Employee Email and Internet Use - A Small Business Guide

Introduction

It is widely recognised that Email and the Internet is here to stay! Both mediums have become a vital part of business and personal communication in a world that increasingly relies on technology. We understand its benefits and sometimes berate its downsides; too much email, lack of personal communication, spam, the risk of employees accessing inappropriate material and using employer resources for personal gain.

This gain in technology has not come without cost as increasingly employers and employees are being bought to task over breaches of copyright, confidentiality, privacy, discrimination and harassment and in some instances criminal offences (pornography, obscene and threatening material).

This fact sheet examines ways of measures you can take to greatly reduce and protect your business from legal and other risks.

Recently Monash University reported that email abuse had significantly increased as employees seek to avoid personal confrontation by sending abusive e-mails to those they had targeted or are angry with instead of speaking to them face to face.

This type of behaviour places employers at risk of claims of workplace harassment and discrimination and it is important that you take measures to ensure that this type of activity is clearly communicated as unacceptable to your employees.

By way of example, Biz Momentum undertook a sexual harassment investigation for an employer after an employee complained of sexual harassment by a work colleague. Biz Momentum found that the work colleague had unlawfully accessed 500 different pornographic web-sites over a period of 6 months and at the expense of the employer. The employer took appropriate action.

What should I include in my electronic mail & Internet policy

Biz Momentum recommends that you implement E-mail and Internet policies that includes the following key elements

1. Computer Policies and Procedures

2. E-mail and Internet for Business & Private Use

3. Audit

1. Policies and Procedures

Ensure that you have comprehensive computer policies and procedures relating to defined boundaries that protect you from legal risk for using your E-mail and Internet facilities.

Communicate these policies and procedures to your employees and new starts ? ensure that they sign off on these policies. This cannot be understated in the event of a dispute and is best practice management in protecting your business interests.

2. Email for Business & Private Use

a. Be upfront ? use of E-mail and the Internet is primarily for business use. If you allow reasonable private use, specify when (lunchbreak) and the type of mail employees may compose (electronic banking, child-care arrangements etc)

b. Be specific on what an employee may not access or use E-mail or the Internet for (breach of copyright, spam, masquerading, personal business gain, acts that incite hatred, discrimination to name a few).

3. Audit

Your policies and procedures should inform employees that you conduct regular computer audits in line with the law. This is not an invasive procedure but is designed to protect your business.

No matter what the size of your business, wether you have stand-alone computers or you are networked ensure that your computer logs are audited on a frequent basis.

However a word of caution! Be careful! There are various laws (Privacy Act) that define what you may or may not do when viewing computer logs and this can include not opening and reading employee E-mail or Internet sites. However by viewing the computer logs you can gain a reasonable understanding from where the traffic is directed. In most cases it is obvious if a breach of your policies and procedures has occurred.

You may find other useful small business guides at Biz Momentum (www.biz-momentum.com). You need to treat this information sensitively and take further advice from your practitioner before taking further action.

Ensure you business is protected.

Philip Lye is Managing Director of Biz Momentum providing professional services in employee relations (HR / IR Matters), training your people to work with you and not against you', 'coaching you' to be a better executive and review of commercial documentation, leases and agreements.

Phil holds qualifications in Accounting, Leadership, Human Resource Management & Industrial Relations and is a qualified accountant.

Phil started his working career as the 'postage clerk' in banking and finance rising through various business opportunities to CEO and CFO of two companies before leaving to start his own business in 2002.

For further information

Web: http://www.biz-momentum.com

tidy up service Glenview ..
In The News:

The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
New Android malware BankBot YNRK silences phones, steals banking data and drains crypto wallets automatically. Learn how this advanced threat works.
FDA approves first human trial for Paradromics' brain-computer interface that could restore speech for paralyzed patients through neural technology.
New phishing platform QRR targets Microsoft 365 users across 1,000 domains in 90 countries. Learn how to spot fake login pages and protect your accounts.
OpenTable now uses AI to track your dining habits and share insights with restaurants. Learn what data they collect and how to protect your privacy.
Google's discontinued Nest thermostats still secretly upload home data to company servers despite losing smart features, raising serious privacy concerns.
New Android malware NGate steals NFC payment codes in real-time, allowing criminals to withdraw cash from ATMs without your card. Learn protection tips.
DoorDash confirms data breach exposing customer names, emails, addresses after social engineering attack. Learn how to protect yourself from scams.
Concerned about Google's AI scanning your Gmail? Learn how to disable Gemini features that access your emails, Drive files and Chat messages for privacy.
Google warns Android users about dangerous fake VPN apps hiding malware that steals passwords, banking details and personal data from phones and tablets.
Apple's digital passport feature lets iPhone users breeze through TSA checkpoints this holiday season using Digital ID technology at 250+ airports.
A new phishing scam targets family photos with fake "Cloud Storage Full" alerts. Criminals steal credit card information through fake sites. Learn protection tips.
South Korean scientists create ultra-thin fabric muscles that turn clothes into robotic assistants, lifting 33 pounds while weighing under half an ounce.
Archer Aviation has acquired Hawthorne Airport for $126M to launch an LA air taxi network ahead of the 2028 Olympics, featuring AI-powered eVTOL operations and next-gen aviation tech.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Fake AI apps disguised as "ChatGPT" and "DALLĀ·E" are flooding app stores with dangerous malware that steals data and monitors users without detection.
Fake buyers demand specific vehicle reports from unknown sites to steal credit card information from car sellers, but warning signs can help identify these scams before paying.
Android users can now manage apps across multiple devices more easily with Google Play Store's updated remote uninstall button in the latest update.
NASA's Perseverance rover discovers shiny metallic rock on Mars that could be a meteorite from an ancient asteroid, containing high levels of iron and nickel.
Holiday scams spike during Black Friday and Cyber Monday as criminals exploit your leaked personal data. Learn how to protect yourself from fake stores and phishing.
Commerce Department proposes TP-Link router ban over Chinese security risks. Learn how this potential prohibition could affect your home network and devices.
Hyundai AutoEver America suffered a data breach affecting 2,000 current and former employees, exposing names, Social Security numbers and driver's license information.
Washington court rules automated license plate reader images are public records, even when stored by vendors like Flock Safety, setting precedent for transparency.
Fake airline texts claiming flight cancellations are targeting travelers with convincing scams. Learn how cybercriminals steal personal data and credit card info.

Do You Want Your Own Fully Programmable ERP? - Part 3

Continuing from the second article:6. About the aground mathematical model,... Read More

How To Write A Business Plan

Writing a business plan is a fundamental step to ensuring... Read More

Business Failure, The 8 Traps Causing Failure And The One Attribute Which Ensures Business Survival

It is estimated that 78% of all small business start-ups... Read More

Combating Over Regulation of Small Business

Many small businesses do quite well due to the blood,... Read More

Venus Transit - and Small Business?

On June 8, 2004, the world witnessed what no one... Read More

Employee Monitoring - Business Risks For Employers And How To Avoid Them

E-mail and Internet use are integral parts of the typical... Read More

Restaurant Operators - What Skills do you Need

A tongue-in-cheek look at the skills required to operate a... Read More

Professional House Cleaning - The Dirty Little Secret

Are you tired yet of all the books out there... Read More

Too Many Lawyers in Franchising Today

Attorneys and Lawyers are ruining the franchise industry. It is... Read More

Earn More Money in Your Small Business by Creating a PIG

If you really want to earn more money with your... Read More

How to let go of your EGO

When does your ego get in the way?Let's go back... Read More

Accepting Checks in Your Business Virtually Risk Free

Most businesses accept checks as form of payment for goods... Read More

Become The Squeaky Wheel and Watch Your Business Skyrocket!

Providing high quality customer service is a must for any... Read More

Incorporating a Small Business: S corporations versus C corporations

If you've been considering incorporating your small business, you've probably... Read More

Self-Employment: Managing Your Money: Tips for Living with a Fluctuating Cash Flow (Part One)

The way you manage your money is one of the... Read More

Will Adding a Car Wash to Your Fast Lube Add Additional Crime to Your Facilities?

Car Wash Crime in the Hood. Apparently not everyone is... Read More

Is It Recess Yet?! Confessions of a Self Employed Workaholic

I have a confession to make. My name is Caroline... Read More

Using Technology to Manage Customer Loyalty

Don't let your customer satisfaction research initiative collect dust on... Read More

Employee Induction - Are you Inducting your People - A Practical How To

In today's fast paced marketplace it is easy to neglect... Read More

S Corporation ? What Is It?

For many small businesses, the "S" corporation is the business... Read More

Consistency Builds Trust

You know your prospects need what you sell. You know... Read More

Recognizing Employees? Contributions Can Go a Long Way

Every employee would like to earn as high a salary... Read More

Truck Detailing Shop Business Case Study

As an entrepreneur you can learn a lot by following... Read More

There Are No Dumb Business Questions, Not!

Q: I'm curious. What is the dumbest business question you've... Read More

Competition in the Mobile Car Wash Industry

We have all seen the mobile washing units cruising our... Read More

full-service cleaning Mundelein ..