Académique Documents
Professionnel Documents
Culture Documents
Third edition
Sara Baase
Chapter 6: Work
• H
How iis employee
l monitoring
it i with
ith ttoday’s
d ’
technology different from employee
monitoring in the past?
Employee Monitoring
(cont.)
Monitoring today (cont.)
• H
How iis employee
l monitoring
it i with
ith ttoday’s
d ’
technology different from employee
monitoring in the past?
• More pervasive
• What, when, where
• Less
L obvious
b i / iinvisible
i ibl
• Employees don’t know if, when
Employee Monitoring
(cont.)
E-Mail, Blogging, and Web Use:
• E-mail and voice mail at work
– Who “owns” your email account
–ISU email?
–Faculty/staff vs student?
– Employees often assume passwords mean
they are private
–How private is it?
Employee Monitoring
(cont.)
E-Mail, Blogging, and Web Use:
• E-mail and voice mail at work
– Roughly half of major companies in the
U.S. monitor or search employee e-mail,
voice mail
mail, or computer files
– Most companies monitor infrequently,
some routinely intercept all e-mail
e mail
Employee Monitoring
(cont.)
E-Mail, Blogging, and Web Use:
• E-mail and voice mail at work
– Why do companies monitor email?
–Liability for misuse of company
resources
–Complaints and civil actions not
uncommon
–Lack of efforts to prevent abuse or
enforce ppolicy
y can lead to liability
y
exposure
Employee Monitoring
(cont.)
E-Mail, Blogging, and Web Use:
• E-mail and voice mail at work
– Why do companies monitor email?
–Protect proprietary business information
–Trade secrets, customer lists, etc
–Investigate complaints of harassment
–Investigate possible criminal activity
Employee Monitoring
(cont.)
E-Mail, Blogging, and Web Use (cont.):
• Law and cases
– Electronic
El t i Communications
C i ti P
Privacy
i A
Actt
(ECPA) prohibits interception of e-mail and
reading stored e-mail without a court order
–Makes an exception for business
systems
– Courts put heavy weight on the fact that
computers, mail, and phone systems are
owned by the employer who provides them
for business purposes
Employee Monitoring
(cont.)
E-Mail, Blogging, and Web Use (cont.):
• Law and cases (cont.)
– Courts
C t haveh ruled
l d against
i t monitoring
it i d done
for purposes that are not considered
legitimate, such as:
–Snooping on personal information
–Snooping on union activities
–Tracking
T ki down d whistle
hi tl blowers
bl
Employee Monitoring
(cont.)
E-Mail, Blogging, and Web Use (cont.):
• Law and cases (cont.)
– Many
M employers
l h
have privacy
i policies
li i
regarding e-mail and voice mail
–Such
Such a policy may provide a “reasonable
reasonable
expectation of privacy” if it explicitly
states that employee email is “private”
–Commonly,
Commonly policies explicitly state that
company email systems are “not private”.
Employee Monitoring
(cont.)
E-Mail, Blogging, and Web Use (cont.):
• Some companies block specific sites (e.g.
adult
d l content, sports sites,
i jjob
b search
h sites,
i
social-network sites)
• Black lists vs white lists
• Content filters
Employee Monitoring
(cont.)
E-Mail, Blogging, and Web Use (cont.):
• Employees spend time on non-work activities
on the
h WWeb b
• Lost productivity
• Concerns
C over security
it th
threats
t suchh as
viruses and other malicious software
• Vulnerabilities in web applications
• Downloading infected files
Employee Monitoring
(cont.)
E-Mail, Blogging, and Web Use (cont.):
• Concerns about inappropriate activities by
employees
l ((e.g., h
harassment, unprofessional
f i l
comment)
• Could be traced back to company system
and lead to liability or embarrassment
• Government agency employees
activities traced back
Employee Monitoring
Discussion Questions
• To a large degree, people act the way they
feel they are expected to act. Does intense
monitoring send a message that influences
behavior?