Browse Definitions :
Definition

Internet porn

Internet porn is sexually explicit content made available online in various formats including images, video files, video games and streaming video.

The legitimacy of pornography is a controversial issue. In the corporate world, however, Internet porn is unquestionably problematic. According to M. J. McMahon, publisher of AVN magazine, a trade publication that tracks the adult video industry, porn sites receive more hits during business hours than at other times of the day. Nielsen reported that 25% of employees access porn during business hours. 

Employees surfing porn wastes corporate resources and lowers productivity. Furthermore, the business may be legally responsible for illicit acts on the part of the employee, such as distributing child pornography or sending pornographic content – perhaps in an email message with a corporate signature -- to someone who doesn’t want to receive it. Because porn sites are known sources of viruses, spyware and adware, they also pose a security risk to users’ computers and the corporate network.

Many organizations use Web monitoring software to track employees’ online activity. Such software usually monitors Web site visits, email, IM, chat and searches in internal applications. It may also include a keylogger, to track what employees type. Email image monitoring programs can identify and block pornographic images. Monitoring software typically issues reports in the event of any breach of an organization’s acceptable use policy (AUP), identifying the employee and details of the activity.

The easy and usually free access to online porn, in combination with user anonymity, can lead to obsessive use. Obsessive use of Internet porn, online gaming and communication (which includes social media, email and instant messaging) are the three main variants of Internet addiction disorder (IAD), which is under review for inclusion in the Diagnostic and Statistical Manual of Mental Disorders (DSM-V).

This was last updated in June 2012

Continue Reading About Internet porn

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • biometric verification

    Biometric verification is any means by which a person can be uniquely identified by evaluating one or more distinguishing ...

  • password

    A password is a string of characters used to verify the identity of a user during the authentication process.

  • biometrics

    Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • VRAM (video RAM)

    VRAM (video RAM) refers to any type of random access memory (RAM) specifically used to store image data for a computer display.

  • virtual memory

    Virtual memory is a memory management technique where secondary memory can be used as if it were a part of the main memory.

Close