Monitoring Employee`S E Mails


Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • The Economist Online – February 12th 2010
  • The presentation lasts about... We are going to talk about...
  • the act of observing something The act of listening, carrying out surveillance on, and/or recording of enemy emissions for intelligence purposes.
  • Employee use of electronic mail (e-mail) during business hours is a common characteristic of the 21st century American workplace. According to a recent study, over 130 million workers are currently flooding recipients with 2.8 billion e-mail messages each day.1 Employers provide e-mail services to their employees as an efficient means of facilitating both intra-company communication and communication with the outside client base.2 E-mail serves to increase the efficiency of today's workplace because it is inexpensive to provide, simple to install and easy to use.3 E-mail usage also dramatically decreases the use of office-related, paper-based correspondence. However, despite these efficiencies, this technological advancement is also creating collateral problems concerning issues of employee privacy that today's legal environment appears unprepared to solve. This inadequacy in the law is primarily based on the fact that many employees do not know the extent of their privacy rights regarding their company-provided e-mail accounts. In fact, many employees operate under the false assumption that personal e-mail messages sent from work are protected from their employer's scrutiny.
  • 1. Maintaining the company's professional reputation and image; 2. Maintaining employee productivity; 3. Preventing and discouraging sexual or other illegal workplace harassment; 4. Preventing "cyberstalking" by employees; 5. Preventing possible defamation liability (kohustuste laimamine); 6. Preventing employee disclosure of trade secrets and other confidential information; and 7. Avoiding copyright and other intellectual property infringement from employees illegally downloading software, etc.8
  • To motivate compliance with rules and policies, more than one fourth of employers have fired workers for misusing e-mail and nearly one third have fired employees for misusing the Internet. The 28% of employers who have fired workers for e-mail misuse did so for the following reasons: violation of any company policy (64%); inappropriate or offensive language (62%); excessive personal use (26%); breach of confidentiality rules (22%); other (12%). The 30% of bosses who have fired workers for Internet misuse cite the following reasons: viewing, downloading, or uploading inappropriate/offensive content (84%); excessive personal use (34%); other (9%).
  • Employers are primarily concerned about inappropriate Web surfing, with 66% monitoring Internet connections. Fully 65% of companies use software to block connections to inappropriate Websites—a 27% increase since 2001 when AMA/ePolicy Institute first surveyed electronic monitoring and surveillance policies and procedures. Employers who block access to the Web are concerned about employees visiting adult sites with sexual, romantic, or pornographic content (96%); game sites (61%); social networking sites (50%); entertainment sites (40%); shopping/auction sites (27%); and sports sites (21%). In addition, companies use URL blocks to stop employees from visiting external blogs (18%).
  • Hard to make the difference between personal and bussiness information.
  • Monitoring Employee`S E Mails

    2. 2. We are going to talk about... <ul><li>What is monitoring </li></ul><ul><li>E-mail and other monitoring </li></ul><ul><li>Reasons for monitoring </li></ul><ul><li>Examples (charts) </li></ul><ul><li>Negative sides of monitoring </li></ul>
    3. 3. What is monitoring? <ul><li>Collecting information </li></ul><ul><li>Observation </li></ul><ul><li>Surveillance </li></ul><ul><li>Watching / listening / recording </li></ul>
    4. 4. E-mails and monitoring <ul><li>E-mail useage </li></ul><ul><ul><li>2,8 billion e-mail per day </li></ul></ul><ul><ul><li>Inexpensive, easy to use </li></ul></ul><ul><li>Problems with security </li></ul><ul><li>Other </li></ul><ul><ul><li>Phone call tracing </li></ul></ul><ul><ul><li>Time recording </li></ul></ul><ul><ul><li>Video surveillance </li></ul></ul><ul><ul><li>Global Satellite Positioning </li></ul></ul>
    5. 5. Reasons for monitoring <ul><li>Reputation </li></ul><ul><li>Productivity </li></ul><ul><li>Harrasment </li></ul><ul><li>Cyberstalking </li></ul><ul><li>Defamation </li></ul><ul><li>Confidential information </li></ul><ul><li>Copyright </li></ul>
    6. 6. Reasons for monitoring
    7. 7. Inappropriate Web surfing
    8. 8. Negative sides of monitoring <ul><li>Lack of privacy </li></ul><ul><li>Misunderstandings between the company and employees </li></ul><ul><li>Employees’ unawareness and ignorance </li></ul>
    9. 9. Conclusion <ul><li>Activities need to be well managed if they are to be effective in achieving results and delivering benefits. Good management is about making timely decisions based on reliable and relevant information. Everybody must know his limits! </li></ul>
    10. 10. Thank you for listening!