Employee Email and Internet Use - A Small Business Guide

Introduction

It is widely recognised that Email and the Internet is here to stay! Both mediums have become a vital part of business and personal communication in a world that increasingly relies on technology. We understand its benefits and sometimes berate its downsides; too much email, lack of personal communication, spam, the risk of employees accessing inappropriate material and using employer resources for personal gain.

This gain in technology has not come without cost as increasingly employers and employees are being bought to task over breaches of copyright, confidentiality, privacy, discrimination and harassment and in some instances criminal offences (pornography, obscene and threatening material).

This fact sheet examines ways of measures you can take to greatly reduce and protect your business from legal and other risks.

Recently Monash University reported that email abuse had significantly increased as employees seek to avoid personal confrontation by sending abusive e-mails to those they had targeted or are angry with instead of speaking to them face to face.

This type of behaviour places employers at risk of claims of workplace harassment and discrimination and it is important that you take measures to ensure that this type of activity is clearly communicated as unacceptable to your employees.

By way of example, Biz Momentum undertook a sexual harassment investigation for an employer after an employee complained of sexual harassment by a work colleague. Biz Momentum found that the work colleague had unlawfully accessed 500 different pornographic web-sites over a period of 6 months and at the expense of the employer. The employer took appropriate action.

What should I include in my electronic mail & Internet policy

Biz Momentum recommends that you implement E-mail and Internet policies that includes the following key elements

1. Computer Policies and Procedures

2. E-mail and Internet for Business & Private Use

3. Audit

1. Policies and Procedures

Ensure that you have comprehensive computer policies and procedures relating to defined boundaries that protect you from legal risk for using your E-mail and Internet facilities.

Communicate these policies and procedures to your employees and new starts ? ensure that they sign off on these policies. This cannot be understated in the event of a dispute and is best practice management in protecting your business interests.

2. Email for Business & Private Use

a. Be upfront ? use of E-mail and the Internet is primarily for business use. If you allow reasonable private use, specify when (lunchbreak) and the type of mail employees may compose (electronic banking, child-care arrangements etc)

b. Be specific on what an employee may not access or use E-mail or the Internet for (breach of copyright, spam, masquerading, personal business gain, acts that incite hatred, discrimination to name a few).

3. Audit

Your policies and procedures should inform employees that you conduct regular computer audits in line with the law. This is not an invasive procedure but is designed to protect your business.

No matter what the size of your business, wether you have stand-alone computers or you are networked ensure that your computer logs are audited on a frequent basis.

However a word of caution! Be careful! There are various laws (Privacy Act) that define what you may or may not do when viewing computer logs and this can include not opening and reading employee E-mail or Internet sites. However by viewing the computer logs you can gain a reasonable understanding from where the traffic is directed. In most cases it is obvious if a breach of your policies and procedures has occurred.

You may find other useful small business guides at Biz Momentum (www.biz-momentum.com). You need to treat this information sensitively and take further advice from your practitioner before taking further action.

Ensure you business is protected.

Philip Lye is Managing Director of Biz Momentum providing professional services in employee relations (HR / IR Matters), training your people to work with you and not against you', 'coaching you' to be a better executive and review of commercial documentation, leases and agreements.

Phil holds qualifications in Accounting, Leadership, Human Resource Management & Industrial Relations and is a qualified accountant.

Phil started his working career as the 'postage clerk' in banking and finance rising through various business opportunities to CEO and CFO of two companies before leaving to start his own business in 2002.

For further information

Web: http://www.biz-momentum.com

best cleaning company Highland Park ..
In The News:

Smart home hacking fears overblown? Expert reveals real cybersecurity risks and simple protection tips to keep your connected devices safe from hackers.
MIT develops needle-free glucose monitor using light technology. Revolutionary device could replace painful finger pricks for diabetes management.
The ClickFix campaign disguises malware as legitimate Windows updates, using steganography to hide shellcode in PNG files and bypass security detection systems.
Researchers from Osaka Metropolitan University designed a 21-foot dome that combines aquaculture and hydroponics to create a self-sustaining urban food system.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.

Starting a Business in New Hampshire

Hew Hampshire car wash market. Well we have visited every... Read More

Success Tips for Small Business Owners

Running a small business requires many skills. However, to do... Read More

Small Business Survival Tips

No matter what kind of small business you have, you... Read More

Why Small Businesses Fail (or Fail to Thrive)

Tammy, a skilled and gifted horticulturist, called me to discuss... Read More

Can Your Business Run Without You?

What would happen if you decided to take an extended... Read More

A Look at Small Business Incorporating in Florida

The choice to incorporate a small business in Florida has... Read More

5 GREAT WAYS to Gain New Contacts

What are the 5 best ways to gain new contacts?There... Read More

Is Your Business Legally Prepared?

It is imperative to have your business legally prepared. How... Read More

Most Franchises Are Small Home Businesses

Many of our nations 400,000 franchisees run their businesses out... Read More

Measuring Your Way to Success

Are you a motivational speaker who consistently gets rave reviews... Read More

Pressure Washing Business and Post Fire Cleanups

Many have not experienced a fire up close. One year... Read More

Yeah, It IS Lonely At the Top

Sometimes when you run a business you feel as lonely... Read More

1 Overlooked Key to Small Business Success

Is this you?You dreamed of owning your own business, doing... Read More

Grab Your Consumers Attention in a Cluttered World of Marketing Communications

A cluttered world of marketing communications diminishes the ordinary. The... Read More

Tips on Setting Up Your Small Business Bank Account

One of the first things you will need to set... Read More

Fleet Washing Expansion Considerations

Many times small businesses want to expand their businesses and... Read More

Do You Need the Help of a Virtual Assistant?

Running a business, whether large, small or in your home,... Read More

Survival Tips For Small Businesses

You may be in Mail Order, Direct Mail, or you... Read More

Bogus Investor and Consumer Complaints and Consumer Misrepresentation

Like most regulatory bodies in the United States, the Federal... Read More

Image of Your Franchise Automotive Outlet is So Important

Image of your franchise automotive outlet is so important. Some... Read More

How to Start a Paper Shredding Business

Paper Shredding Business Opportunities are blossoming up everywhere because in... Read More

How to Give Informative Talks

Why should you do informative talks to smaller groups?Informative talks... Read More

20 Great Ways to Market Your Business Locally

Whether your target audience is in your neighborhood or across... Read More

Franchise Territories for Mobile Businesses; Why Limitations

In franchising an individual desirous of their own business will... Read More

To Buy A Fat Pig

What does buying a fat pig have to do with... Read More

high-end home cleaning Winnetka ..