance, a trusted internet takes into account security, transaction protection, and identity assertion and management (Internet Society, 2013). Therefore, the soldiers sponsored account has a firewall to prevent the soldier from randomly surfing unauthorized areas of the internet. It can allow all traffic to pass through except data that

meets a predetermined set of criteria, or it can prohibit all traffic unless it meets a predetermined set of criteria (Comodo Group, Inc, 2013). Resultantly, once the soldiers account is created, there is information I must collect for the school database. This information is uploaded onto a shared drive, another technology I use daily. Information stored on the share drive can be shared with other authorized personnel. The shared drive has a secured feature that includes encrypting documents and password protecting files and folders containing the documents. Access to the shared drive is a critical part of my job, in that my company can maintain accountability of soldiers and their status. Nevertheless, there are many ways I help to implement the Armys policy on technology. First, I make sure everything I do on the internet is work related. I dont randomly browse the internet, or visit internet sites that are not authorized for use. Army accounts may be used for official unclassified U.S. Government business only and I cannot access to the internet for personal purposes. Failure to adhere to those sites will be logged by the NEC (Network Enterprise Center) and reported to higher command for appropriate action. Also, I must stay current on the DoD (Department of Defense) Information Awareness Training module on Internet Safety. Failure to comply to take the test can block or disable my Army account from internet usage. Another method to assist in policy is to be cognitive of files I am downloading, especially if it is information received through email. When I receive emails, there are steps I must follow before I open the attachments. I have to verify I know who sent the traffic. There are adversaries that constantly developing ways to attack or hack into our computer systems. Another way I ensure policy is being followed is by helping limit access to computer equipment to authorized users only. In regards to this, if I do see a security problem or issue, I report it to higher command for appropriate actions. I also prevent unauthorized access to documents on the

internet. On the computer desk top is an encrypted folder. I make sure a document that has sensitive information is being saved into that folder. If an unknown user attempts to remote into that computer, they will not be able to collect information stored in the encrypted folder. Point in fact, there are numerous ways I will implement new strategies for the future. First in mention, I will continue to brief new soldiers on internet usage, making sure they understand government policy, but I will include the soldiers to sign a users agreement, stating the full understanding of cyber safety and current risk management. Secondly, I will conduct quarterly training to enforce Internet education within my unit as well as my company in order to recognize vulnerabilities and defeat potential threats. In third, as far as the technology use, such as computer systems, I will enforce current anti-virus and security patches are downloaded and installed, as well as monitor the military computer systems by creating a scheduled maintenance day once or twice a month. Lastly, I will leave fliers near computer stations stating all sensitive information must be stored into an encrypted file and documents in files and folders on shared drives will be stored in the correct encrypted file. Needless to say, it is very critical to practice good safety and ethics at my job. With the growing concern with Internet safety, it is everyone jobs to insure we protect this resource. Furthering, we must influence ethnically soldiers and personal alike to morally do the right thing while accessing the internet.

Bibliography
Comodo Group, Inc. (2013). How Firewalls Protect Your PC. Retrieved from Comodo Group: http://www.comodo.com/resources/home/how-firewalls-work.php

Dao, J. (2010, February 26). The New York Times. Retrieved from Military Announces New Social Media Policy: http://atwar.blogs.nytimes.com/2010/02/26/military-announces-new-social-mediapolicy/?_r=0 Internet Society. (2013). Networks & Trust. Retrieved from Internet Society: http://www.internetsociety.org/what-we-do/internet-technology-matters/networks-trust

You might also like