The best way that an employee should be monitored by their employer is to have a software program that oversees the computer use of all of the employees that is set by a companywide set of standards. These standards should have no access parameters such as sex sites, or unethical locations such as a web site that promoted Arian Nation or White Supremacy. Additionally, it is realistic to have a company investigate any irregularities that occur on their own company equipment and network. Furthermore new employees are regularly acquainted with the companies own computer network policies and rules. To that end, employees are commonly required to sign a training roster that outlines these specific computer regulations and it is normally placed in their employee file.
There are many types of monitoring devices in the workplace such as cameras, company phones, and radio transistors. Additionally, the increase of cell phone use in the work place provide a communication tool that can be utilized as computer and every transmission can be scrutinized. In the text, the author provides additional insight into corporate monitoring and why it is done. Based on the author’s explanation “It is now relatively easy for employers to monitor every keystroke entered by an employee, the contents of an employee’s computer screen at any point and time, stored e-mails, Internet sites visited and the employee whereabouts”(Walsh, 2013, p.598). With monitoring tools that can virtually capture not only
once again brought to light the various concerns and complaints that this contentious area inevitably generates. The idea of monitoring employees’ conversations has a certain Orwellian darkness that encourages accusations of privacy invasion and corporate spying. Indeed, some companies have taken this too far – some reportedly even requesting their employee’s Facebook login details. However, by and large the concept of employee monitoring – when done appropriately – seems to me to be relatively
Did you know that 58% of employers have fired workers for Internet and email misuse? And 48% justify employee video monitoring as an effort to “counter theft and violence?” According to the “2007 Electronic Monitoring & Surveillance Survey” of which 304 U.S. companies participated in, computer-monitoring results have led to the highest cause of employee termination. These companies used several tactics to eavesdrop on employees while claiming to be managing productivity or for security purposes. Some argue that surveillance is absolutely necessary to help protect and grow a business; others argue that employee and customer rights come first. However, companies that use such tactics often violate the privacy of individuals, exploit their private information and even punish those that do not conform to their standards.
When that technology is used to view, collect or disseminate inappropriate content, again employers have cause for concern. Use of workplace computers to access and distribute pornography, for example, frequently results in discipline and workplace harassment complaints. In some cases it can even result in serious criminal investigations.
* In today’s world of fast-developing technology, in which the click of mouse can dispense a plethora of information, privacy for job seekers and employees is a significant issue. One type of privacy issue in the workplace occurs when a company gathers or circulates private or personal information about employees or candidates for employment.
This section of the employee handbook is provided as a guideline for employees to understand the company policy and procedures regarding privacy in the workplace. While this section cannot address every possible scenario that may occur, the general policy will serve as a basis of understanding the key workplace issues and employee privacy. This section addresses privacy issues related to personal background information, off-work activities, and the corporate policy on the use of electronic monitoring. These privacy policies are designed to both provide a clear guideline for employees on the difference between job related and personal privacy. The policies are designed to create a standard set of
The most common form of an invasion, to employee privacy rights is email. With the massive use of computers, email has become the biggest communication tool of choice in the workplace. The concern of employers has grown tremendously with the use of email in the workplace. Employers' concern is that, employees can waste time by sending and receiving email for personal use, and they may provide easy access for hackers to entry their computer system. Employers can monitor an employee computer activity to ensure productivity in the workplace. Privacy Rights Clearinghouse (2006) states, "Unfortunately, if an employee uses a company computer for email use, the employee employer has the right to review the contents of his or her email."
Privacy Rights Clearinghouse went over computer and workstation monitoring, email monitoring, telephone monitoring, mobile device monitoring, audio and video monitoring, GPS tracking, postal mail and social media monitoring. Employers are able to see what is on your screen, how much time you spend away from your computer and how many keystrokes per hour each employer does. Employers are able to discretely monitor employees with certain computer equipment. Employees may not know they are being monitored. Employers can review email content. Even though the message may have an option for marking an email as private, the company may still have access to the email. You should assume that your work emails are not private. Even though you may delete your emails, the company still has access to them also.
The inappropriate disclosure or misuse of sensitive information by an employee may result in financial considerations and legal consequences for an organization. “Mobile devices provide all kinds of new scenarios for business data to go missing, be shared with others, or be stolen. You need to go into BYOD thinking this way, not just for everyday activity, but also when employees move on from your organization” (Arnold, n.d.).
E-mail has rapidly become a staple of the modern office. Currently, two-thirds of employees in medium and large companies in the United States now have Internet access, compared with fifteen percent only two years ago. The availability of e-mail allows for messages to be widely and rapidly distributed, improving efficiency and reducing cost. In addition to being one of the components of the new workplace, e-mail is also the center of a hot privacy debate. Part of this is because, unlike regular mail, which is difficult to monitor, e-mail can be scanned with ease, allowing employers to engage in monitoring at an unprecedented rate, and raising the specter of a workplace free of privacy. As this relatively new technology gains ever increasing prevalence, certain questions
Many companies in United States and around the world have started to worry about the iPhone usage and how much they are becoming dependent by organizations in order to conduct their business. Landman (2010) stated, “The threat from accidental or malicious misuse by employees is a significant threat to business” (p. 14). For this reason, using an iPhone in the workplace is putting companies on alert because the owner of the iPhone can store volatile information about their place where they work. Any information about the company such as e-mails, photos, and other digital evidence used in the work place could be sent to their competitors and used against the company itself and these are real life dangers in the corporate world.
Workplace surveillance has become a controversial issue in the workplace environment. The technological surveillance has developed as a necessity, it doesn’t only help in monitoring what the workers’ do, but it also helps to know how they do it. The modern technological development may have helped the employers’ to have an aerial view of the workplace environment, but it has created a controversy between the employees’ and the employer about the employees’ right to privacy being violated. The employees’ believe the act of workplace surveillance to be hateful that violates their right to privacy and liberties. The surveillance at the workplace often effects workers mental health, productivity, future success in their work and their relationship with the employer, despite being a necessity for the employers’ to protect themselves against the liability, many employers’ in the process of achieving efficiency through surveillance mistakenly ruin their relationship with their employees. The workplace surveillance is helpful in improving the performance of workers or it is contributing towards degrading the performance of workers and their work relationships.
It has been proved that computers help a business ease its activities such as record keeping, monitoring employees and word processing among others. However, the use of computers in the workplace breeds concerns such as security threats and privacy issues. Computer systems are not only prone to hackers but also other security issues that may compromise the company’s activities and social integrity. The research will probe into some of the advantages and disadvantages of computer surveillance.
Besides a password-protected system, WorldCom needs to create a program that tracks an employee’s computer activities as a preventive fraud measure especially if accessed over
Generally, employers are concerned about the various issues that could transpire in the workplace such as poor performance, viewing of inappropriate and derogatory things on the organization's equipment, lower productivity, and injuries on the job (“Managing Workplace Monitoring”, 2016). Therefore, “employers also have a duty to their employees to protect the privacy and confidentiality of the personal information gathered and maintained in the course of employment (“Managing Workplace Monitoring”, 2016, para. 1). Moreover, the main reason for monitoring employees is solely tied into limiting the amount of litigation the organization can potentially be subjected to. Therefore, to minimize exposure and risk to
Employers believe employees are taking advantage of the Internet while at work to access inappropriate websites such as shopping, gambling, pornographic material, and illegal downloading. Therefore, employers are searching for ways to reduce Internet exploring and increase work production, and remain within the state and federal guidelines (Young, 2011). To combat these issues, monitoring technologies are put in place to make employees more productive during company’s work hours. Monitoring technologies are classified as the use of computerized system that automatically collect, store, analyze, and report information about how an employee is performing his/her job (Wen, Schwieger & Gershuny, 2007). This helps companies to track their employee’s Internet movements, obtain detailed information (Wen, Schwieger & Gershuny, 2007), and protect the privacy of their company. In return, employers hope this will limit or eliminate employees from extensive use of the Internet.