Employee Monitoring - Business Risks For Employers And How To Avoid Them

E-mail and Internet use are integral parts of the typical worker's daily routine. Because of its speed and overall convenience, e-mail has replaced the interoffice memorandum as the preferred method of communication. Employee access to the Internet also is important as a means of conducting job-related research and transactions.

For these reasons, employers often have little choice but to provide their employees with Internet access and e-mail accounts. At the same time, however, employees' use of these capabilities carries downside risks for the employer.

One issue posed by employee e-mail and Internet use is loss of efficiency. Recent studies show that businesses lost an estimated ?5.3 billion to recreational workplace web surfing in 2003.

Another report indicated that employees are costing their companies nearly ?1.5 million a year in lost productivity by spending an average of thirty minutes a day using e-mail for personal, non-work-related reasons.

Another challenge is the risk that employees' computer use will expose the company to legal liability.

For example, according to another survey, almost 72% of the pornographic sites on the Internet are visited during work hours. Openly viewing sexually explicit websites or sending offensive material obtained from the web may create a hostile work environment. Moreover, inappropriate messages sent over the company's e-mail system could expose the company to harassment, defamation, or other claims.

One study found that more than 50% of employees had received pornographic, sexist, or racist e-mails at work.

Still another challenge is the possibility that employees will use the Internet in a way that undermines or violates the employer's rights, interests, and practices. Some employees, for example, may use email to disclose the employer's trade secrets or proprietary information, or to engage in inappropriate contacts with competitors or customers.

So what's the solution for today's employers?

To reduce these risks, employers must monitor their employees' use of e-mail and Internet access in the workplace. Accordingly, employers should be familiar with the law in this area and should implement policies and practices that minimize the risk of lawsuits or enforcement actions.

With such policies in place employers may monitor their e-mail and Internet systems, and employees will conform their actions to the reality that their employer may view their messages.

Policies should be tailored to the workplace environment in which they will exist. For example, in many contexts such as telecommuting the line between business and personal use may be very grey while in other contexts e-mail or Internet access may be provided to an employee only for a clearly defined, limited purpose and thus the lines between acceptable and unacceptable use may be clear.

Employers need to take these various factors into consideration when drawing up their policies. Generally however, an effective policy should inform employees that the employer is the owner of the e-mail or Internet system and that this includes all communications and stored information. It should also include a statement of the purposes for which the system is to be used as well as the discipline that an employee can expect to face for abuse of the system.

There should be a statement advising employees that they should not expect privacy in communications made over the system and that those communications will be monitored to ensure that the employer's property is being used only for authorized purposes.

An employer may also want to include a non-exclusive list of examples of the kind of use that the employer considers unauthorized personal use, or inappropriate use.

Conclusion:

Electronic communication is becoming more and more vital to the modern workplace. The increase in the number of employees equipped with e-mail and/or Internet access raises risks for employers.

The most effective way to manage those risks is by monitoring the use employees make of the electronic communication tools provided to them, by using an Internet monitoring and surveillance software program. But also to deal with the inherent tension between monitoring and employee privacy is to put in place an explicit e-mail and Internet use policy, which informs employees that their communication will be monitored.

Profile: SavvyApps is a privately owned software company which specialises in leading PC/Internet Monitoring & Surveillance Software Solutions for businesses who want to monitor their employees Internet usage.

If you would like to learn more about how PC/Internet Monitoring Software can help your business or would like some more ideas please use the link below:

pc/internet monitoring & surveillance software

limo service at o'hare Carpentersville .. Lockport Chicago limo O’Hare
In The News:

Tech expert Kurt “CyberGuy" Knutsson says a tech support scam used a fake Windows Defender pop-up, tricking the victim to call and download software.
Tech expert Kurt “CyberGuy" Knutsson reveals ways to restore accidentally deleted text messages on your Android phone.
A new study says outdoor security camera apps are among the biggest collectors of user data, including phone numbers, payment details and precise location.
In iOS 18.2 and later, Apple's Mail app enhances email management by automatically sorting messages into distinct categories to help find emails faster.
A virtual private network (VPN) allows computer and smartphone users to mask an IP and create a secure, encrypted connection between a device and the internet.
Android 15's latest feature, Private Space, is like a private vault helping to keep your personal or sensitive apps away from prying eyes.
Cybercriminals have more ways than ever to target teenagers; here are some of the most widespread scams and tricks to watch in order to keep your loved ones safe.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
A humanoid robot named CUE6 has got game. The basketball-playing robot, produced by Toyota, claimed a Guinness World Record for longest shot.
With electronic signatures becoming more common, Kurt the CyberGuy explains how to produce your digital John Hancock for online documents.
Kurt the CyberGuy walks through steps he recommends immediately taking after getting new electronics — like phones or TVs — as gifts this holiday season.
When speaking becomes physically challenging, you can preserve your unique voice using Apple's Personal Voice and Live Speech technology.
Google Maps is deleting location history soon. Tech expert Kurt “CyberGuy" Knutsson shows you how to back it up before it's gone.
iOS 18.2 lets AirTag owners securely share item locations with trusted individuals. Tech expert Kurt “CyberGuy" Knutsson examines the powerful new feature.
The FBI is warning timeshare owners of a telemarketing scam tied to a Mexican drug cartel. Tech expert Kurt “CyberGuy" Knutsson provides steps to stay safe.
Protecting your home network includes securing your router, just like your phone or laptop. Kurt “CyberGuy" Knutsson reveals six ways to protect your Wi-Fi router from hackers.
Kurt “CyberGuy" Knutsson: ConnectOnCall breach leaks sensitive data of 910,000+ patients.
Rising elder scams: How to recognize them and protect yourself and your loved ones. Tech expert Kurt “CyberGuy" Knutsson helps you outsmart the scammers.
There are common habits and oversights that could leave your financial information vulnerable to cybercriminals, according to Kurt the CyberGuy.
Counting calories just got easier with The Drop, the world's first automated nutrition tracker using advanced computer vision and artificial intelligence.
A virtual private network can help ensure your information remains security and your privacy remains intact. Kurt the CyberGuy explains.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Artificial intelligence-based cameras are giving air defense operators unprecedented capabilities in monitoring and protecting airspace.
Apple's iOS 18.1 Inactivity Reboot automatically reboots your iPhone if it hasn't been used or unlocked for more than three days, providing better data protection.
An inventor designed rooftop solar panels for a Tesla that draws solar energy while the car is parked, adding travel mileage without plugging in.

Competition in the Market Place and Over Disclosure Regulatory Burden

The Federal Trade Commission is assisting competitor to cheat and... Read More

How to Integrate Yourself in Someone Elses Business

When do you need to get more involved with the... Read More

How To Write A Business Plan

Writing a business plan is a fundamental step to ensuring... Read More

Getting Grant Funding For Your Nonprofit Organization

Do you need grant funding for your nonprofit organization? If... Read More

Blowing Your Own Horn ? A Key Marketing Strategy for Small Business

-- Building Credibility Through Success Stories --Successful solo entrepreneurs spend... Read More

Not Listening Can Hurt Your Small Business

Most small business owners seek advisors who can help them... Read More

A Day in the Life of a Self Employed Professional

It's Monday morning and Connie the Consultant sits in her... Read More

Small Business and Wichita

Owning a small business in Wichita, KS might not be... Read More

Building Marketing Momentum For Your Small Business

The success of your business depends on your ability to... Read More

To Buy Or Not To Buy: Lawn Mowing Business

TRUTH IN THE LAWN MOWING INDUSTRYWe do not wish to... Read More

Cleaning Service Stations with a Pressure Washer

Fuel prices these days are quite high and they take... Read More

7 Habits of Highly Successful Small Business Owners

Do you spend every waking minute in your business? Do... Read More

Will Adding a Car Wash to Your Fast Lube Add Additional Crime to Your Facilities?

Car Wash Crime in the Hood. Apparently not everyone is... Read More

Do You Want Your Own Fully Programmable ERP? - Part 2

In the first article we mentioned the main characteristics that... Read More

Most Franchises Are Small Home Businesses

Many of our nations 400,000 franchisees run their businesses out... Read More

Expanding Franchisee Advice

Franchisor expansion policies are not as simple as one might... Read More

Window Cleaning Business Case Study

How do window cleaning franchise businesses start? It is a... Read More

Why the Over Regulation on the Franchising Model?

Franchising is the fastest way to build small businesses, provide... Read More

The Game Plan ? The Difference Between Small Business Success And Failure

It is an American dream to own a business. But... Read More

Job Costing - Do You Know How?

What's your job profitability? I meet with business owners every... Read More

The Virtual Assistant

As a small business owner, outsourcing work to Virtual Assistants... Read More

Do Your Best; Hire the Rest

One of the hidden perks of raising six children is... Read More

The Power of Why: Your Psychological Ally To Marketing Success!

Here's why 'WHY' is such a profit-making marketing trigger."Stop taking... Read More

The Perfect Mission Statement

One way to determine your companies mission statement is based... Read More

A Portable Trade Show Exhibit Makes for an Easier Show

You can make your trade show experience much easier by... Read More

Fox River Grove limo rentals ..