Employee Monitoring - Business Risks For Employers And How To Avoid Them

E-mail and Internet use are integral parts of the typical worker's daily routine. Because of its speed and overall convenience, e-mail has replaced the interoffice memorandum as the preferred method of communication. Employee access to the Internet also is important as a means of conducting job-related research and transactions.

For these reasons, employers often have little choice but to provide their employees with Internet access and e-mail accounts. At the same time, however, employees' use of these capabilities carries downside risks for the employer.

One issue posed by employee e-mail and Internet use is loss of efficiency. Recent studies show that businesses lost an estimated ?5.3 billion to recreational workplace web surfing in 2003.

Another report indicated that employees are costing their companies nearly ?1.5 million a year in lost productivity by spending an average of thirty minutes a day using e-mail for personal, non-work-related reasons.

Another challenge is the risk that employees' computer use will expose the company to legal liability.

For example, according to another survey, almost 72% of the pornographic sites on the Internet are visited during work hours. Openly viewing sexually explicit websites or sending offensive material obtained from the web may create a hostile work environment. Moreover, inappropriate messages sent over the company's e-mail system could expose the company to harassment, defamation, or other claims.

One study found that more than 50% of employees had received pornographic, sexist, or racist e-mails at work.

Still another challenge is the possibility that employees will use the Internet in a way that undermines or violates the employer's rights, interests, and practices. Some employees, for example, may use email to disclose the employer's trade secrets or proprietary information, or to engage in inappropriate contacts with competitors or customers.

So what's the solution for today's employers?

To reduce these risks, employers must monitor their employees' use of e-mail and Internet access in the workplace. Accordingly, employers should be familiar with the law in this area and should implement policies and practices that minimize the risk of lawsuits or enforcement actions.

With such policies in place employers may monitor their e-mail and Internet systems, and employees will conform their actions to the reality that their employer may view their messages.

Policies should be tailored to the workplace environment in which they will exist. For example, in many contexts such as telecommuting the line between business and personal use may be very grey while in other contexts e-mail or Internet access may be provided to an employee only for a clearly defined, limited purpose and thus the lines between acceptable and unacceptable use may be clear.

Employers need to take these various factors into consideration when drawing up their policies. Generally however, an effective policy should inform employees that the employer is the owner of the e-mail or Internet system and that this includes all communications and stored information. It should also include a statement of the purposes for which the system is to be used as well as the discipline that an employee can expect to face for abuse of the system.

There should be a statement advising employees that they should not expect privacy in communications made over the system and that those communications will be monitored to ensure that the employer's property is being used only for authorized purposes.

An employer may also want to include a non-exclusive list of examples of the kind of use that the employer considers unauthorized personal use, or inappropriate use.

Conclusion:

Electronic communication is becoming more and more vital to the modern workplace. The increase in the number of employees equipped with e-mail and/or Internet access raises risks for employers.

The most effective way to manage those risks is by monitoring the use employees make of the electronic communication tools provided to them, by using an Internet monitoring and surveillance software program. But also to deal with the inherent tension between monitoring and employee privacy is to put in place an explicit e-mail and Internet use policy, which informs employees that their communication will be monitored.

Profile: SavvyApps is a privately owned software company which specialises in leading PC/Internet Monitoring & Surveillance Software Solutions for businesses who want to monitor their employees Internet usage.

If you would like to learn more about how PC/Internet Monitoring Software can help your business or would like some more ideas please use the link below:

pc/internet monitoring & surveillance software

shuttle to Midway Beardstown .. Lockport Chicago limo O’Hare
In The News:

Google’s scam detection features, powered by artificial intelligence, are a significant step forward in safeguarding Android users from fraud.
The FBI has issued a warning that scammers are impersonating doctors, police and banks using spoofed numbers as "smishing" texts surge nationwide.
Communities with unreliable internet service stand to gain after Amazon's Project Kuiper launched its first full batch of satellites into orbit April 28.
Tech expert Kurt “CyberGuy" Knutsson says unsubscribing from spam might actually backfire. Learn when to avoid it and stop junk effectively.
Tech expert Kurt “CyberGuy" Knutsson talks about how the first nonstop beating heart transplant, called zero ischemic time, at Taiwan hospital changes surgery.
Kurt “CyberGuy" Knutsson: FBI warns of "time-traveling" hackers.
Kurt “CyberGuy" Knutsson talks about a soft, vine-like robot called SPROUT that aids safe survivor rescues in collapsed buildings.
Health insurance giant Blue Shield of California confirmed it had been sharing private health data of 4.7 million users with Google for three years without even realizing it.
Delta and JetZero’s blended wing body aircraft marks a meaningful step toward a cleaner, quieter and more efficient future for air travel.
Recent reports show many common passwords can be cracked in literally seconds. Kurt the CyberGuy explains how to strengthen your passwords.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Iron, a robot that stands 5 feet, 8 inches tall and weighs 154 pounds, combines advanced artificial intelligence with human-like movement and exceptional vision.
Hertz, the rental car giant, recently confirmed that customer information was exposed through a cyberattack on one of its software vendors.
There are a number of features with AirPods you may or may not know about to take your listening experience to the next level. Kurt the CyberGuy explains.
These 35 Chrome extensions have privacy and security concerns. Tech expert Kurt “CyberGuy" Knutsson says to delete them now.
Tech expert Kurt “CyberGuy" Knutsson says 329,000 mph fusion rocket promises to be fast, disruptive and enable deep-space missions.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Tech expert Kurt “CyberGuy" Knutsson says a new autonomous AI is a game changer that also raises privacy risks. Is your data safe?
Tech expert Kurt “CyberGuy" Knutsson says robots and drones are revolutionizing fruit farming with faster picking and smarter handling.
Landmark Admin revises May 2024 cyberattack scope to show twice as many people were affected. Kurt “CyberGuy" Knutsson gives tips to help stay safe from an insurance data breach.
Tech expert Kurt “CyberGuy" Knutsson talks about how Yamaha’s hydrogen outboard motor could revolutionize boating with zero emissions.
Tech expert Kurt “CyberGuy" Knutsson reveals how to memorialize or remove a deceased loved one’s Facebook account and protect their digital legacy from misuse or scams.
Tech expert Kurt “CyberGuy" Knutsson says an Apple Watch saved psychiatrist Amanda Faulkner by detecting deadly leukemia early.
Scammers and fraudsters are increasingly targeting the most vulnerable, especially nursing homes and the personal data of their residents. Kurt the CyberGuy has safety tips.
Infected USB flash drives can spread malware among multiple organizations in ways that can easily bypass traditional security systems.

How to Manage Your Pipeline

How is your pipeline structured?I assume most of you have... Read More

Your Babys Ugly..and Youve Got Bad Breath

I've got good news and bad news. The good news... Read More

Starting a Virtual Assistant Business

If you're organized, smart, capable and willing to work with... Read More

Small Business Survival Tips

No matter what kind of small business you have, you... Read More

Boston Suburban areas a good choice to run a business

BioTechs even with the latest news had shed over 1000... Read More

Self-Employment: Managing Your Money: Tips for Living with a Fluctuating Cash Flow (Part One)

The way you manage your money is one of the... Read More

Truck Wash Business Case Study

Often smart entrepreneurs look for out of the way businesses,... Read More

How to become a Career Coach for Profit

A career coach could be simply defined your job seeking... Read More

Accepting Checks in Your Business Virtually Risk Free

Most businesses accept checks as form of payment for goods... Read More

Never Burn a Bridge

Why should you always maintain a good report with a... Read More

How to Handle Rejection When You Start an Office Cleaning Business

"If at first you don't succeed, then skydiving definitely isn't... Read More

Pressure Washing Heavy Equipment

One of the best ways to make money in the... Read More

7 Card Tricks That Improve Your Personal Networking Power

CARD SHARK7 Card Tricks That Improve Your Personal Networking PowerThe... Read More

Conquering Confidence Killers for Small Business Success

"The way to develop self-confidence is to do the thing... Read More

The Hidden Treasure in Your Business

I started working with another new client last week. He... Read More

How the Humble Ice Cube Made Business History

Gather round while I tell you the story of Kennebec... Read More

Setting Up as an Electronic Repair Authorized Service Center

If you plan to upgrade your workshop into an Authorized... Read More

Get Free Payroll Forms Download from the Internet

Having a successful business means also having a good working... Read More

Franchise Rule to be Revised; Why?

The FTC, Federal Trade Commission, is considering modifying the franchise... Read More

Franchise Companies Come and Go

Each day we hear of companies entering the franchising industry.... Read More

Dont Let Your Small Business Fall in the FDCPA Trap

When someone owes your small business money, you certainly feel... Read More

Uncover Free Veins Of Gold By Prospecting Online Guru Newsletters (Part 1 of 2)

Incredible as it sounds, you have a goldmine of free... Read More

Outsourcing ? A Positive Approach For Small Businesses

Outsourcing is the strategic use of outside resources to perform... Read More

Find Your Niche & Follow It - Part 1

In this series of articles I'm going to show you... Read More

Franchising and Royalty Payments

If you are thinking of turning your current into a... Read More

Green Bay Hummer H2 SUV rentals ..