HOME

TheInfoList



OR:

Computer surveillance in the workplace is the use of computers to monitor activity in a
workplace A workplace is a location where someone works, for their employer or themselves, a place of employment. Such a place can range from a home office to a large office building or factory. For industrialized societies, the workplace is one of ...
. Computer monitoring is a method of collecting performance data which employers obtain through digitalised
employee monitoring Employee monitoring is the (often automated) surveillance of workers' activity. Organizations engage in employee monitoring for different reasons such as to track performance, to avoid legal liability, to protect trade secrets, and to address ot ...
. Computer surveillance may nowadays be used alongside traditional security applications, such as closed-circuit television.


Computer usage monitoring

Depending upon the technology and methods used, monitoring applications may track all activity or may target specific activities of employees on a company-owned computer or terminal. They may monitor various devices installed on the computer (e.g., web cameras and microphones). This includes not only recordings from these devices but also remote broadcasting of live feed from webcams and microphones. Tools used for monitoring employee computer usage incorporate: *Screen monitoring records video or static images detailing the contents, or screen capture, of the entire video display or the content of the screen activity within a particular program or computer application. Monitoring tools may collect real time video, accelerated or time-lapse video or screen shots, or may take video or still image captures at regular intervals (e.g., once every 4 minutes). They may collect images constantly or only collect information while the user is interacting with the equipment (e.g., capturing screens when the
mouse A mouse ( : mice) is a small rodent. Characteristically, mice are known to have a pointed snout, small rounded ears, a body-length scaly tail, and a high breeding rate. The best known mouse species is the common house mouse (''Mus musculus' ...
or keyboard is active). *Data monitoring tracks the content of and changes to files stored on the local
hard drive A hard disk drive (HDD), hard disk, hard drive, or fixed disk is an electro-mechanical data storage device that stores and retrieves digital data using magnetic storage with one or more rigid rapidly rotating platters coated with magne ...
or in the user's "private" network share. *Keystroke monitoring (e.g., number of keystrokes per minute) may track the performance of keyboard-intensive work such as word processing or data entry. Keystroke logging captures all keyboard input to enable the employer to monitor anything typed into the monitored machine. *Idle time monitoring keeps track of time when the employee is away from the computer or the computer is not being actively used. *Printer monitoring records documents files that are printed from the computer. *Removable drives monitoring tracks external devices that are connected to the computer. *Video/audio monitoring makes recordings and snapshots from connected devices webcam and microphone and broadcasts video/sound live. This is also known as
employee monitoring Employee monitoring is the (often automated) surveillance of workers' activity. Organizations engage in employee monitoring for different reasons such as to track performance, to avoid legal liability, to protect trade secrets, and to address ot ...
in the industry. Employee monitoring is used for multiple reasons, including compliance and
Insider threat management An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors or business associates, who have inside information concerning the organization's security ...
. Employee monitoring software can monitor
application software Application may refer to: Mathematics and computing * Application software, computer software designed to help the user to perform specific tasks ** Application layer, an abstraction layer that specifies protocols and interface methods used in a ...
, including
email Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" mean ...
, instant message,
filesystem In computing, file system or filesystem (often abbreviated to fs) is a method and data structure that the operating system uses to control how data is stored and retrieved. Without a file system, data placed in a storage medium would be one larg ...
and print jobs.


Internet usage

Internet surveillance is the monitoring of
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a ''internetworking, network of networks'' that consists ...
data traffic Network traffic or data traffic is the amount of data moving across a network at a given point of time. Network data in computer networks is mostly encapsulated in network packets, which provide the load in the network. Network traffic is the ma ...
, web access, and other online activity. This may include monitoring any Internet traffic including encrypted web browser traffic via
Transport Layer Security Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in secu ...
and
Secure Sockets Layer Transport Layer Security (TLS) is a cryptographic protocol designed to provide communications security over a computer network. The protocol is widely used in applications such as email, instant messaging, and voice over IP, but its use in sec ...
connections, personal web-based email, and personal banking sites. Research done by
American Management Association The American Management Association (AMA) is an American non-profit educational membership organization for the promotion of management, based in New York City. Besides its headquarters there, it has local head offices throughout the world. It ...
that nearly 30 percent of all employers in the United States monitor employee
e-mail Electronic mail (email or e-mail) is a method of exchanging messages ("mail") between people using electronic devices. Email was thus conceived as the electronic ( digital) version of, or counterpart to, mail, at a time when "mail" mean ...
s.


Legislation

Labor union contracts and other forms of
employment agreements An employment contract or contract of employment is a kind of contract used in labour law to attribute rights and responsibilities between parties to a bargain. The contract is between an "employee" and an "employer". It has arisen out of the old ...
may offer some protection from monitoring. Additionally, in the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., federal district, five ma ...
, public sector employees may have some protection under the Fourth Amendment to the United States Constitution. Employees in
California California is a state in the Western United States, located along the Pacific Coast. With nearly 39.2million residents across a total area of approximately , it is the most populous U.S. state and the 3rd largest by area. It is also the ...
may have additional protection under specific portions of state statute. Employers may be required to maintain documentation of emails and other communications for regulatory or compliance purposes. The monitoring of email and instant messaging communications may be part of these requirements. Some software used for this type of surveillance may impose additional restrictions or notification requirements based on their End User License Agreement (
EULA An end-user license agreement or EULA () is a legal contract between a software supplier and a customer or end-user, generally made available to the customer via a retailer acting as an intermediary. A EULA specifies in detail the rights and restr ...
). For example, Spectorsoft requires that employees have signed a contract stating that their computer activity may be monitored when they were employed. Additional legal issues may arise if information obtained from the monitoring is used for illegal or malicious purposes.


Employee perception

In organizations without stated computer usage or monitoring policy, employees typically use the company's equipment at their respective discretion and, in most cases, there may be no visible restrictions or monitoring of the activities performed on this computer. The use of computer surveillance within the employee discipline or evaluation process may be viewed by employees as an invasion of privacy or a lack of trust. Employers have the right to monitor their employees in the United States but of course, there are specific rules and regulations they must follow depending on the state legislation. Despite the fact that almost 80% of all major companies in America actively monitor their employees., public opinion is still mostly on the employees’ side. Most of Americans still think that monitoring in the workplace is not entirely acceptable. According to Pew Research Center, only 6% of respondents do not care about being monitored at work. Employee's relationship with employers may be affected with being monitored at work. The freedom, privacy, respect, and responsibility aspect between human relations may be taken away from an employee when being monitored.


See also

* Surveillance *
Spyware Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privac ...
*
Workplace privacy Workplace privacy is related with various ways of accessing, controlling, and employee monitoring, monitoring employees' information in a working environment. Employees typically must relinquish some of their privacy while in the workplace, but how ...


References

{{Reflist Computer surveillance Workplace