Employee Email and Internet Use - A Small Business Guide

Introduction

It is widely recognised that Email and the Internet is here to stay! Both mediums have become a vital part of business and personal communication in a world that increasingly relies on technology. We understand its benefits and sometimes berate its downsides; too much email, lack of personal communication, spam, the risk of employees accessing inappropriate material and using employer resources for personal gain.

This gain in technology has not come without cost as increasingly employers and employees are being bought to task over breaches of copyright, confidentiality, privacy, discrimination and harassment and in some instances criminal offences (pornography, obscene and threatening material).

This fact sheet examines ways of measures you can take to greatly reduce and protect your business from legal and other risks.

Recently Monash University reported that email abuse had significantly increased as employees seek to avoid personal confrontation by sending abusive e-mails to those they had targeted or are angry with instead of speaking to them face to face.

This type of behaviour places employers at risk of claims of workplace harassment and discrimination and it is important that you take measures to ensure that this type of activity is clearly communicated as unacceptable to your employees.

By way of example, Biz Momentum undertook a sexual harassment investigation for an employer after an employee complained of sexual harassment by a work colleague. Biz Momentum found that the work colleague had unlawfully accessed 500 different pornographic web-sites over a period of 6 months and at the expense of the employer. The employer took appropriate action.

What should I include in my electronic mail & Internet policy

Biz Momentum recommends that you implement E-mail and Internet policies that includes the following key elements

1. Computer Policies and Procedures

2. E-mail and Internet for Business & Private Use

3. Audit

1. Policies and Procedures

Ensure that you have comprehensive computer policies and procedures relating to defined boundaries that protect you from legal risk for using your E-mail and Internet facilities.

Communicate these policies and procedures to your employees and new starts ? ensure that they sign off on these policies. This cannot be understated in the event of a dispute and is best practice management in protecting your business interests.

2. Email for Business & Private Use

a. Be upfront ? use of E-mail and the Internet is primarily for business use. If you allow reasonable private use, specify when (lunchbreak) and the type of mail employees may compose (electronic banking, child-care arrangements etc)

b. Be specific on what an employee may not access or use E-mail or the Internet for (breach of copyright, spam, masquerading, personal business gain, acts that incite hatred, discrimination to name a few).

3. Audit

Your policies and procedures should inform employees that you conduct regular computer audits in line with the law. This is not an invasive procedure but is designed to protect your business.

No matter what the size of your business, wether you have stand-alone computers or you are networked ensure that your computer logs are audited on a frequent basis.

However a word of caution! Be careful! There are various laws (Privacy Act) that define what you may or may not do when viewing computer logs and this can include not opening and reading employee E-mail or Internet sites. However by viewing the computer logs you can gain a reasonable understanding from where the traffic is directed. In most cases it is obvious if a breach of your policies and procedures has occurred.

You may find other useful small business guides at Biz Momentum (www.biz-momentum.com). You need to treat this information sensitively and take further advice from your practitioner before taking further action.

Ensure you business is protected.

Philip Lye is Managing Director of Biz Momentum providing professional services in employee relations (HR / IR Matters), training your people to work with you and not against you', 'coaching you' to be a better executive and review of commercial documentation, leases and agreements.

Phil holds qualifications in Accounting, Leadership, Human Resource Management & Industrial Relations and is a qualified accountant.

Phil started his working career as the 'postage clerk' in banking and finance rising through various business opportunities to CEO and CFO of two companies before leaving to start his own business in 2002.

For further information

Web: http://www.biz-momentum.com

disinfecting cleaning services Arlington Heights ..
In The News:

Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.

How to Give FREE Advice and Make Money

When is advice free and when should you charge for... Read More

Small Business 101: Deadly Ignorance

American small business is again in transition. Many employees, now... Read More

Doing Business With Friends: Five Tips for Preserving the Friendship... and Your Sanity!

My colleague, Jane, recently lamented to me an all too... Read More

How to Prevent Home Business Burnout

As a home business proprietor, you may already realize why... Read More

Forming a Corporation ? Investors

You've come up with the best idea since sliced bread,... Read More

Boston Market; Mobile Auto Detailing

Boston itself covers 50 square miles of concrete and traffic,... Read More

Small Business Marketing - Clarify Success

When you hear the word "success" does it bring on... Read More

How to Prepare for Your Start-Up Venture!

When you awoke this morning, you found yourself buzzing with... Read More

Top 10 Lessons for Small Business Success - As learned From My Twin 3 Year Olds

Small business success is very similar to learning to walk,... Read More

Professional Car Care Businesses You Can Start

If you are in the professional car care business you... Read More

How To Create A Business Note That Is More Attractive To A Note Investor

You are selling your small business (business value under $1... Read More

Why Do Most Online Small Businesses Fail?

Search Engines account for almost 90% of all web traffic!In... Read More

Simple Business Tactics Are Your Key To Success

In a world full of complications sometimes we overlook the... Read More

Small Business Strategies - Four Critical Success Factors

Scenario OneDuring a recent presentation, a business owner was given... Read More

Patient Records - Your Responsibilities

As a practise gets larger & larger the associated problems... Read More

How to Get Started As A Government Contractor

Becoming a contractor or sub-contractor for the U.S. government can... Read More

Keeping a Partnership ALIVE and THRIVING

What are the best methods for keeping a good business... Read More

Small Does Not Mean Invisible!

Running a business on the net these days can be... Read More

Got Stimulation?

An observation while returning home from a seminar: Getting away... Read More

How To Select a Franchise

Here are some useful tips on how to select a... Read More

Comparing Boston Area for a mobile car wash business

The Boston suburbs seem to be rich with possible locations... Read More

Three Ways to Add Leverage to Your Small Business

Remember those drawings from science class of how a lever... Read More

Presentations and Sales Automotive Detailers

Many auto detailers fall short in their sales presentations. I... Read More

Pressure Washing Heavy Equipment

One of the best ways to make money in the... Read More

Small Business Opportunities And The Tens

You may find this Newsletter a little long winded but... Read More

bathroom cleaning service Mundelein ..