Workplace privacy is related with various ways of accessing, controlling, and
monitoring employees' information in a working environment.
Employee
Employment is a relationship between two parties regulating the provision of paid labour services. Usually based on a contract, one party, the employer, which might be a corporation, a not-for-profit organization, a co-operative, or any other ...
s typically must relinquish some of their privacy while in the workplace, but how much they must do can be a contentious issue. The debate rages on as to whether it is moral, ethical and legal for employers to monitor the actions of their employees.
Employer
Employment is a relationship between two parties regulating the provision of paid labour services. Usually based on a contract, one party, the employer, which might be a corporation, a not-for-profit organization, a co-operative, or any othe ...
s believe that monitoring is necessary both to discourage illicit activity and to limit liability. With this problem of monitoring employees, many are experiencing a negative effect on
emotional
Emotions are mental states brought on by neurophysiological changes, variously associated with thoughts, feelings, behavioral responses, and a degree of pleasure or displeasure. There is currently no scientific consensus on a definition. E ...
and physical stress including
fatigue
Fatigue describes a state of tiredness that does not resolve with rest or sleep. In general usage, fatigue is synonymous with extreme tiredness or exhaustion that normally follows prolonged physical or mental activity. When it does not resolve ...
, lowered
employee morale
Employee morale or workspace morale is the morale of employees in workspace environment. It is proven to have a direct effect on productivity.
History
Long used by the military as a "mission-critical" measure of the psychological readiness of tr ...
and lack of
motivation
Motivation is the reason for which humans and other animals initiate, continue, or terminate a behavior at a given time. Motivational states are commonly understood as forces acting within the agent that create a disposition to engage in goal-dire ...
within the
workplace
A workplace is a location where someone Work (human activity), works, for their employer or themselves, a place of employment. Such a place can range from a Small office/home office, home office to a large office building or factory. For Indust ...
. Employers might choose to monitor employee activities using
surveillance cameras
Closed-circuit television (CCTV), also known as video surveillance, is the use of video cameras to transmit a signal to a specific place, on a limited set of monitors. It differs from broadcast television in that the signal is not openly tr ...
, or may wish to record employees activities while using company-owned computers or telephones. Courts are finding that disputes between workplace
privacy
Privacy (, ) is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.
The domain of privacy partially overlaps with security, which can include the concepts of a ...
and freedom are being complicated with the advancement of technology as traditional rules that govern areas of
privacy law
Privacy law is the body of law that deals with the regulating, storing, and using of personally identifiable information, personal healthcare information, and financial information of individuals, which can be Personally identifiable information ...
are debatable and becoming less important.
Workplace privacy of employees also involves privacy of using approved websites on firm computers without monitoring. Workplace privacy involves the employer putting in the effort to protect employee privacy from both within the firm and outside the firm.
Europe
There are two general directives on personal data protection and these apply to employees instead. The first being the (97/66/EC) which protects individuals as regards the processing of personal data and the free movement of such data. №2002/58 which amends 97/66/EC refers to the processing of personal data and the protection of privacy in the electronic communications sector. (‘Data Protection at Work’ by the European Commission).The second is
EU Directive 95/46/EC on the protection of individuals with regards to the processing of personal data and on the free movement of such data limits and regulates the collection of
personal information
Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person.
The abbreviation PII is widely accepted in the United States, but the phrase it abbreviates ha ...
on individuals, including workers. Firms that monitor employees' use of e-mail, internet, or phones as part of their business practice without notifying employees or obtaining employee consent can be, in most cases, sued under Article 8 the
European Convention on Human Rights
The European Convention on Human Rights (ECHR; formally the Convention for the Protection of Human Rights and Fundamental Freedoms) is an international convention to protect human rights and political freedoms in Europe. Drafted in 1950 by t ...
. Although EU law is clear that e-mail interception is illegal, the law is not totally clear as to whether companies may prohibit employees from sending private e-mails.
United States
There is no federal law in the US that requires employers to notify staff on being monitored and practically no expectation of privacy for an employee using the company's devices, but the
Omnibus Crime Control and Safe Streets Act of 1968
The Omnibus Crime Control and Safe Streets Act of 1968 (, codified at ''et seq.'') was legislation passed by the Congress of the United States and signed into law by President Lyndon B. Johnson that established the Law Enforcement Assistance Admi ...
provides some privacy protections for employees. ''See
Omnibus Crime Control and Safe Streets Act of 1968 § Employee Privacy''. The
Electronic Communications Privacy Act
Electronic Communications Privacy Act of 1986 (ECPA) was enacted by the United States Congress to extend restrictions on government wire taps of telephone calls to include transmissions of electronic data by computer ( ''et seq.''), added new pro ...
extends protections to include email messages, cell phones and other electronic communications, however the act outlines important exceptions, such as the expressed intent of "legitimate business purposes." The scope of these exceptions has, in some cases, been a point of contention. ''See
Electronic Communications Privacy Act § Employee Privacy''.
A 2005 survey of more than 500 U.S. companies found that over half of employers had disciplined employees and about one in four had terminated (fired) an employee for "inappropriate" use of the internet, such as sending an inappropriate email message to a client or supervisor, neglecting work while
chatting with friends, or viewing pornography during work hours.
The tools that are used for
electronic surveillance
Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as c ...
are often caching
proxy server
In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource.
Instead of connecting directly to a server that can fulfill a request ...
s that are also used for
web monitoring.
Canada
In R v Cole, the
Supreme Court of Canada
The Supreme Court of Canada (SCC; french: Cour suprême du Canada, CSC) is the Supreme court, highest court in the Court system of Canada, judicial system of Canada. It comprises List of Justices of the Supreme Court of Canada, nine justices, wh ...
ruled that
Australia
In
Australia
Australia, officially the Commonwealth of Australia, is a Sovereign state, sovereign country comprising the mainland of the Australia (continent), Australian continent, the island of Tasmania, and numerous List of islands of Australia, sma ...
, only a few States have workplace surveillance laws. In relation to the Workplace monitoring Act of 2005 (NSW) s10, s12, an employer can monitor an employee’s computer usage only if there is a workplace policy noted for the monitoring, and the employees are notified that their computer activity is being monitored.
United Arab Emirates
In
United Arab Emirates
The United Arab Emirates (UAE; ar, اَلْإِمَارَات الْعَرَبِيَة الْمُتَحِدَة ), or simply the Emirates ( ar, الِْإمَارَات ), is a country in Western Asia (The Middle East). It is located at th ...
, Employers have the right to monitor computers provided to employees for work provided employees are aware and agree to it, particularly when it involves personal data. If employees do not give consent, it is prohibited to monitor them even during working hours. (According to Federal UAE Laws; Constitution of the UAE (Federal Law 1 of 1971), Penal Code (Federal Law 3 of 1987 as amended), Cyber Crime Law (Federal Law 5 of 2012 regarding Information Technology Crime Control), and Regulating Telecommunications (Federal Law by Decree 3 of 2003 as amended)).
Russian Federation
Employee monitoring is legal in
Russia
Russia (, , ), or the Russian Federation, is a List of transcontinental countries, transcontinental country spanning Eastern Europe and North Asia, Northern Asia. It is the List of countries and dependencies by area, largest country in the ...
. Art. 21 of the Labor Code of the Russian Federation requires employees to conscientiously perform labor duties assigned to them by the employment contract. In that same vein, Art. 22 of the Labor Code of the Russian Federation requires the employer to provide all the tools necessary for employees to execute their work duties, and the employer has the right to monitor work performance on these devices. That said, all parties involved in the monitoring process must be adequately informed of the monitoring and reasons. Monitoring company computers is legal and necessary in
Russia
Russia (, , ), or the Russian Federation, is a List of transcontinental countries, transcontinental country spanning Eastern Europe and North Asia, Northern Asia. It is the List of countries and dependencies by area, largest country in the ...
. According to Art. 22 of the Labor Code of the Russian Federation, the employer must provide all the tools necessary for employees to perform their labor duties. In the modern workplace, computers are labor tools. Therefore, if the employer provides the computer, they have the right to control usage. That being said, the law requires an employer who monitors employees to create an atmosphere of transparency. The monitoring process has to be included in the employment contract and policies. Notably, the monitoring should be during working hours, and no personal information should be collected to avoid legal misunderstandings.
Economic theory
According to the
Coase Theorem
In law and economics, the Coase theorem () describes the economic efficiency of an economic allocation or outcome in the presence of externalities. The theorem states that if trade in an externality is possible and there are sufficiently low trans ...
, an employer and an employee never agree to a contractual arrangement that would reduce the total surplus generated by the two parties together. Hence, when we observe workplace surveillance, then the costs (say, the worker's disutility caused by the loss of privacy) must be smaller than the benefit (say, the additional profit due to a reduction of shirking), because otherwise the parties would abolish surveillance (the worker would be willing to accept a smaller wage in exchange for more privacy, which would increase the employer's profit more than surveillance could do). However, the Coase Theorem holds only if there are no
transaction cost
In economics and related disciplines, a transaction cost is a cost in making any economic trade when participating in a market. Oliver E. Williamson defines transaction costs as the costs of running an economic system of companies, and unlike produ ...
s. Schmitz (2005) has shown that in the presence of asymmetric information (leading to a
moral hazard
In economics, a moral hazard is a situation where an economic actor has an incentive to increase its exposure to risk because it does not bear the full costs of that risk. For example, when a corporation is insured, it may take on higher risk ...
problem), the total surplus generated by an employer and an employee can be increased if workplace surveillance is prohibited by law.
See also
*
Computer surveillance in the workplace
Computer surveillance in the workplace is the use of computers to monitor activity in a workplace. Computer monitoring is a method of collecting performance data which employers obtain through digitalised employee monitoring. Computer surveillance ...
*
Employee monitoring software
Employee monitoring software is a means of employee monitoring, and allows company administrators to monitor and supervise all their employee computers from a central location. It is normally deployed over a business network and allows for easy c ...
*
Email Privacy
Email privacy is a broad topic dealing with issues of unauthorized access to, and inspection of, electronic mail, or unauthorized tracking when a user reads an email. This unauthorized access can happen while an email is in transit, as well as w ...
Notes and references
External links
Think Before You Type: A Look At Email Privacy In The Workplace
{{Workplace
Privacy
Workplace
Privacy in Canada
de:Arbeitnehmerdatenschutz