Feeds

Business PCs riddled with porn

Majority of companies discipline staff

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

Workplace porn in the UK is rife. More than 70 per cent of firms have disciplined staff in the last two years as a result of workers viewing pornographic images on company PCs, a survey published this week reveals.

The study by computer image detection firm PixAlert in conjunction with the Chartered Institute of Personnel and Development (CIPD) also found more than half (54 per cent) of UK managers were unaware of legal responsibilities over illegal and inappropriate images in the workplace. Two in three of the companies surveyed failed to keep their 'Computer Acceptable Usage Policy' up to date, exposing them to potential criminal or civil claims. A majority of companies used at least some URL blocking or censorware apps, but nearly 70 per cent have not installed technology capable of identifying improper images.

Imogen Haslam, CIPD Professional Adviser, said: "Many people may view some inappropriate computer images as a bit of harmless fun. But this is not just about sparing blushes. A culture where some dodgy pictures are tolerated can all too easily create the environment where far more offensive or even illegal images can find their way into an organisation – by accident or otherwise."

She said that human resource departments needs to work closely with IT to make sure that the systems are in place to monitor and enforce policies. "Employers need to have clear, consistent policies that leave no room for doubt in the minds of employees and keep up to date with the rapidly advancing array of technology that can make it easy for unwanted images to slip into the workplace unnoticed. This should not be left to the IT department alone. It’s not computers that bring inappropriate or illegal images to work, it is people," she added.

The PixAlert/CIPD Annual Survey assembled the responses of IT and human resource directors at over 200 medium to large-sized UK organisations from both the public and private sectors. ®

Related stories

Looked at porn? The boss can't just fire you (if you're Dutch)
P45s for Porn Surfers
Net misuse costs corporate America $2,000 per second
HP confirms 150 suspended in email porn probe
Merseyside council suspends five in porn probe
Porn probe at Ford plant
Porn site chief in $38m credit card scam

The Essential Guide to IT Transformation

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Bose says today IS F*** With Dre Day: Beats sued in patent battle
Music gear giant seeks some of that sweet, sweet Apple pie
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.