Employee Email and Internet Use - A Small Business Guide

Introduction

It is widely recognised that Email and the Internet is here to stay! Both mediums have become a vital part of business and personal communication in a world that increasingly relies on technology. We understand its benefits and sometimes berate its downsides; too much email, lack of personal communication, spam, the risk of employees accessing inappropriate material and using employer resources for personal gain.

This gain in technology has not come without cost as increasingly employers and employees are being bought to task over breaches of copyright, confidentiality, privacy, discrimination and harassment and in some instances criminal offences (pornography, obscene and threatening material).

This fact sheet examines ways of measures you can take to greatly reduce and protect your business from legal and other risks.

Recently Monash University reported that email abuse had significantly increased as employees seek to avoid personal confrontation by sending abusive e-mails to those they had targeted or are angry with instead of speaking to them face to face.

This type of behaviour places employers at risk of claims of workplace harassment and discrimination and it is important that you take measures to ensure that this type of activity is clearly communicated as unacceptable to your employees.

By way of example, Biz Momentum undertook a sexual harassment investigation for an employer after an employee complained of sexual harassment by a work colleague. Biz Momentum found that the work colleague had unlawfully accessed 500 different pornographic web-sites over a period of 6 months and at the expense of the employer. The employer took appropriate action.

What should I include in my electronic mail & Internet policy

Biz Momentum recommends that you implement E-mail and Internet policies that includes the following key elements

1. Computer Policies and Procedures

2. E-mail and Internet for Business & Private Use

3. Audit

1. Policies and Procedures

Ensure that you have comprehensive computer policies and procedures relating to defined boundaries that protect you from legal risk for using your E-mail and Internet facilities.

Communicate these policies and procedures to your employees and new starts ? ensure that they sign off on these policies. This cannot be understated in the event of a dispute and is best practice management in protecting your business interests.

2. Email for Business & Private Use

a. Be upfront ? use of E-mail and the Internet is primarily for business use. If you allow reasonable private use, specify when (lunchbreak) and the type of mail employees may compose (electronic banking, child-care arrangements etc)

b. Be specific on what an employee may not access or use E-mail or the Internet for (breach of copyright, spam, masquerading, personal business gain, acts that incite hatred, discrimination to name a few).

3. Audit

Your policies and procedures should inform employees that you conduct regular computer audits in line with the law. This is not an invasive procedure but is designed to protect your business.

No matter what the size of your business, wether you have stand-alone computers or you are networked ensure that your computer logs are audited on a frequent basis.

However a word of caution! Be careful! There are various laws (Privacy Act) that define what you may or may not do when viewing computer logs and this can include not opening and reading employee E-mail or Internet sites. However by viewing the computer logs you can gain a reasonable understanding from where the traffic is directed. In most cases it is obvious if a breach of your policies and procedures has occurred.

You may find other useful small business guides at Biz Momentum (www.biz-momentum.com). You need to treat this information sensitively and take further advice from your practitioner before taking further action.

Ensure you business is protected.

Philip Lye is Managing Director of Biz Momentum providing professional services in employee relations (HR / IR Matters), training your people to work with you and not against you', 'coaching you' to be a better executive and review of commercial documentation, leases and agreements.

Phil holds qualifications in Accounting, Leadership, Human Resource Management & Industrial Relations and is a qualified accountant.

Phil started his working career as the 'postage clerk' in banking and finance rising through various business opportunities to CEO and CFO of two companies before leaving to start his own business in 2002.

For further information

Web: http://www.biz-momentum.com

no-contract cleaning service Mundelein ..
In The News:

Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.

Old Data in Database Marketing Software

Database Problems in MarketingI have been working on a direct... Read More

Awning Cleaning Business Case Study: Entrepreneurship 101

It is most fascinating to study how entrepreneurs spot opportunity... Read More

Three Big Barriers To Small Business Marketing Success

When you feel like you're always busy working on your... Read More

Start a Technical Writing Service

Technical writing services are employed to explain the details of... Read More

Slip And Fall Professionals; Service Businesses

Since you own a business you probably have liability insurance... Read More

Comparing Boston Area for a mobile car wash business

The Boston suburbs seem to be rich with possible locations... Read More

Small Business Marketing - Clarify Success

When you hear the word "success" does it bring on... Read More

There Is Security in Change... But Use Caution

It has been said that the only constant is change.... Read More

Credit Repair Business Opportunities - Huge Profit Potential!

In the world today, many people are further in debt... Read More

Eight Key Steps to Selling Your Business and Cashing In

This year, some 700,000 American businesses will be sold. Most... Read More

SBIR vs STTR

SBIR vs. STTR: If you are participating in the SBIR... Read More

Combating Over Regulation of Small Business

Many small businesses do quite well due to the blood,... Read More

Small Business Survival Tips

No matter what kind of small business you have, you... Read More

Increase Profits With a Small Investment of Time and No Money

The less a business pays for goods and services the... Read More

Why Small Businesses Fail (or Fail to Thrive)

Tammy, a skilled and gifted horticulturist, called me to discuss... Read More

Do I Have to Do EVERYTHING Myself?!

The air in my client's office nearly crackled with her... Read More

Who Makes the BEST Alliance

What types of companies do you want to align yourself... Read More

The Inside-Out Business Plan? -- Your Small Business Plan in 10 Easy Questions

Writing a business plan for your Solo Entrepreneur business doesn't... Read More

How to Find A Group that Needs Speakers

How do you find groups that are in need of... Read More

Yeah, It IS Lonely At the Top

Sometimes when you run a business you feel as lonely... Read More

Analyzing Customers in Your Business Plan

The Customer Analysis section of the business plan assesses the... Read More

Secrets to Washing Fleets of Trucks from a Nationwide Fleet Washing Service

Washing the exterior of a truck. Sounds easy right? Well,... Read More

Electronic Franchise Disclosure and E-Signature Future for Investors

It has been discussed allowing Franchising companies to electronically disclose... Read More

Starting a Tractor Washing Business

In the heavy equipment cleaning business you can make good... Read More

Top 10 Lessons for Small Business Success - As learned From My Twin 3 Year Olds

Small business success is very similar to learning to walk,... Read More

maid service near Glenview ..