HOME

TheInfoList



OR:

Employee monitoring is the (often automated)
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as ...
of workers' activity.
Organizations An organization or organisation (Commonwealth English; see spelling differences), is an entity—such as a company, an institution, or an association—comprising one or more people and having a particular purpose. The word is derived from ...
engage in employee monitoring for different reasons such as to track
performance A performance is an act of staging or presenting a play, concert, or other form of entertainment. It is also defined as the action or process of carrying out or accomplishing an action, task, or function. Management science In the work place ...
, to avoid legal liability, to protect
trade secrets Trade secrets are a type of intellectual property that includes formulas, practices, processes, designs, instruments, patterns, or compilations of information that have inherent economic value because they are not generally known or readily a ...
, and to address other security concerns. This practice may impact
employee satisfaction Job satisfaction, employee satisfaction or work satisfaction is a measure of workers' contentedness with their job, whether they like the job or individual aspects or facets of jobs, such as nature of work or supervision. Job satisfaction can be ...
due to its impact on the employee's
privacy Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively. The domain of privacy partially overlaps with security, which can include the concepts of ...
. Among organizations, the extent and methods of employee monitoring differ.


Surveillance Methods

A company can use its everyday electronic devices to monitor its employees almost continuously. Common methods include software monitoring, telephone tapping, video surveillance, email monitoring, and location monitoring. Software monitoring. Companies often use employee monitoring software to track what their employees are doing on their computers. Tracking data may include typing speed, mistakes, applications used, and what specific keys are pressed. Telephone tapping can be used to record employees' phone call details and conversations. These can be recorded during monitoring. The number of calls, the duration of each call, and the idle time between calls, can all go into a log for analysis by the company. Video surveillance can provide video feed of employee activities that are passed through to a central location where they are monitored by another person. These can be recorded and stored for future reference which some believe is the most accurate way to monitor employees. "This is a benefit because it provides an unbiased method of performance evaluation and prevents the interference of a manager's feelings in an employee's review" (Mishra and Crampton, 1998). Management can review an employee's performance by checking the surveillance to detect and potentially prevent problems". Email monitoring gives employers the ability to look at email messages sent or received by their employees. Emails can be viewed and recovered even if they had been previously deleted. In the United States, the
Electronic Communications Privacy Act Electronic Communications Privacy Act of 1986 (ECPA) was enacted by the United States Congress to extend restrictions on government wire taps of telephone calls to include transmissions of electronic data by computer ( ''et seq.''), added new pr ...
provides some privacy protections regarding monitoring of employees' email messages and other electronic communications. See Electronic Communications Privacy Act#Employee privacy. Location monitoring can be used for employees that move their place of work. Common examples of companies that use location monitoring are delivery and transportation industries. Sometimes the employee monitoring is incidental as the location is tracked for other purposes. Employees' phone calls can be recorded during monitoring. The number of calls, the duration of each call, and the idle time between calls, can all go into an automatic log for analysis by the company. Key logging, or keystroke logging, is a process that records a user's typing. Key logging software may also capture screenshots when triggered by predefined keywords. Some see it as violating workplace privacy and it is notorious for being used with malicious intent. Loggers can collect and store passwords, bank account information, private messages, credit card numbers, PIN numbers, and usernames.


Legality

Employee monitoring often is in conflict with employees' privacy. Monitoring collects work-related activities, but it can also collect employee's personal information that is not linked to their work. Monitoring in the workplace may put employers and employees at odds because both sides are trying to protect personal interests. Employees want to maintain their privacy while employers want to ensure company resources aren't misused. In any case, companies can maintain ethical monitoring policies by avoiding indiscriminate monitoring of employees' activities. The employee needs to understand what is expected of them while the employer needs to establish that rule. With employee monitoring, there are many guidelines that one must follow and put in place to protect the company and the individual. Some following cases are ones that have shaped the certain rules and regulations that are in effect today. For instance, in
Canada Canada is a country in North America. Its ten provinces and three territories extend from the Atlantic Ocean to the Pacific Ocean and northward into the Arctic Ocean, covering over , making it the world's second-largest country by to ...
, it is illegal to perform invasive monitoring, such as reading an employee's emails, unless it can be shown that it is a necessary precaution and there are no other alternatives. In
Maryland Maryland ( ) is a state in the Mid-Atlantic region of the United States. It shares borders with Virginia, West Virginia, and the District of Columbia to its south and west; Pennsylvania to its north; and Delaware and the Atlantic Ocean t ...
, everyone in the conversation must give consent before the conversation can be recorded (especially during
telephone calls A telephone is a telecommunications device that permits two or more users to conduct a conversation when they are too far apart to be easily heard directly. A telephone converts sound, typically and most efficiently the human voice, into ...
). The state of
California California is a state in the Western United States, located along the Pacific Coast. With nearly 39.2million residents across a total area of approximately , it is the most populous U.S. state and the 3rd largest by area. It is also the m ...
requires that the monitored conversations have a beep at certain intervals or there must be a message informing the caller that the conversations may be recorded. However, this does not inform the company representative which calls are being recorded. All employers must create a comprehensive
employee handbook An employee handbook, sometimes also known as an employee manual, staff handbook, or company policy manual, is a book given to employees by an employer. The employee handbook can be used to bring together employment and job-related information wh ...
that will include both mandatory and recommended policies. Handbooks must explain in detail what employees are permitted or not allowed to do in the
workplace A workplace is a location where someone works, for their employer or themselves, a place of employment. Such a place can range from a home office to a large office building or factory. For industrialized societies, the workplace is one of ...
. Employers must update handbooks if employment laws or policies change. Other states, including
Connecticut Connecticut () is the southernmost state in the New England region of the Northeastern United States. It is bordered by Rhode Island to the east, Massachusetts to the north, New York (state), New York to the west, and Long Island Sound to the ...
,
New York New York most commonly refers to: * New York City, the most populous city in the United States, located in the state of New York * New York (state), a state in the northeastern United States New York may also refer to: Film and television * '' ...
,
Pennsylvania Pennsylvania (; ( Pennsylvania Dutch: )), officially the Commonwealth of Pennsylvania, is a state spanning the Mid-Atlantic, Northeastern, Appalachian, and Great Lakes regions of the United States. It borders Delaware to its southeast, ...
,
Colorado Colorado (, other variants) is a state in the Mountain West subregion of the Western United States. It encompasses most of the Southern Rocky Mountains, as well as the northeastern portion of the Colorado Plateau and the western edge of the ...
and
New Jersey New Jersey is a state in the Mid-Atlantic and Northeastern regions of the United States. It is bordered on the north and east by the state of New York; on the east, southeast, and south by the Atlantic Ocean; on the west by the Delawa ...
have laws relating to when a conversation can be recorded. "Lawyers generally advise that one way for businesses to avoid liability for monitoring employees’ online activities is to take all necessary steps to eliminate any
reasonable expectation of privacy Expectation of privacy is a legal test which is crucial in defining the scope of the applicability of the privacy protections of the Fourth Amendment to the United States Constitution. It is related to, but is not the same as, a ''right to privacy ...
that employees may have concerning their use of company email and other communications systems." Businesses makes employee monitoring a known tool that supervisors use to avoid any potential legal issues that may arise. They will announce this during new hire orientation, in a staff meeting, or even in a workplace contract that employees sign either at the time of hire or after a form of misconduct. On May 7, 2022, employers in the
state of New York New York, officially the State of New York, is a state in the Northeastern United States. It is often called New York State to distinguish it from its largest city, New York City. With a total area of , New York is the 27th-largest U.S. state ...
will be required to provide prior notice for the monitoring of employee
internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, p ...
,
telephone A telephone is a telecommunications device that permits two or more users to conduct a conversation when they are too far apart to be easily heard directly. A telephone converts sound, typically and most efficiently the human voice, into e ...
or
email Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" mean ...
usage. The new law is an
amendment An amendment is a formal or official change made to a law, contract, constitution, or other legal document. It is based on the verb to amend, which means to change for better. Amendments can add, remove, or update parts of these agreements. The ...
to the New York civil rights law and applies to any private individual or entity with a place of business in the state of New York.


Legal Uses

Businesses use employee monitoring for various reasons. The follow is a list that includes, but is not limited to: * Find needed business information when the employee is not available. * Protect
security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
of proprietary information and data. * Prevent or investigate possible criminal activities by employees. * Prevent personal use of employer facilities. * Check for violations of company policy against sending an offensive or pornographic email. * Investigate complaints of
harassment Harassment covers a wide range of behaviors of offensive nature. It is commonly understood as behavior that demeans, humiliates or embarrasses a person, and it is characteristically identified by its unlikelihood in terms of social and moral ...
. * Check for illegal software.


Legal Issues

In January 2016,
European Court of Human Rights The European Court of Human Rights (ECHR or ECtHR), also known as the Strasbourg Court, is an international court of the Council of Europe which interprets the European Convention on Human Rights. The court hears applications alleging that ...
issued a landmark ruling in the case of Bărbulescu v Romania (61496/08) regarding monitoring of employees’ computers. The employee Mr. Bărbulescu accused the employer of violating his rights to ‘private life’ and ‘correspondence’ set in the Article 8 of the
European Convention on Human Rights The European Convention on Human Rights (ECHR; formally the Convention for the Protection of Human Rights and Fundamental Freedoms) is an international convention to protect human rights and political freedoms in Europe. Drafted in 1950 by ...
. It held that a sales engineer had a 'reasonable expectation of privacy' against personal messages being read (including those to his fiance and his brother), even though he was told not to use a workplace Yahoo messenger for personal reasons, because "an employer’s instructions cannot reduce private social life in the workplace to zero. Respect for private life and for the privacy of correspondence continues to exist, even if these may be restricted in so far as necessary". It follows that there is a
human right Human rights are moral principles or normsJames Nickel, with assistance from Thomas Pogge, M.B.E. Smith, and Leif Wenar, 13 December 2013, Stanford Encyclopedia of PhilosophyHuman Rights Retrieved 14 August 2014 for certain standards of hum ...
to private communication, regardless of what an employer says. A year later, in July 2017, German court ruled that
computer monitoring Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be comp ...
of employees is reasonable but the use of keylogging software is excessive. Employee monitoring software developers warn that in each case it is still recommended to advise a legal representative and the employees should give a written agreement with such monitoring Majority of instances are a case by case situation and is hard to treat all the issues and problems as one. As new laws have been enacted dictating the bounds of these practices, employers have been forced to change their monitoring protocols.


Financial costs of monitoring

According to the American Management Association, almost half (48%) of the American companies surveyed use video monitoring to counter theft, violence, and
sabotage Sabotage is a deliberate action aimed at weakening a polity, effort, or organization through subversion, obstruction, disruption, or destruction. One who engages in sabotage is a ''saboteur''. Saboteurs typically try to conceal their identitie ...
. Only 7% use video
surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as ...
to track employees' on-the-job
performance A performance is an act of staging or presenting a play, concert, or other form of entertainment. It is also defined as the action or process of carrying out or accomplishing an action, task, or function. Management science In the work place ...
. Most employers notify employees of anti-theft video surveillance (78%) and performance-related video monitoring (89%) (retrieved from the article The Latest on Workplace Monitoring and Surveillance). In an article in '' Labour Economics'', it has been argued that forbidding employers to track employees' on-the-job performance can make economic sense according to efficiency wage theory, while surveillance to prevent illegal activities should be allowed. An indirect way that companies can be affected financially through employee monitoring is that they can be sure they are billing clients correctly. According to "Business 2 Community," inaccurately billing clients is always possible because of
human error Human error refers to something having been done that was " not intended by the actor; not desired by a set of rules or an external observer; or that led the task or system outside its acceptable limits".Senders, J.W. and Moray, N.P. (1991) Human ...
. Such inaccuracies can cause disputes between a company and a client which could eventually lead to the client terminating its business with the company. This sort of termination will not only hurt the company's revenue stream but also its reputation with other clients or potential clients. The suggested solution to this problem is a
time tracking A timesheet (or time sheet) is a method for recording the amount of a worker's time spent on each job. Traditionally a sheet of paper with the data arranged in tabular format, a timesheet is now often a digital document or spreadsheet. The time ...
software to monitor the number of hours a
client Client(s) or The Client may refer to: * Client (business) * Client (computing), hardware or software that accesses a remote service on another computer * Customer or client, a recipient of goods or services in return for monetary or other valuabl ...
spends with an employee.


See also

*
Abusive supervision Abusive supervision is most commonly studied in the context of the workplace, although it can arise in other areas such as in the household and at school. "Abusive supervision has been investigated as an antecedent to negative subordinate workplace ...
*
Computer surveillance in the workplace Computer surveillance in the workplace is the use of computers to monitor activity in a workplace. Computer monitoring is a method of collecting performance data which employers obtain through digitalised employee monitoring. Computer surveillance ...
*
Counterproductive work behavior Counterproductive work behavior (CWB) is employee behavior that goes against the legitimate interests of an organization. These behaviors can harm organizations or people in organizations including employees a ...
*
Mass surveillance Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizati ...
* Occupational health psychology *
Right to privacy The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 150 national constitutions mention the right to privacy. On 10 December 194 ...
*
Surveillance Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as ...
*
Workplace privacy Workplace privacy is related with various ways of accessing, controlling, and monitoring employees' information in a working environment. Employees typically must relinquish some of their privacy while in the workplace, but how much they must do ca ...
* Workplace deviance *
Workplace incivility Workplace incivility has been defined as low-intensity deviant behavior with ambiguous intent to harm the target. Uncivil behaviors are characteristically rude and discourteous, displaying a lack of regard for others. The authors hypothesize there ...
* Workplace health surveillance


References

{{DEFAULTSORT:Employee Monitoring Surveillance Privacy Ethically disputed working conditions Workplace Employee relations