Recent surveys have found that a majority of employers monitor their employees.

Employers want to be sure their employees are doing a good job, but employees don't want their every sneeze or trip to the water cooler logged. That's the essential conflict of workplace monitoring.

New technologies make it possible for employers to monitor many aspects of their employees' jobs, especially on telephones, computer terminals, through electronic and voice mail, and when employees are using the Internet. Such monitoring is virtually unregulated. Therefore, unless company policy specifically states otherwise (and even this is not assured), your employer may listen, watch and read most of your workplace communications.

Close to half of employers track content, keystrokes, and time spent at the keyboard. And 12% monitor blogs to see what is being written about the company. Another 10% monitor social networking sites.

Almost half of the companies use video monitoring to counter theft, violence and sabotage. Of those, only 7% state they use video surveillance to track employees’ on-the-job performance. Most employers notify employees of anti-theft video surveillance (78%) and performance-related video monitoring (89%).

Telephone Monitoring
Can my employer listen to my phone calls at work?
yes. For example, employers may monitor calls with clients or customers for reasons of quality control. However, when the parties to the call are all in California, state law requires that they be informed that the conversation is recorded or monitored by either putting a beep tone on the line or playing a recorded message.

Computer Monitoring
If you have a computer terminal at your job, it may be your employer's window into your workspace. There are several types of computer monitoring.
  1. Employers can use computer software that enables them to see what is on the screen or stored in the employees' computer terminals and hard disks. Employers can monitor Internet usage such as web-surfing and electronic mail.

    People involved in intensive word-processing and data entry jobs may be subject to keystroke monitoring. Such systems tells the manager how many keystrokes per hour each employee is performing. It also may inform employees if they are above or below the standard number of keystrokes expected. Keystroke monitoring has been linked with health problems including stress disabilities and physical problems like carpal tunnel syndrome.
  2. Another computer monitoring technique allows employers to keep track of the amount of time an employee spends away from the computer or idle time at the terminal.
Electronic Mail and Voice Mail
Is electronic mail private? What about voice mail?
no. If an electronic mail (e-mail) system is used at a company, the employer owns it and is allowed to review its contents. Messages sent within the company as well as those that are sent from your terminal to another company or from another company to you can be subject to monitoring by your employer. This includes web-based email accounts such as Yahoo , Gmail and Hotmail as well as instant messages. The same holds true for voice mail systems. In general, employees should not assume that these activities are not being monitored and are private.


1 comments:

It is right that employees should be monitored but it should be done in a way that they are not harrashed.You put up a very nice blog on such a ambigous topic.Nice work!

Post a Comment

Cyberlaw

Cyberlaw

About this blog

This blog is about cyberlaw

Labels

About Me

My photo
Hello my friends my name is Mehran ,I'm going to write about cyberlaw. This weblog is created for the purposes of an MBA project for the subject BYL 7134, Cyberlaw. The materials posted on this weblog are for the purposes of the assignment as well as study and non-profit research. Appropriate acknowledgments to the materials that do not belong to the web-log owner have been publicly made. If you are the author or a copyright owner of any of the articles posted in this web-log and you object to such posting on any grounds, including copyright infringement, please contact me and I will take your material down. I state herein that I am relying on the doctrine of fair use. Thank you for supporting my blog.

Followers

Labels


Labels

Search This Blog


Labels