Jump to content

Workplace surveillance: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Freejason (talk | contribs)
Andypandy.UK (talk | contribs)
m JS: Reverted edits by Freejason to last version by 152.163.101.7
Line 23: Line 23:
*[http://people.howstuffworks.com/workplace-surveillance.htm Article from howstuffworks.com]
*[http://people.howstuffworks.com/workplace-surveillance.htm Article from howstuffworks.com]
*[http://www.privacyrights.org/fs/fs7-work.htm A privacy rights fact sheet]
*[http://www.privacyrights.org/fs/fs7-work.htm A privacy rights fact sheet]
*[http://www.e-spy-software.com/employee_monitoring.shtml Employee Monitoring Software] Helps employers to monitor all employees activities on the business computers, such as email messages, web sites visited, instant messenger sessions, applications used, etc.


[[Category:Surveillance]]
[[Category:Surveillance]]

Revision as of 15:07, 3 November 2006

Businesses use workplace surveillance as a way of monitoring the activities of their employees. Today's businesses often use information technology in their operations and communications. Business leaders have concerns related to employee misuse of available technologies. Technology appropriate use policies are being developed by some businesses as a way to protect business interests. These policies define employee use that is appropriate and other uses that are subject to scrutiny. Businesses are also implementing surveillance systems.

Types of workplace surveillance

There are many types of surveillance that could be instituted in the workplace. The most popular form of workplace surveillance is computer surveillance, which is a rapidly growing industry. This is also known as "employee Internet management". Computer surveillance can be broken up into two types: "Internet surveillance", and "desktop surveillance".

  • "Internet surveillance" is the active surveillance of the user’s Internet activities. When users operate a computer on the Internet, a record of the sites that were visited and the operations that were performed by the user can be generated by Internet surveillance software. Also known as spyware, this software is able to track the user’s activities and report it to the administrator. The administrator can then report this to the employer with various techniques.
  • "Desktop surveillance" on the other hand, works by the employer’s computer intercepting a signal that is given off by the employee’s computer. That is done through specific surveillance software that could be remotely or physically installed on the employee's machine.

A similar but different technique involves an employer reading the email traffic sent to and from employees. Generally, if friction arises, the dispute revolves around inappropriate or non-job-related use of email by an employee. As with the telephone, many employers formally or informally permit some amount of personal email. However, inordinate or inappropriate use of a work-related email account, such as soliciting customers for an employee-owned small business, is simply goading the employer into taking action.

Pros and cons of workplace surveillance

Even though much useful software exists, some employers still prefer the traditional methods of surveillance. Methods such as eavesdropping on phone calls, recording the phone calls or even video recording are still being used in all types of businesses.

Workplace surveillance can benefit the employer in many cases, and in some cases it can even have a benefit for the employee. Theft in the workplace is a common reason for workplace surveillance, which can often mean losses to the company, and thusly losses to the employer in terms of benefits such as security as well. Most of these negative aspects involve privacy, de-motivation, and stress.

See also