The Computer Revolution/Security/Employee Monitoring

From Wikibooks, open books for an open world
Jump to navigation Jump to search

Employee Monitoring refers to companies recording or observing the actions of employees while on the job. It is very easy to perform, and much of it can be done through the use of computers. Common employee monitoring activities include screening telephone calls, reviewing e-mail, and tracking computer and internet usage. With the growing inclusion of video cameras in computers and monitors, employee monitoring via PC may become more prominent in the near future. Although many employees find it is an invasion of privacy, it is legal and very common in the U.S. For monitoring physical locations of employees, video cameras can be used, but another possibility is the use of smart or RFID- enabled ID cards (sometimes called proximity cards).

When you think about employee monitoring I think that most employees would agree that they are not a fan of this. Unfortunately in our society today, employee monitoring, has become a necessary action for employers to take. Because of all of the things that are available when accessing the internet, computer monitoring is a must. Monitoring an employee’s use of the internet on a company owned computer is done by the majority of employers, because an employee can pay bills, shop, read all types of media and also use all of the social networking sites while in the workplace. An employer could block the internet from an employee’s computer, but that is not always possible, as the internet might be needed to accomplish their job

Employee monitoring is very common in today’s business world. Employee monitoring reduces risk of theft, injury, and other problems that occur daily in the workplace. Employee monitoring is not illegal, it is actually recommended. Telephones, computer terminals, voice mail, or any Internet accessible device can be monitored. This is because every Internet activity leaves a digital footprint that can be traced. However, limitations have been placed on accessing personal accounts. According to Stengart v. LovingCare Agency, Inc. an agency cannot access an employee’s personal password protected account. Even if deleted from the terminal, messages still remain in memory “backed up” on magnetic tape. Encryption is the safest way to achieve legitimate privacy. Source: Computers RIAN archive 711258 Russia's first Comprehensive Security System Center opens in St Petersburg