The Pros And Cons Of Employer Monitoring

893 Words2 Pages

Employer monitoring of workplace computers is widespread but we are still finding what the legal limitations are for work-from-home employees and individuals who live on site. The monitoring of employee’s internet usage in the workplace is an unchallenged right of employers (Grodinsky, Gumbus, & Lilly, 2010). Monitoring is used to gauge employee productivity and provide feedback on how employees can work more effectively. This also allows employers to monitor the personal use of company owned computers. The estimated cost of 53 million employee’s cyber loafing is $138 billion (Grodinsky, Gumbus, & Lilly, 2010) . The legal ramifications of employee monitoring also include the loss of privacy when it comes to Personally Identifiable Information …show more content…

The Privacy Act helps protect identifiable information about employees that is not related to work such as race, religion, opinions, and personal beliefs. If an employer were to come across this information while monitoring an employee they would be in breach of the Privacy Act of 1988 . This brings up several legal ramifications and opens employers to lawsuits based on discrimination even if the employer was not attempting to discriminate. By monitoring employees internet usage employers will undoubtedly come across PII in the forms of email and personal web history but it is up to them to make sure the information stays secure. Employers who are found to not be in compliance with the Privacy Act of 1988 are subject to penalties and …show more content…

With the correct personal information an individuals can obtain access to others credit scores, bank accounts, email accounts, and various other information that would allow them steal an identity. The keys to preventing identity are to keep all personal information confidential, from credit card numbers to social security number, and to monitor all accounts, from banking to credit scores, for any unusual activity . Any unusual activity should immediately be reported to stop identity thieves from doing more damage.
In 2013, 13.1 million people were fraud victims (Collins-Taylor, 2014). The number of victims of identity theft has increased by 500,000 consumers in the last year yet the actual amount of money stolen has dropped from an all-time high in 2004 of $48 billion to $18 billion in 2003. When identity thieves do successful steal an identity they are three times as likely to use the stolen information to purchase gift cards (Collins-Taylor, 2014), this will allow the thieves to secure more money that is less traceable from individuals than if they were to attempt to open a credit

Open Document