Employee Email and Internet Use - A Small Business Guide

Introduction

It is widely recognised that Email and the Internet is here to stay! Both mediums have become a vital part of business and personal communication in a world that increasingly relies on technology. We understand its benefits and sometimes berate its downsides; too much email, lack of personal communication, spam, the risk of employees accessing inappropriate material and using employer resources for personal gain.

This gain in technology has not come without cost as increasingly employers and employees are being bought to task over breaches of copyright, confidentiality, privacy, discrimination and harassment and in some instances criminal offences (pornography, obscene and threatening material).

This fact sheet examines ways of measures you can take to greatly reduce and protect your business from legal and other risks.

Recently Monash University reported that email abuse had significantly increased as employees seek to avoid personal confrontation by sending abusive e-mails to those they had targeted or are angry with instead of speaking to them face to face.

This type of behaviour places employers at risk of claims of workplace harassment and discrimination and it is important that you take measures to ensure that this type of activity is clearly communicated as unacceptable to your employees.

By way of example, Biz Momentum undertook a sexual harassment investigation for an employer after an employee complained of sexual harassment by a work colleague. Biz Momentum found that the work colleague had unlawfully accessed 500 different pornographic web-sites over a period of 6 months and at the expense of the employer. The employer took appropriate action.

What should I include in my electronic mail & Internet policy

Biz Momentum recommends that you implement E-mail and Internet policies that includes the following key elements

1. Computer Policies and Procedures

2. E-mail and Internet for Business & Private Use

3. Audit

1. Policies and Procedures

Ensure that you have comprehensive computer policies and procedures relating to defined boundaries that protect you from legal risk for using your E-mail and Internet facilities.

Communicate these policies and procedures to your employees and new starts ? ensure that they sign off on these policies. This cannot be understated in the event of a dispute and is best practice management in protecting your business interests.

2. Email for Business & Private Use

a. Be upfront ? use of E-mail and the Internet is primarily for business use. If you allow reasonable private use, specify when (lunchbreak) and the type of mail employees may compose (electronic banking, child-care arrangements etc)

b. Be specific on what an employee may not access or use E-mail or the Internet for (breach of copyright, spam, masquerading, personal business gain, acts that incite hatred, discrimination to name a few).

3. Audit

Your policies and procedures should inform employees that you conduct regular computer audits in line with the law. This is not an invasive procedure but is designed to protect your business.

No matter what the size of your business, wether you have stand-alone computers or you are networked ensure that your computer logs are audited on a frequent basis.

However a word of caution! Be careful! There are various laws (Privacy Act) that define what you may or may not do when viewing computer logs and this can include not opening and reading employee E-mail or Internet sites. However by viewing the computer logs you can gain a reasonable understanding from where the traffic is directed. In most cases it is obvious if a breach of your policies and procedures has occurred.

You may find other useful small business guides at Biz Momentum (www.biz-momentum.com). You need to treat this information sensitively and take further advice from your practitioner before taking further action.

Ensure you business is protected.

Philip Lye is Managing Director of Biz Momentum providing professional services in employee relations (HR / IR Matters), training your people to work with you and not against you', 'coaching you' to be a better executive and review of commercial documentation, leases and agreements.

Phil holds qualifications in Accounting, Leadership, Human Resource Management & Industrial Relations and is a qualified accountant.

Phil started his working career as the 'postage clerk' in banking and finance rising through various business opportunities to CEO and CFO of two companies before leaving to start his own business in 2002.

For further information

Web: http://www.biz-momentum.com

kitchen deep cleaning Deerfield ..
In The News:

X Square Robot unveils Wall-OSS open-source AI model that helps robots adapt to unpredictable real-world tasks beyond narrow scenarios.
Airport workers report surge in fake lost luggage claims as scammers retrieve discarded baggage tags containing passenger names and travel information.
Unlike robotaxi competitors, Tensor focuses on consumer-owned self-driving cars that adapt to highways and urban roads with full redundancy systems for safety.
Medicare scams cost $54 billion in 2024 as fraudsters target beneficiaries with fake calls demanding payments and personal information to steal benefits.
Scammers create fake Evite invitations that mimic legitimate event emails, requiring users to verify senders and use antivirus software for protection.
The new Apple Watch hypertension feature passively monitors blood pressure patterns over 30 days using sensors to detect chronic high blood pressure signs.
Chrome extension spyware disguised as a free VPN service highlights security risks after it captured private browsing data from trusted sites.
New research shows how fatty acids in cooking oil can safely dissolve and recover silver from circuit boards without harmful chemicals or environmental damage.
The Fox News AI newsletter gives you information on the latest AI technology advancements, and about the challenges and opportunities AI presents now and for the future.
Anthropic investigates alarming AI abuse case where hacker automated entire cybercrime campaign using Claude, stealing sensitive data from defense and healthcare firms.
TikTok, Meta and YouTube restrict Charlie Kirk shooting videos with age gates and warnings while X faces criticism for allowing continued circulation.
Cybercriminals use fake troubleshooting websites to trick Mac users into running terminal commands that install Shamos malware through ClickFix tactics.
San Francisco startup Fable launches Showrunner, an AI platform dubbed the 'Netflix of AI' that generates animated episodes from text descriptions with Amazon support.
Apple raised iPhone prices for some models despite receiving tariff relief from President Donald Trump, with the new lineup starting at $799 for the base model.
A two-story 3D concrete printed home in Western Australia demonstrates faster construction methods that could reshape American housing amid rising costs.
Credit scores remain important during retirement for insurance rates and housing applications, while seniors become prime targets for identity theft and financial scams.
Scammers now send unexpected packages with QR codes that redirect victims to fraudulent websites or download malicious software to steal sensitive information.
Meeting AI tools record private conversations alongside work discussions, creating privacy risks that can be managed with proper settings and awareness.
Hotel privacy concerns are valid but rare, with methods to detect hidden tech using smartphone flashlights, mirror tests and scanning apps.
Improve your Wi-Fi speed and reliability with 10 simple router optimization tips that don't require special apps or expensive subscriptions.
A Columbia University breach exposed names, Social Security numbers and academic records of nearly 869,000 people, with notifications beginning in August.
Rental car drivers use AI-powered apps like Proofr to protect themselves from unfair damage fees as major companies deploy automated inspection tools.
Fox News' AI newsletter brings you the latest on technology advancements around artificial intelligence.
OnTrac data breach between April 13-15, 2025, exposed personal information of over 40,000 people including Social Security numbers and medical records.

How To Accept Credit Cards

If you plan to do business online, then your website... Read More

Marketing Your Small Business - The Top 10 Brilliant Ideas

A Brilliant Marketing Idea... sounds great but what is it?... Read More

Marketing Your Small Business with Success Stories

-- The One Pager Shortcut Series --An effective and compelling... Read More

How to Use Graphs and Charts in Your Business Plan

Many people ask how many graphs or charts they should... Read More

11 Things Small Business Owners Can Learn From The Miracle On Ice

1. Know Where You're Going ? Coach Herb Brooks had... Read More

Public Relations: Antidote for Small Business Failure

When small businesses fail, the wreckage is often assigned to... Read More

Starting a Tractor Washing Business

In the heavy equipment cleaning business you can make good... Read More

The Care and Feeding of Your Small Business

While I was hard at work last week, an everyday... Read More

Bad Regulators Cost Small Businesses

When a regulator finds a target to go after to... Read More

A Business Tail: Veterinarian Foams at Mouth, Chases Tail, Learns New Tricks--Case Study

Many self employed professionals find themselves overwhelmed, frustrated, and confused... Read More

Alliances: Drawing The Line

How far can you go based on your relationship with... Read More

ADH Will Make Your Life More Productive & Your Life More Profitable

What is a Virtual Assistant?? A Virtual Assistant is that... Read More

Tips and Tricks for Legal Debt Collections

If a customer owes your local business money, it's hard... Read More

Accounting and Billing Procedures for Small Business

No matter how small your small business is, it is... Read More

How to Integrate Yourself in Someone Elses Business

When do you need to get more involved with the... Read More

Buying a Franchise

Buying a franchise is not for everyone. This guide will... Read More

Growing Your Small Business Through Alliances and Joint Ventures

-- Beyond Cold Calling, "Warm" Calling and Sending E-mails --Many... Read More

Small Business Marketing - Clarify Success

When you hear the word "success" does it bring on... Read More

Accounting Methods ? Cash and Accrual

When starting a business, you have to determine the method... Read More

Due Dilegence 101 Or What You Do Not Know Can Kill You! - Part 1

Introduction: This article is written as a general discussion on... Read More

What Your Small Business Can Learn From The Doctor

Most doctors never distinguish the difference between customers and patients.... Read More

Your Babys Ugly..and Youve Got Bad Breath

I've got good news and bad news. The good news... Read More

Choose Your Own Guru

What is a guru?A guru is a teacher. A mentor.... Read More

Who Makes the BEST Business Partner

How do you find the best business partners?Finding a good... Read More

Window Cleaning Business Start Up

Should you buy a business opportunity or Franchise if you... Read More

interior house cleaning Highland Park ..