Internet, E-Mail, IM & Blogging
When it comes to workplace computer use, employers are primarily concerned about inappropriate Web surfing, with 76% monitoring workers' Website connections. Fully 65% of companies use software to block connections to inappropriate Websites--a 27% increase since 2001 when AMA and ePolicy Institute last surveyed electronic monitoring and surveillance policies and procedures in the workplace.
Employers are doing a good job of notifying employees when they are being watched. Of those organizations that engage in monitoring and surveillance activities, fully 80% inform workers that the company is monitoring content, keystrokes and time spent at the keyboard; 82% let employees know the company stores and reviews computer files; 86% alert employees to e-mail monitoring; and 89% notify employees that their Web usage is being tracked.
"Concern over litigation and the role electronic evidence plays in lawsuits and regulatory investigations has spurred more employers to implement electronic technology policies," said Nancy Flynn, executive director of The ePolicy Institute and author of E-Mail Rules (AMACOM 2003), Instant Messaging Rules (AMACOM 2004) and other books related to workplace computer use. Employers have established policies governing personal e-mail use (84%); personal Internet use (81%); personal instant messenger (IM) use (42%); operation of personal Web sites on company time (34%); personal postings on corporate blogs (23%); and operation of personal blogs on company time (20%).
Global Satellite Positioning & Emerging Surveillance Technology
Employers have been slow to adopt emerging monitoring and surveillance technologies to help track employee productivity and movement. Employers who use Assisted Global Positioning or Global Positioning Systems satellite technology are in the minority, with only 5% using GPS to monitor cell phones; 8% using GPS to track company vehicles; and 8% using GSP to monitor employee ID/smartcards.
The majority (53%) of companies employ smartcard technology to control physical security and access to buildings and data centers. Trailing far behind is the use of technology that enables fingerprint scans (5%), facial recognition (2%), and iris scans (0.5%).
CM