Surveillance of Electronic Communications in the Workplace and the Protection of Employees' Privacy

Surveillance of Electronic Communications in the Workplace and the Protection of Employees' Privacy

Ioannis Inglezakis
DOI: 10.4018/978-1-5225-3917-9.ch049
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

The use of Information and Communication Technologies in the workplace is constantly increasing, but also the use of surveillance technology. Electronic monitoring of employees becomes an integral part of information systems in the workplace. The specific software which is used for monitoring electronic communications is, however, intrusive and infringes upon the employees' right to privacy. The issue of surveillance of employees' electronic communications is subject to different approaches in various jurisdictions. The most comprehensive protection to employees is afforded in the EU, and it would be enhanced once the General Data Protection Regulation is passed.
Chapter Preview
Top

Introduction

The penetration of Internet technology in the workplace is constantly increasing, as almost every office today is equipped with computer systems and Internet connections. The low cost and high efficacy of computers and electronic communications are important factors that make the use of Information and Communication Technologies (ICTs) in the workplace inescapable (Kierkegaard, 2005, p. 226). However, this ever growing trend has also its drawbacks, due to the fact that it raises privacy risks for employees, since employers are taking advantage of surveillance technology in order to monitor employees’ e-mail and internet usage. In addition, monitoring of electronic communications increases working stress and generates discomfort amongst employees.

The monitoring of workers in the workplace is not a new phenomenon. Employers have used various methods to control the performance of employees and their behavior at work on the past and they continue to do so. Yet, there were limits to the amount of information that could be collected and used for monitoring purposes with traditional means (Fraser, 2005, p. 227).

Nowadays, new technologies provide more advanced possibilities for monitoring of employees and in more particular, of their surfing activities and the electronic communications that they use, such as e-mail, instant messaging, etc. Other aspects of workplace monitoring include drug testing, closed-circuit video monitoring, phone monitoring, location monitoring, personality and psychological testing and keystroke logging.

The particular subject which will be addressed in this chapter concerns workplace monitoring in relation to employees’ electronic communications. This issue constitutes a specific aspect of the more general topic of electronic workplace surveillance, i.e. the use of information technology to monitor the activities and work performance of workers (Godfrey, 2001). Our attention will be drawn at the surveillance of electronic communications at work, that is, the use of monitoring devices in order to gain access to employees’ e-mail communications and to data revealing their online activities.

The use of electronic communications by employees and of the Internet in big businesses is very high, while in medium and small-sized businesses it is also constantly rising. Besides the benefits of the wide use of e-mails, this brings about serious issues for companies, such as the dissemination of illegal or offensive material and the leak of trade secrets by disappointed employees to third parties (Mitrou & Karyda, 2006). Additionally, a great number of employees are wasting their working time surfing on the Net and sending private e-mails (so-called “cyberslacking”), whereas this may give rise to termination of employment contracts.

For those reasons employers consider as their right to control the online activities of their employees. Certainly, employers have a legitimate interest in monitoring the behavior of their employees in order to secure the acceptable performance of employees and maximize productive use of their computer systems, to prevent the leak of sensitive company information, to prevent or even detect unauthorized use of said systems for criminal activities and ensure security of computer systems, to avoid sexual harassment in the workplace and discrimination, and monitor employees’ compliance with employment workplace policies related to use of ICT (EPIC; Lasprogata et al., 2004, pp. 2-3). However, such monitoring may have as a consequence the intrusion into the private life of employees and an infringement of their rights to respect of privacy and confidentiality of communications.

Complete Chapter List

Search this Book:
Reset