Employee Email and Internet Use - A Small Business Guide

Introduction

It is widely recognised that Email and the Internet is here to stay! Both mediums have become a vital part of business and personal communication in a world that increasingly relies on technology. We understand its benefits and sometimes berate its downsides; too much email, lack of personal communication, spam, the risk of employees accessing inappropriate material and using employer resources for personal gain.

This gain in technology has not come without cost as increasingly employers and employees are being bought to task over breaches of copyright, confidentiality, privacy, discrimination and harassment and in some instances criminal offences (pornography, obscene and threatening material).

This fact sheet examines ways of measures you can take to greatly reduce and protect your business from legal and other risks.

Recently Monash University reported that email abuse had significantly increased as employees seek to avoid personal confrontation by sending abusive e-mails to those they had targeted or are angry with instead of speaking to them face to face.

This type of behaviour places employers at risk of claims of workplace harassment and discrimination and it is important that you take measures to ensure that this type of activity is clearly communicated as unacceptable to your employees.

By way of example, Biz Momentum undertook a sexual harassment investigation for an employer after an employee complained of sexual harassment by a work colleague. Biz Momentum found that the work colleague had unlawfully accessed 500 different pornographic web-sites over a period of 6 months and at the expense of the employer. The employer took appropriate action.

What should I include in my electronic mail & Internet policy

Biz Momentum recommends that you implement E-mail and Internet policies that includes the following key elements

1. Computer Policies and Procedures

2. E-mail and Internet for Business & Private Use

3. Audit

1. Policies and Procedures

Ensure that you have comprehensive computer policies and procedures relating to defined boundaries that protect you from legal risk for using your E-mail and Internet facilities.

Communicate these policies and procedures to your employees and new starts ? ensure that they sign off on these policies. This cannot be understated in the event of a dispute and is best practice management in protecting your business interests.

2. Email for Business & Private Use

a. Be upfront ? use of E-mail and the Internet is primarily for business use. If you allow reasonable private use, specify when (lunchbreak) and the type of mail employees may compose (electronic banking, child-care arrangements etc)

b. Be specific on what an employee may not access or use E-mail or the Internet for (breach of copyright, spam, masquerading, personal business gain, acts that incite hatred, discrimination to name a few).

3. Audit

Your policies and procedures should inform employees that you conduct regular computer audits in line with the law. This is not an invasive procedure but is designed to protect your business.

No matter what the size of your business, wether you have stand-alone computers or you are networked ensure that your computer logs are audited on a frequent basis.

However a word of caution! Be careful! There are various laws (Privacy Act) that define what you may or may not do when viewing computer logs and this can include not opening and reading employee E-mail or Internet sites. However by viewing the computer logs you can gain a reasonable understanding from where the traffic is directed. In most cases it is obvious if a breach of your policies and procedures has occurred.

You may find other useful small business guides at Biz Momentum (www.biz-momentum.com). You need to treat this information sensitively and take further advice from your practitioner before taking further action.

Ensure you business is protected.

Philip Lye is Managing Director of Biz Momentum providing professional services in employee relations (HR / IR Matters), training your people to work with you and not against you', 'coaching you' to be a better executive and review of commercial documentation, leases and agreements.

Phil holds qualifications in Accounting, Leadership, Human Resource Management & Industrial Relations and is a qualified accountant.

Phil started his working career as the 'postage clerk' in banking and finance rising through various business opportunities to CEO and CFO of two companies before leaving to start his own business in 2002.

For further information

Web: http://www.biz-momentum.com

disinfecting cleaning services Winnetka ..
In The News:

Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.

Fleet Washing Expansion Considerations

Many times small businesses want to expand their businesses and... Read More

Small Business - Is The Accounting Profession Ripping Them Off?

My 16 year-old daughter said, "Gee Dad! You look just... Read More

The Perilous Franchise Agreement: What Did You Sign?

Purchasing a franchise has become one of the most popular... Read More

Conquering Confidence Killers for Small Business Success

"The way to develop self-confidence is to do the thing... Read More

Proper Care and Feeding of the Business Owner

That sizzling sound you're hearing may be a symptom of... Read More

Shopping For a Franchise

Shopping for a franchise is easy if you know what... Read More

Franchise Buyers Lying On Forms

The Federal Trade Commission which governs the franchise industry thru... Read More

Modern Clear Coats, Auto Detailers and visit to Lexus of North America

We visited Lexus USA, home of the Lexus North America... Read More

Consistency Builds Trust

You know your prospects need what you sell. You know... Read More

How to Curb Antique Shop Theft Inexpensively

If you have ever had your antique shop or mall... Read More

Profits are within 6 Degrees of Freedom

How far away is the person you need to meet?We... Read More

Old Data in Database Marketing Software

Database Problems in MarketingI have been working on a direct... Read More

How To Plant Seeds of Success With Small Business Ideas

Think of all of your business ideas as tiny seeds... Read More

Hard Money Lenders -- No Money Down The Easy Way

Would it help you as a real estate investor to... Read More

5 Good Reasons a Self-Employed Professional Should Take Vacation

So you think you're not justified in taking time away... Read More

Getting Behind in Your Work? You Need a Virtual Assistant!

If you don't know what a Virtual Assistant (or VA)... Read More

From Birth to Death

Your product is dying. With the same inevitability that we... Read More

How to Get Started As A Government Contractor

Becoming a contractor or sub-contractor for the U.S. government can... Read More

Franchising Companies Relationship Strategies

Franchising Corporations need to maintain an iron fist when it... Read More

Small Business Pricing Strategies

TACTIC #1 -- Never simply slash your prices, unless you're... Read More

The SBAs Savviest Program

Forget everything you've ever heard about the U.S. Small Business... Read More

Debit and ATM Card Advice for Small Businesses

Your business account comes with an ATM, Debit card. Pick... Read More

7 Cash Flow Secrets Your Accountant Never Told You

Looking for ways to boost your cash flow? As a... Read More

But Weve Always Done It This Way

Sacred cows take a long time to die. We get... Read More

Wichita Kansas is a Great Place to Run a Business

We love Wichita because it has great all round weather... Read More

last minute cleaning help Highland Park ..