workplace efficiency and compliance with Impero



Similar documents
Derbyshire Constabulary GUIDANCE ON THE SAFE USE OF THE INTERNET AND SOCIAL MEDIA BY POLICE OFFICERS AND POLICE STAFF POLICY REFERENCE 09/268

Legal Risks Associated With and Internet Use and Abuse by Employees

Top tips for improved network security

Social Networking Protocol for Schools Managed Staff

STFC Monitoring and Interception policy for Information & Communications Technology Systems and Services

Development / Monitoring / Review of this Policy. Schedule for Development / Monitoring / Review

Internet & Technology Usage in the Networked Workplace: Legal Implications

2.0 Emended due to the change to academy status Review Date. ICT Network Security Policy Berwick Academy

Monitoring Employee Communications: Data Protection and Privacy Issues

ITU Computer Network, Internet Access & policy ( Network Access Policy )

Dene Community School of Technology Staff Acceptable Use Policy

Information Services. Regulations for the Use of Information Technology (IT) Facilities at the University of Kent

PS 172 Protective Monitoring Policy

Information Technology and Communications Policy

ICT POLICY AND PROCEDURE

SURVEILLANCE AND PRIVACY

ANTI-FRAUD POLICY Adopted August 13, 2015

In some cases, whistleblowers may bring a case before an employment tribunal, which can award compensation.

Acceptable Use of Information Technology Policy

INTERNET, USE AND

Disciplinary and Performance Management Policy & Procedure October 2010

IT1. Acceptable Use of Information Technology Resources. Policies and Procedures

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

Cisco Security Image Analysis: Protecting the Network from Explicit Images

SOUTH DOWNS INTRODUCTIONS LTD ACCEPTABLE USE POLICY INCORPORATING WEBSITE TERMS AND CONDITIONS

Social Media in the Workplace

Conditions of Use. Communications and IT Facilities

INTERNET, AND COMPUTER USE POLICY.

Using Public Computer Services in Somerset Libraries

Recommendations. That the Cabinet approve the withdrawal of the existing policy and its replacement with the revised document.

Policy on Public and School Bus Closed Circuit Television Systems (CCTV)

NEW STATUTORY DISMISSAL, DISCIPLINARY AND GRIEVANCE PROCEDURES

ICT Student Usage Policy

EASTNOR PAROCHIAL PRIMARY SCHOOL STAFF SOCIAL NETWORKING POLICY. Inspire and Achieve

E- Safety and Digital Photography - College ICT

Information Governance Framework. June 2015

Social Media In the Workplace

Employment Law Guide

SOCIAL MEDIA POLICY. Introduction

Social Networking Policy

DISCIPLINARY PROCEDURE

Policies & Procedures. Moat Community College E-Safety Policy

TRUST POLICY AND PROCEDURES FOR THE USE OF SOCIAL NETWORKING SITES (INCLUDING ACCESS VIA MOBILE DEVICES) Status: Final. Version Date Author Reason

Acceptable Use of ICT Policy For Staff

DIRECTORS & OFFICERS LIABILITY

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :

EMPLOYER S DUTY TO MONITOR WEBSITE USE

COMPUTER USAGE -

The Bishop s Stortford High School Internet Use and Data Security Policy

This policy applies equally to all full time and part time employees on a permanent or fixed-term contract.

UNIVERSITY OF ST ANDREWS. POLICY November 2005

Internet Use Policy and Code of Conduct

HUMAN RESOURCES POLICIES & PROCEDURES

Quick guide to the employment practices code

Letter from the Chief Executive Officer and Chairman and the Group Medical Director

The Wellcome Trust Sanger Institute IT Acceptable Use Policy (AUP) Version 1.8

WEST MIDLANDS POLICE Force Policy Document

[Example] Social Media Acceptable Use Policy

Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy

How To Behave At The Britain Council

AVON OLD FARMS SCHOOL COMPUTER AND NETWORK ACCEPTABLE USE POLICY

Dundalk Institute of Technology. Acceptable Usage Policy. Version 1.0.1

Use of Social Networking Websites Policy. Joint Management Trade Union Committee. ENDORSED BY: Consultative Committee DATE: 14 February 2013

Berwick Academy Policy on E Safety

Group Policy 1. INTRODUCTION 2. BUSINESS INTEGRITY Honesty, Integrity & Fairness

Rules for the use of the IT facilities. Effective August 2015 Present

Roles and Responsibilities The following section outlines the e-safety roles and responsibilities of individuals and groups within Heath Farm School:

UNIVERSITY OF MALTA. Sexual Harassment Policy

Fraud and Abuse Policy

Technology Department 1350 Main Street Cambria, CA 93428

Transcription:

white paper: employee monitoring workplace efficiency and compliance with Impero task Keep employees on task whilst ensuring compliance with acceptable use policies solution Deploy a granular monitoring solution from impero to reduce risks and gain a return on investment Employers must address the reputational and financial risks of staff misconduct, keep their employees on task and adopt measures to counter misuse and increasingly sophisticated fraud In this white paper, we take a look into the legal, cultural and practical issues surrounding employee monitoring, and explore why its adoption is increasing in organisations of all shapes and sizes. Richard Smeeton BSc(Hons) CEng CITP MBCS: September 2012

the landscape Impero Monitoring is seamless and enables a granular policy to be implemented. These tools allow you to respect individuals privacy, comply with the law, and follow best practice guidelines. why is employee monitoring such a hot topic? The online conduct of employees is increasingly used in both hiring and firing decisions. Companies not only look to IT to investigate workplace misuse, but now commonly review job applicants social networking sites or personal blogs as part of the selection process and a personal profile may now result in being selected or rejected for a job on the basis of content posted. As new generations of employees grow up with Google, and surf their way into work, the distinction between work life and personal life has never been more blurred. Indeed many organisations encourage workers to be switched on; embracing social media to engage with customers and encouraging flexible practices such as working from home and bring your own device (BYOD). Yet these common practices whilst promoting creativity and efficient working also increase the risks of abuse and IT is being called in to proactively enforce acceptable use. To be effective, employee monitoring has to be part of a wider organisational policy that demonstrates an employer s commitment to fairness and doing things right. Some organizations rely on their employees to do the right thing. They feel that monitoring employees betrays trust and is an invasion of privacy, and in some countries it is an invasion of privacy. The approach may vary from company to company and from country to country (and different US states may have alternative laws), but it is always best practice that an acceptable use agreement is included in the employee s terms and conditions of contract, and that the employee understands their responsibilities and what is monitored and why. Under the Lawful Business Monitoring Regulations, this is a legal requirement in the UK. Accordingly, the chosen approach should reflect the local legal frameworks and union / works council agreements as well as IT policy best practice. employer reputation and legal liability It was back in 2000 but many still remember the case of a lewd e-mail sent to a Norton Rose lawyer from his girlfriend, which was forwarded to a few colleagues and ended up being circulated worldwide. Yet employees still use emails inappropriately, and employers may not all have the clear policies needed to enforce acceptable use. In a more recent case, a London City banker hit the headlines after an email he sent to colleagues about his private life quickly circulated and cost him his job. Just as employees are not expected to make costly business phone calls on their own phone bill, neither do corporations want to pay for your calls to your cousins in Australia or personal data roaming while on holiday. But the distinction between personal and business use of the Internet is often not as clear. Appropriate utilisation of the web is an area that cannot be ignored. However, as even leading companies have found to their cost, for the majority of cases the offensive material being viewed or forwarded on is pornographic. The employer who doesn t deal with this issue may be at risk of facing constructive dismissal, sex discrimination claims or even criminal prosecution. In the case of Morse v Future Reality E.T. Case No. 54571/95 it was held that the downloading and viewing of sexually explicit images in the workplace by male workers did constitute sexual harassment if it makes the working environment uncomfortable for a female co-worker. It s worth remembering that compensation for sex discrimination is not capped. All Internet content your employees read, send and receive carries a risk! Impero not only captures screen shots of actual use, but also provides a Web Filter and USB device management, providing the tools you need to implement and enforce your own Acceptable Use Policy. Impero gives you a completely consolidated solution for comprehensive protection against harmful and inappropriate Internet content risks.

right to privacy at work? The Human Rights Act 1998 came into force in October 2000 and implemented in the UK the European Convention on Human Rights (the Convention). The potential consequences for employers were clear from the decision of the European Court of Human Rights in the case of Halford v United Kingdom 1997 IRLR 471. Alison Halford, a senior police officer, alleged that her employer had tapped her private work telephone. She successfully claimed that this was a breach of her right to privacy under Article 8 of the Convention. It was held that as her employer had not given her any prior warning that her telephone calls were liable to interception, she would have had a reasonable expectation of privacy for calls made on the private facility her office provided. The fact that the calls were made from the workplace did not mean that her right to privacy did not apply. It follows that the same principles will apply to e-mail communications and Internet use as to telephone calls. digital native employers Just as we are now seeing the emergence of a new generation of employees; the digital native, employers are also embracing the best of the Web. Constantly looking for new ways to attract and retain the best people and increase overall productivity, successful businesses also thrive on improving customer engagement models and processes that give them a competitive advantage over the competition. Allowing employees who have grown up with virtual lifestyles to maintain a creative and flexible approach to work, whilst ensuring clear lines of acceptable use is key. Results include easier and faster recruitment of high quality new hires, higher efficiency and improved talent retention within the organisation. acceptable use policy The risks that an employer will face if they do not put into place such a policy can be seen from the decision in the case of Dunn v IBM United Kingdom Ltd E.T. Case Number 2305087/97. Here the employee was summarily dismissed for accessing pornography on the Internet. The tribunal upheld the claim for unfair dismissal as it was not a case where there was a clear breach of company policy such as to automatically warrant summary dismissal. The uncertainty that an employer faces with such an unfair dismissal claim can be avoided with a policy that complies with the following minimum requirements: Is in writing Is clearly communicated to all employees Sets out permissible uses of both e-mail and Internet Specifies the prohibited/inappropriate uses States what monitoring, if any, will take place Sets out acceptable on-line behaviour Stipulates unauthorised access areas Set privacy rules in relation to other users Sets out privacy rules in relation to employer s right to monitor Stipulates possible disciplinary consequences for breach of rules

best practice considerations Before you begin employee monitoring, keep the following in mind: Have a formal policy. This should be in writing that spells out what employees are and are not allowed to say or do via e-mail and on the Internet, including blogs and social networks that they use inside and outside work. Explain the rationale. Ensure this leaves staff in no doubt that what employees say electronically can expose the company to legal and reputational risk. State exactly what s being monitored. Be specific about what will be monitored give examples, and explain how monitoring will be undertaken. It is also important to clearly set out the consequences of breaching the policy. Educate and remind employees. As well as ensuring new staff read and understand the policy, have an ongoing training and awareness program to educate and remind all employees. Establish clear procedures to follow when violations occur. Procedures should identify who is responsible for reporting any breach and who will investigate. Include instructions how to document and preserve evidence, and who will confront the violator. Refer to your disciplinary policies and if these need review, liaise with HR. Guidance should also be provided to ensure investigators are protected both emotionally and legally when dealing with more serious cases. Consider BYOD and Remote Access. Allowing the business use of personal devices necessitates a review of your acceptable use policy. In many cases an AUP can explicitly prohibit use of employee-owned devices, and so these clauses will need careful review when allowing this. Keep employees on task Once an employee is aware that every website and application accessed is logged, this will deter the majority of inappropriate personal use. A package that can identify key words and alert in real time can achieve specific policy objectives, such as actively preventing staff from carrying out job searches using their current employer s time and resources. Home working and personal use. Employees have a duty to respect their employees privacy, and should not record personal use of the devices outside of work. With the Impero solution, this is simply addressed by off-line mode of the client which maintains the policies on the device with capturing and logging disabled. Typically used in conjunction with a VPN, the Impero client automatically provides logging and recording as soon as a work connection is established. Involve IT, Legal and HR teams in developing and enforcing the policy. Legal considerations, in particular, should guide on the handling of electronic evidence related to any potential criminal or civil charges. (If your company does not have an in-house legal team, appoint an outside employment lawyer to advise you).

good cop bad cop Organisations should ensure that IT teams are being monitored, too. Typically, IT staff have higher levels of access and any compromise carries a potentially higher level of impact. IT staff should therefore not be surprised to learn that someone is watching them too. Even police forces are not immune from staff misconduct, and a number are looking to Impero solutions to help maintain professional standards when it comes to the use of IT. Shocking figures recently came to light following a BBC Freedom of Information request about the misuse of police computers within Derbyshire, Nottinghamshire and Leicestershire forces. It emerged that in the past 3 years, there were 28 such cases in Derbyshire, 32 in Nottinghamshire whilst Leicestershire had 59. Across the three forces, 11 employees had been dismissed as a result of abuses and 19 staff had resigned either during or after being investigated. One case even involved an Inspector downloading pornography using his work computer. The Information Commissioner s Office said: We expect police forces to make substantial proactive efforts to check that any access to their records is for legitimate police purposes and to take action where they discover wrongdoing. securing evidence Best practice in securing digital forensics requires electronic evidence to be properly preserved. To be admissible in a UK court, information taken from a PC or laptop normally requires the hard drive to be removed and cloned, and then the clone examined leaving the original evidence untouched. IT staff may be tempted to skip the cloning step and examine the hard drive directly, and managers may take the view that it s highly unlikely that they would ever wish to bring a prosecution due to the adverse publicity this might generate. However, IT need to advise the business owner on the evidential requirements and consequence of a practice that could make their findings inadmissible. That s why Legal and HR advisors should be involved in formulation of the policy and process of monitoring activity. Impero software seamlessly creates a separate thumbnail audit trail, which works like a virtual video recorder and provides reliable evidence without the need to clone hard drives. Without such evidence, delinquents may never be caught and in serious cases fraud and crime may continue. Impero not only provides monitoring and alerting, but also delivers the irrefutable evidence needed to enable successful formal investigations.

strategic partner and solution Together with a comprehensive policy accompanied by an education programme for users, the right strategic partner and an efficient solution is needed to effortlessly implement a monitoring programme. The IT department must of course ensure that employees are not prevented from proper access to all business related content, so a solution that can provide white listing as well as filtering and logging is essential. Traditional tools available for misconduct investigations are retrospective and reactive these include email logs, DHCP and web proxy servers, or subscription-based appliances that only filter and log web traffic. For a typical investigation, an IT administrator may have to trawl through gigabytes of log data on multiple different platforms. Few solutions do the job more effectively than Impero s integrated suite a comprehensive tool kit that can be deployed to pre-emptively support an acceptable use policy, and where necessary provide the evidence of inappropriate activity. Using Impero, IT staff can ensure the appropriate security profiles are in force. Consistent policies can be applied to both physical and virtual desktops, for example to prohibit saving data on local storage therefore extending security to employee-owned devices. Applications can be deployed automatically and transparently with remote assistance or, whilst an encryption policy for all corporate data created through IT delivered applications can be applied (without touching employees personal applications and data). Impero logs every website and application accessed by device users. Impero provides evidence such as a screenshot and/or a full frame recording of the user s desktop. Alerts and blocking can be based on a granular policy for different groups of workers. Even more powerful is that upon detection of access to a specific resource or key word, Impero can instantly alert via an email. Where other point solutions typically only offer a single feature such as logging or internet restriction, Impero provides an integrated suite that proactively aids support. These allow IT to provide remote control, manage software licences and make more efficient use of print and power. Power management alone often provides a payback in under 12 months. So why not let Impero consolidate and simplify the job of managing your complex and distributed network, as well as providing the ability to monitor the efficient and productive use of your business assets? The Impero staff and management team have always shown a great passion to work with us and enhance their product to meet future requirements. Nick Bond, Services BSF Director, Capita IT Services, UK