Strict rules to control staff email monitoring

Strict rules to control staff email monitoring

Covert monitoring of staff email and internet should only be used with police involvement and if criminal activity has been identified, according to the Information Commissioner's code on employee monitoring.

The eagerly awaited Code will be published later this month, but a draft of the employer’s guide to work place monitoring has been released to VNU Net News.

Covert monitoring ‘should not be used to obtain information about workers, and that where it is to be used the police should be involved,’ it says.

Employers should only use covert monitoring ‘if specific criminal activity has been identified and a documented assessment has been made concluding that notifying workers of monitoring would prejudice an investigation,’ it continues.

The Information Commissioner says the aim of the Code is to ‘strike a balance between a worker’s legitimate right to respect for his or her private life and an employer’s legitimate need to run its business.’

The Commissioner’s guidelines advise that workers should be made aware of any monitoring and the purpose behind it.

When monitoring email, employers should ‘display a set of conditions concerning email and internet access which workers must accept before being allowed online,’ says the guide.

The Code also says that workers who have their email inboxes checked while absent should be made aware of the fact. Furthermore workers should be informed of the extent to which information about their internet access and emails is retained in the system and for how long the information is retained.

Many employers fear the Code effectively bans them from monitoring emails and internet use in the office, but Iain Bourne, strategic policy manager from the Office of the Information Commissioner, said this is not the case.

‘It is an over-simplification to say the Code bans the interception of email, but there are certain hoops an employer must go through before they can do so legally. For example, it must be a proportionate response to any threat posed.’

Roderick Armitage, head of company affairs at the Confederation of British Industry, said there is a danger that many businesses will ban personal usage of email at work in response to the Code’s stringent conditions.

‘In a lot of industries such as financial services, security requirements of employers mean they have a legitimate need to know what is going on in business communications. The end result may be workers can’t use the business network for personal use.’

Share

Subscribe to get your daily business insights

Resources & Whitepapers

The importance of UX in accounts payable: Often overlooked, always essential
AP

The importance of UX in accounts payable: Often overlooked, always essentia...

1m Kloo

The importance of UX in accounts payable: Often ov...

Embracing user-friendly AP systems can turn the tide, streamlining workflows, enhancing compliance, and opening doors to early payment discounts. Read...

View article
The power of customisation in accounting systems
Accounting Software

The power of customisation in accounting systems

2m Kloo

The power of customisation in accounting systems

Organisations can enhance their financial operations' efficiency, accuracy, and responsiveness by adopting platforms that offer them self-service cust...

View article
Turn Accounts Payable into a value-engine
Accounting Firms

Turn Accounts Payable into a value-engine

3y Accountancy Age

Turn Accounts Payable into a value-engine

In a world of instant results and automated workloads, the potential for AP to drive insights and transform results is enormous. But, if you’re still ...

View resource
8 Key metrics to measure to optimise accounts payable efficiency
AP

8 Key metrics to measure to optimise accounts payable efficiency

2m Kloo

8 Key metrics to measure to optimise accounts paya...

Discover how AP dashboards can transform your business by enhancing efficiency and accuracy in tracking key metrics, as revealed by the latest insight...

View article