An employer has every right to monitor the work computers of their employees at home. The employer will do so for various reasons: they will need to ensure their employees' productivity. It is also for the protection of the organization's software and hardware. For example, certain activities on the computer can compromise on the computer by downloading viruses and malware. Finally, it is also for safety reasons as the employer tries to protect against illegal activities such as losing the organizational intellectual property.
Generally, the law allows employers to monitor their employees' computers, whether personal or belonging to the organization, even when they work from home. The Electronic Communication Privacy Act (ECPA) 1986 provides legal authority and limitations regarding employers' access to employee work-related electronic devices. The act touches on emails, electronically stored data, and phone conversations.
ECPA provides two exceptions to this law which make it perfectly legal for employers to surveil the work of their employees at home:
Technically, employers use computer monitoring software that uses data and information tracking to provide relevant feedback on the employee activities on their computers. The employer will install employee monitoring applications in the employee's work computer with or without their consent, which, as we saw above, is perfectly legal. Then, they have the employees download the software into their personal computers. There are different employee monitoring software, using different features but working towards similar goals. They track employees' attendance and log details, the use of tools and applications, internet and social media, graphical data, screenshots, among other ways we are about to discover.
Once you log into the computer, the surveillance software captures your details and can tell who is using that particular machine at that time. In addition, employers can use different software with different features put together to boost effectiveness.
This software collects data from the computer regarding the commonly visited websites, the apps used, and the time the employee spends on each website. In addition, these applications are programmed in a way that they can automatically categorize the activity as being either productive or unproductive. The application then creates a comprehensive report on whether the productivity of that particular employee during that given time.
The employer can automatically block websites they don't want their employees to access on the work computer. It is made possible by using employee tracking software that keeps track of the websites visited and automatically blocked others.
The application also provides notifications on the idle time that employees spend on unproductive sites. They also provide data on the security threats posed by clicking and opening such sites.
Employers can also use employee monitoring software to control social media and other time-consuming applications such as YouTube during working hours. The employer can also monitor messaging and email activities on your computer. For example, the applications can record and read emails for playback, blocking certain email attachments from loading. They also block instant chats and messages by the use of certain preset keywords.
Employers use employee monitoring software to ensure the safety of organizational information. The application does so by monitoring and barring the transfer of files. The application can notify the employer of the files downloaded and uploaded onto various platforms such as the cloud, sent out as attachments, uploaded on Google Drive or dropbox. The employer can also use this monitoring software to surveil the printing of documents from the work computer.
Some software will automatically send messages on what is being printed and prevent the employee from printing certain inappropriate information. Employee surveillance software also takes screenshots at certain frequencies to provide information on the employee activities on the computer at given times. In addition, the employer can have a video recorded or live stream of the employee's computer desktop in other cases. They can tell the employee's productivity and take the necessary measures to reward work done.
The employer can install a time tracking application that automatically clocks in when you open your computer. The same is applied in monitor time in meetings and time away from the workstation. Time tracking is critical for employers as they can easily tell when a certain employee logged in and the number of working hours. It also notifies the employer of days off and helps calculate the amount of payment in salaries, as per the hours worked. In addition, through time tracking, the employer can control undesirable habits of employees, such as logging out during working hours and idling. Some applications will help in assigning employees tasks at given times and providing deadlines. The application will automatically notify the employee when the time draws for the set activity.
The applications are also applied in setting goals for employees working in remote workplaces. For example, some applications use time tracking features, costs, and budget allocations of certain projects to estimate the progress. The employer can use the results to decide employee working hours and costs against their output to avoid incurring losses.
Employee monitoring software recognizes also reports the times the employee stays away from using the keyboard. This time the employee stays without using the keyboard as idle time, classified as unproductive. The employee's activities are gauged using the amount of time the keyboard inputs and the movement of the mouse. The computer automatically calculates the amount of time the employee uses their computer switches to idle time whenever they stop for some time, depending on the organizational policies and procedures.
Remote desktop control is another method employers use to control the activities of their employees on computers. The employer will keep watch of what their employees are doing on their computers in real-time and close certain sites and undesirable activities. The same also applies to fix certain computer problems remotely. These remote applications are commonly used by technicians when installing certain programs on computers.
There are different employee surveillance software. The best software will provide optimum security for passwords and data. Good surveillance software will also provide useful information to the employer, which will help decision-making processes. Employers will seek the help of service providers such as Geek Computers to get customized surveillance software that is more suited for their needs.
If you are working from home, your employer is most likely to watch what you are doing. Studies show that 66% of companies in the United States monitor their employee's internet, with 44% of these logging their keystrokes and 43% tracking employee emails. You, therefore, need to maintain the safety of personal information by using separate devices for work and personal activities. These include social media, private emails, and the storage of personal documents. You should also make use of strong passwords if you are using your personal computer for work activities.
Employers are allowed to use employee surveillance software to safeguard against abuse of property and losses. They do so by using surveillance software that monitors and provides data on the employee log-in times, activities, and the amount of time they spend on unauthorized activities. The same software bar employees from accessing certain sites and sharing information deemed high security to the organization. While it might not work in favor of the employee, employers with employees working from home would have difficulty achieving targets without monitoring their employee computers.
TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THE GEEK COMPUTER ENTITIES SHALL NOT BE LIABLE FOR ANY INDIRECT, INCIDENTAL, SPECIAL, CONSEQUENTIAL OR PUNITIVE DAMAGES, OR ANY LOSS OF PROFITS OR REVENUES, WHETHER INCURRED DIRECTLY OR INDIRECTLY, OR ANY LOSS OF DATA, USE, GOODWILL, OR OTHER INTANGIBLE LOSSES, RESULTING FROM (i) YOUR ACCESS TO OR USE OF OR INABILTY TO ACCESS OR USE THE SITE; (ii) ANY CONDUCT OR CONTENT OF ANY THIRD PARTY ON THE SITE, INCLUDING WITHOUT LIMITATION, ANY DEFAMATORY, OFFENSIVE OR ILLEGAL CONDUCT OF OTHER USERS OR THIRD PARTIES; (iii) ANY CONTENT OBTAINED FROM THE SITE; OR (iv) UNAUTHORIZED ACCESS, USE OR ALTERATION OF YOUR TRANSMISSIONS OR CONTENT. IN NO EVENT SHALL THE AGGRESGATE LIABILITY OF THE GEEK COMPUTER ENTITIES EXCEED THE GREATER OF ONE HUNDRED U.S. DOLLARS (U.S. $100.00) OR THE AMOUNT YOU PAID GEEK COMPUTER, IF ANY, IN THE PAST SIX MONTHS FOR THE SITE GIVING RISE TO THE CLAIM. THE LIMITATIONS OF THE SUBSECTION SHALL APPLY TO ANY THEORY OF LIABILITY, WETHER BASED ON WARRANTY, CONTRACT, STATUTE, TORT (INCLUDING NEGLIGENCE) OR OTHERWISE, AND WHETHER OR NOT THE GEEK COMPUTER ENTITIES HAVE BEEN INFORMED OF THE POSSIBILITY OF ANY SUCH DAMAGE, AND EVEN IF A REMEDY SET FORTH HEREIN IS FOUND TO HAVE FAILED OF ITS ESSENTIAL PURPOSE.