This report discusses the role of a security administrator in monitoring and restricting employee activity on company devices. It analyzes the consequences of unauthorized access and the positive impact areas of security administration. The report also explores the actions taken to mitigate the negative effects and the decision according to ACS ethical codes.