Knowledge (XXG)

Employee monitoring

Source 📝

418:. It held that a sales engineer had a 'reasonable expectation of privacy' against personal messages being read (including those to his fiance and his brother), even though he was told not to use a workplace Yahoo messenger for personal reasons, because "an employer’s instructions cannot reduce private social life in the workplace to zero. Respect for private life and for the privacy of correspondence continues to exist, even if these may be restricted in so far as necessary". It follows that there is a 1546: 36: 253:, or keystroke logging, is a process that records a user's typing. Key logging software may also capture screenshots when triggered by predefined keywords. Some see it as violating workplace privacy and it is notorious for being used with malicious intent. Loggers can collect and store passwords, bank account information, private messages, credit card numbers, PIN numbers, and usernames. 483:. Such inaccuracies can cause disputes between a company and a client which could eventually lead to the client terminating its business with the company. This sort of termination will not only hurt the company's revenue stream but also its reputation with other clients or potential clients. The suggested solution to this problem is a 436:
Employee monitoring software developers warn that in each case it is still recommended to advise a legal representative and the employees should give a written agreement with such monitoring Majority of instances are a case by case situation and is hard to treat all the issues and problems as one. As
338:
that employees may have concerning their use of company email and other communications systems." Businesses makes employee monitoring a known tool that supervisors use to avoid any potential legal issues that may arise. They will announce this during new hire orientation, in a staff meeting, or even
236:
can be used for employees that move their place of work. Common examples of companies that use location monitoring are delivery and transportation industries. Sometimes the employee monitoring is incidental as the location is tracked for other purposes. Employees' phone calls can be recorded during
199:
can provide video feed of employee activities that are passed through to a central location where they are monitored by another person. These can be recorded and stored for future reference which some believe is the most accurate way to monitor employees. "This is a benefit because it provides an
304:
requires that the monitored conversations have a beep at certain intervals or there must be a message informing the caller that the conversations may be recorded. However, this does not inform the company representative which calls are being recorded. All employers must create a comprehensive
200:
unbiased method of performance evaluation and prevents the interference of a manager's feelings in an employee's review" (Mishra and Crampton, 1998). Management can review an employee's performance by checking the surveillance to detect and potentially prevent problems".
275:
that is not linked to their work. Monitoring in the workplace may put employers and employees at odds because both sides are trying to protect personal interests. Employees want to maintain their privacy while employers want to ensure company resources aren't
413:
issued a landmark ruling in the case of Bărbulescu v Romania (61496/08) regarding monitoring of employees’ computers. The employee Mr. Bărbulescu accused the employer of violating his rights to ‘private life’ and ‘correspondence’ set in the Article 8 of the
283:
With employee monitoring, there are many guidelines that one must follow and put in place to protect the company and the individual. Some following cases are ones that have shaped the certain rules and regulations that are in effect today. For instance, in
887: 478:
An indirect way that companies can be affected financially through employee monitoring is that they can be sure they are billing clients correctly. According to "Business 2 Community," inaccurately billing clients is always possible because of
186:
can be used to record employees' phone call details and conversations. These can be recorded during monitoring. The number of calls, the duration of each call, and the idle time between calls, can all go into a log for analysis by the company.
794: 280:. In any case, companies can maintain ethical monitoring policies by avoiding indiscriminate monitoring of employees' activities. The employee needs to understand what is expected of them while the employer needs to establish that rule. 333:
have laws relating to when a conversation can be recorded. "Lawyers generally advise that one way for businesses to avoid liability for monitoring employees’ online activities is to take all necessary steps to eliminate any
167:
A company can use its everyday electronic devices to monitor its employees almost continuously. Common methods include software monitoring, telephone tapping, video surveillance, email monitoring, and location monitoring.
465:. Most employers notify employees of anti-theft video surveillance (78%) and performance-related video monitoring (89%) (retrieved from the article The Latest on Workplace Monitoring and Surveillance). In an article in 174:. Companies often use employee monitoring software to track what their employees are doing on their computers. Tracking data may include typing speed, mistakes, applications used, and what specific keys are pressed. 212:
gives employers the ability to look at email messages sent or received by their employees. Emails can be viewed and recovered even if they had been previously deleted. In the United States, the
585: 729: 989: 1606: 767: 1033: 237:
monitoring. The number of calls, the duration of each call, and the idle time between calls, can all go into an automatic log for analysis by the company.
844: 632: 309:
that will include both mandatory and recommended policies. Handbooks must explain in detail what employees are permitted or not allowed to do in the
658:
Leijten, Mariëlle; Van Waes, Luuk (July 2013). "Keystroke Logging in Writing Research: Using Inputlog to Analyze and Visualize Writing Processes".
1053: 505: 217: 213: 1318: 53: 292:, such as reading an employee's emails, unless it can be shown that it is a necessary precaution and there are no other alternatives. In 982: 415: 437:
new laws have been enacted dictating the bounds of these practices, employers have been forced to change their monitoring protocols.
1570: 1263: 362:
to the New York civil rights law and applies to any private individual or entity with a place of business in the state of New York.
335: 224: 119: 100: 1555: 946: 72: 1565: 1068: 510: 471:, it has been argued that forbidding employers to track employees' on-the-job performance can make economic sense according to 446: 277: 975: 520: 410: 216:
provides some privacy protections regarding monitoring of employees' email messages and other electronic communications. See
57: 79: 1213: 1178: 550: 1338: 1183: 178: 1616: 1283: 1128: 86: 1268: 1208: 1138: 370:
Businesses use employee monitoring for various reasons. The follow is a list that includes, but is not limited to:
46: 1368: 1123: 1093: 450: 1438: 68: 1560: 1408: 1218: 245: 1358: 1343: 1233: 1058: 772: 768:"Electronic Monitoring of Employees in New York: New Restrictions and Requirements Will Take Effect in 2022" 297: 296:, everyone in the conversation must give consent before the conversation can be recorded (especially during 858: 1383: 1238: 1173: 1048: 636: 462: 144: 1596: 1413: 1328: 1303: 613: 579: 744: 339:
in a workplace contract that employees sign either at the time of hire or after a form of misconduct.
1448: 1228: 1203: 1153: 1098: 1043: 1023: 545: 394: 272: 241: 1575: 1393: 1258: 1133: 1113: 1083: 1018: 500: 430: 426: 902: 1611: 1433: 1423: 1418: 1388: 1348: 1288: 1088: 1038: 675: 540: 313:. Employers must update handbooks if employment laws or policies change. Other states, including 204: 93: 1298: 604:
Mishra, Jitendra M; Crampton, Suzanne (1998). "Employee monitoring: Privacy in the workplace?".
1428: 1363: 1323: 1308: 1253: 1198: 535: 515: 488: 306: 289: 268: 257: 191: 1601: 1313: 1243: 1163: 1158: 925: 917: 667: 525: 467: 343: 318: 152: 1499: 1398: 1273: 1148: 1118: 1103: 1078: 472: 390:
Check for violations of company policy against sending an offensive or pornographic email.
17: 1590: 1534: 1524: 1373: 1063: 679: 484: 378: 228: 148: 1514: 1504: 1484: 1403: 1248: 1223: 1028: 530: 458: 419: 322: 140: 136: 570:
Martin, Kirsten, and R. Edward Freeman. "Some problems with employee monitoring".
271:. Monitoring collects work-related activities, but it can also collect employee's 921: 1529: 1519: 1494: 1469: 1188: 1168: 1013: 617: 480: 314: 35: 1474: 816: 330: 301: 671: 159:. Among organizations, the extent and methods of employee monitoring differ. 1333: 1108: 1073: 999: 694: 475:
theory, while surveillance to prevent illegal activities should be allowed.
359: 351: 310: 888:"Training Solutions for Individuals, Organizations and Government Agencies" 1453: 1443: 1378: 1353: 1293: 454: 347: 326: 293: 967: 346:
will be required to provide prior notice for the monitoring of employee
1479: 1278: 930: 845:"Companies Can't Use Keyloggers to Spy on Employees, Says German Court" 730:"Supreme Court rules employees have right to privacy on work computers" 156: 1509: 1193: 872:
Yerby, Johnathan. "Legal and ethical issues of employee monitoring".
285: 143:
engage in employee monitoring for different reasons such as to track
374:
Find needed business information when the employee is not available.
151:, and to address other security concerns. This practice may impact 903:"Workplace surveillance, privacy protection, and efficiency wages" 355: 384:
Prevent or investigate possible criminal activities by employees.
971: 422:
to private communication, regardless of what an employer says.
1489: 29: 599: 597: 595: 449:, almost half (48%) of the American companies surveyed use 817:"CASE OF BĂRBULESCU v. ROMANIA (Application no. 61496/08)" 717:
Ethical Issues & Employer Monitoring Internet Usage
218:
Electronic Communications Privacy Act#Employee privacy
425:
A year later, in July 2017, German court ruled that
1543: 1462: 1006: 60:. Unsourced material may be challenged and removed. 745:"Legal and ethical issues of employee monitoring" 795:"Employee monitoring: Privacy in the workplace?" 695:"Employee monitoring: Privacy in the workplace?" 874:Online Journal of Applied Knowledge Management 749:Online Journal of Applied Knowledge Management 633:"GOV'T OBTAINS WIDE AP PHONE RECORDS IN PROBE" 267:Employee monitoring often is in conflict with 983: 8: 693:Mishra, J. M. & Crampton, S. M. (1998). 584:: CS1 maint: multiple names: authors list ( 387:Prevent personal use of employer facilities. 990: 976: 968: 487:software to monitor the number of hours a 429:of employees is reasonable but the use of 929: 120:Learn how and when to remove this message 945:Vessella, Victoria (October 12, 2015). 859:"How Companies Monitor Their Employees" 562: 147:, to avoid legal liability, to protect 577: 506:Computer surveillance in the workplace 1607:Ethically disputed working conditions 214:Electronic Communications Privacy Act 7: 381:of proprietary information and data. 155:due to its impact on the employee's 58:adding citations to reliable sources 947:"6 Benefits of Employee Monitoring" 766:Francis, Simone R.D. (2021-12-29). 416:European Convention on Human Rights 799:S.A.M. Advanced Management Journal 699:S.A.M. Advanced Management Journal 606:S.A.M. Advanced Management Journal 25: 342:On May 7, 2022, employers in the 336:reasonable expectation of privacy 225:Computer and network surveillance 27:Surveillance of workers' activity 1545: 1544: 453:to counter theft, violence, and 34: 511:Counterproductive work behavior 461:to track employees' on-the-job 447:American Management Association 45:needs additional citations for 843:Catalin Cimpanu (2017-05-08). 821:European Court of Human Rights 521:Occupational health psychology 411:European Court of Human Rights 1: 551:Workplace health surveillance 441:Financial costs of monitoring 922:10.1016/j.labeco.2004.06.001 901:Schmitz, Patrick W. (2005). 179:Employee monitoring software 1069:Counterproductive behaviour 400:Check for illegal software. 288:, it is illegal to perform 1633: 572:Journal of Business Ethics 393:Investigate complaints of 255: 239: 222: 202: 189: 176: 743:Yerby, Johnathan (2013). 491:spends with an employee. 358:usage. The new law is an 135:is the (often automated) 1571:Aspects of organizations 1219:Hostile work environment 672:10.1177/0741088313491692 246:Device tracking software 1556:Aspects of corporations 1344:Quality of working life 1034:Artificial intelligence 773:The National Law Review 1566:Aspects of occupations 139:of workers' activity. 18:Workplace surveillance 1304:Performance appraisal 1054:Computer surveillance 660:Written Communication 153:employee satisfaction 69:"Employee monitoring" 1449:Workplace harassment 1439:Work–family conflict 1154:Employee recognition 951:Business 2 Community 793:Mishra, Jitendra M. 546:Workplace incivility 457:. Only 7% use video 273:personal information 242:Geolocation software 163:Surveillance Methods 54:improve this article 1319:Positive psychology 1214:Health surveillance 1144:Employee monitoring 1139:Employee experience 1134:Employee engagement 1129:Employee assistance 1114:Effects of overtime 1019:Abusive supervision 501:Abusive supervision 431:keylogging software 427:computer monitoring 290:invasive monitoring 234:Location monitoring 172:Software monitoring 133:Employee monitoring 1617:Employee relations 1349:Queen bee syndrome 719:. Chron.com, 2010. 541:Workplace deviance 269:employees' privacy 205:Video surveillance 197:Video surveillance 1584: 1583: 1309:Personality clash 1254:Kiss up kick down 536:Workplace privacy 516:Mass surveillance 445:According to the 409:In January 2016, 344:state of New York 307:employee handbook 258:Keystroke logging 192:Telephone tapping 184:Telephone tapping 130: 129: 122: 104: 16:(Redirected from 1624: 1548: 1547: 1264:Machiavellianism 1209:Health promotion 1164:Employee surveys 1159:Employee silence 992: 985: 978: 969: 962: 961: 959: 957: 942: 936: 935: 933: 910:Labour Economics 907: 898: 892: 891: 884: 878: 877: 869: 863: 862: 855: 849: 848: 840: 834: 831: 825: 824: 813: 807: 806: 790: 784: 783: 781: 780: 763: 757: 756: 740: 734: 733: 726: 720: 713: 707: 706: 690: 684: 683: 655: 649: 648: 646: 644: 635:. Archived from 628: 622: 621: 601: 590: 589: 583: 575: 567: 526:Right to privacy 468:Labour Economics 451:video monitoring 300:). The state of 210:Email monitoring 125: 118: 114: 111: 105: 103: 62: 38: 30: 21: 1632: 1631: 1627: 1626: 1625: 1623: 1622: 1621: 1587: 1586: 1585: 1580: 1561:Aspects of jobs 1539: 1500:Labour movement 1458: 1399:Toxic workplace 1369:Robotics safety 1299:Parkinson's law 1289:Office politics 1274:Micromanagement 1149:Employee morale 1119:Emotional labor 1104:Divide and rule 1079:Culture of fear 1002: 996: 966: 965: 955: 953: 944: 943: 939: 905: 900: 899: 895: 886: 885: 881: 871: 870: 866: 857: 856: 852: 842: 841: 837: 832: 828: 815: 814: 810: 792: 791: 787: 778: 776: 765: 764: 760: 742: 741: 737: 728: 727: 723: 714: 710: 692: 691: 687: 657: 656: 652: 642: 640: 639:on May 14, 2013 631:SHERMAN, MARK. 630: 629: 625: 603: 602: 593: 576: 569: 568: 564: 559: 497: 473:efficiency wage 443: 407: 368: 298:telephone calls 265: 260: 248: 240:Main articles: 231: 223:Main articles: 207: 194: 181: 165: 126: 115: 109: 106: 63: 61: 51: 39: 28: 23: 22: 15: 12: 11: 5: 1630: 1628: 1620: 1619: 1614: 1609: 1604: 1599: 1589: 1588: 1582: 1581: 1579: 1578: 1573: 1568: 1563: 1558: 1552: 1550: 1541: 1540: 1538: 1537: 1532: 1527: 1522: 1517: 1512: 1507: 1502: 1497: 1492: 1487: 1482: 1477: 1472: 1466: 1464: 1460: 1459: 1457: 1456: 1451: 1446: 1441: 1436: 1431: 1426: 1421: 1416: 1411: 1406: 1401: 1396: 1391: 1386: 1381: 1376: 1371: 1366: 1361: 1356: 1351: 1346: 1341: 1336: 1331: 1326: 1321: 1316: 1311: 1306: 1301: 1296: 1291: 1286: 1281: 1276: 1271: 1266: 1261: 1256: 1251: 1246: 1241: 1236: 1231: 1226: 1221: 1216: 1211: 1206: 1201: 1196: 1191: 1186: 1181: 1176: 1171: 1166: 1161: 1156: 1151: 1146: 1141: 1136: 1131: 1126: 1121: 1116: 1111: 1106: 1101: 1096: 1094:Discrimination 1091: 1086: 1081: 1076: 1071: 1066: 1061: 1056: 1051: 1046: 1041: 1036: 1031: 1026: 1021: 1016: 1010: 1008: 1004: 1003: 997: 995: 994: 987: 980: 972: 964: 963: 937: 916:(6): 727–738. 893: 879: 864: 850: 835: 826: 808: 785: 758: 735: 721: 708: 685: 666:(3): 358–392. 650: 623: 591: 561: 560: 558: 555: 554: 553: 548: 543: 538: 533: 528: 523: 518: 513: 508: 503: 496: 493: 442: 439: 433:is excessive. 406: 403: 402: 401: 398: 391: 388: 385: 382: 375: 367: 364: 264: 261: 256:Main article: 203:Main article: 190:Main article: 177:Main article: 164: 161: 128: 127: 42: 40: 33: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1629: 1618: 1615: 1613: 1610: 1608: 1605: 1603: 1600: 1598: 1595: 1594: 1592: 1577: 1574: 1572: 1569: 1567: 1564: 1562: 1559: 1557: 1554: 1553: 1551: 1542: 1536: 1535:Whistleblower 1533: 1531: 1528: 1526: 1525:Strike action 1523: 1521: 1518: 1516: 1513: 1511: 1508: 1506: 1503: 1501: 1498: 1496: 1493: 1491: 1488: 1486: 1483: 1481: 1478: 1476: 1473: 1471: 1468: 1467: 1465: 1461: 1455: 1452: 1450: 1447: 1445: 1442: 1440: 1437: 1435: 1432: 1430: 1427: 1425: 1422: 1420: 1417: 1415: 1412: 1410: 1407: 1405: 1402: 1400: 1397: 1395: 1392: 1390: 1387: 1385: 1382: 1380: 1377: 1375: 1374:Role conflict 1372: 1370: 1367: 1365: 1362: 1360: 1359:Relationships 1357: 1355: 1352: 1350: 1347: 1345: 1342: 1340: 1337: 1335: 1332: 1330: 1327: 1325: 1322: 1320: 1317: 1315: 1312: 1310: 1307: 1305: 1302: 1300: 1297: 1295: 1292: 1290: 1287: 1285: 1282: 1280: 1277: 1275: 1272: 1270: 1267: 1265: 1262: 1260: 1257: 1255: 1252: 1250: 1247: 1245: 1242: 1240: 1237: 1235: 1232: 1230: 1227: 1225: 1222: 1220: 1217: 1215: 1212: 1210: 1207: 1205: 1202: 1200: 1197: 1195: 1192: 1190: 1187: 1185: 1182: 1180: 1177: 1175: 1172: 1170: 1167: 1165: 1162: 1160: 1157: 1155: 1152: 1150: 1147: 1145: 1142: 1140: 1137: 1135: 1132: 1130: 1127: 1125: 1122: 1120: 1117: 1115: 1112: 1110: 1107: 1105: 1102: 1100: 1097: 1095: 1092: 1090: 1087: 1085: 1082: 1080: 1077: 1075: 1072: 1070: 1067: 1065: 1064:Control freak 1062: 1060: 1057: 1055: 1052: 1050: 1047: 1045: 1042: 1040: 1037: 1035: 1032: 1030: 1027: 1025: 1022: 1020: 1017: 1015: 1012: 1011: 1009: 1005: 1001: 993: 988: 986: 981: 979: 974: 973: 970: 952: 948: 941: 938: 932: 927: 923: 919: 915: 911: 904: 897: 894: 889: 883: 880: 875: 868: 865: 861:. 2016-09-23. 860: 854: 851: 846: 839: 836: 830: 827: 823:. 2016-12-01. 822: 818: 812: 809: 804: 800: 796: 789: 786: 775: 774: 769: 762: 759: 754: 750: 746: 739: 736: 731: 725: 722: 718: 712: 709: 704: 700: 696: 689: 686: 681: 677: 673: 669: 665: 661: 654: 651: 638: 634: 627: 624: 619: 615: 611: 607: 600: 598: 596: 592: 587: 581: 573: 566: 563: 556: 552: 549: 547: 544: 542: 539: 537: 534: 532: 529: 527: 524: 522: 519: 517: 514: 512: 509: 507: 504: 502: 499: 498: 494: 492: 490: 486: 485:time tracking 482: 476: 474: 470: 469: 464: 460: 456: 452: 448: 440: 438: 434: 432: 428: 423: 421: 417: 412: 404: 399: 396: 392: 389: 386: 383: 380: 376: 373: 372: 371: 365: 363: 361: 357: 353: 349: 345: 340: 337: 332: 328: 324: 320: 316: 312: 308: 303: 299: 295: 291: 287: 281: 279: 274: 270: 262: 259: 254: 252: 247: 243: 238: 235: 230: 229:Email privacy 226: 221: 219: 215: 211: 206: 201: 198: 193: 188: 185: 180: 175: 173: 169: 162: 160: 158: 154: 150: 149:trade secrets 146: 142: 141:Organizations 138: 134: 124: 121: 113: 102: 99: 95: 92: 88: 85: 81: 78: 74: 71: –  70: 66: 65:Find sources: 59: 55: 49: 48: 43:This article 41: 37: 32: 31: 19: 1597:Surveillance 1515:Organization 1505:Labor rights 1485:Headquarters 1404:Toxic leader 1384:Spirituality 1249:Kick the cat 1239:Intervention 1179:Feminisation 1143: 1029:Anti-pattern 954:. Retrieved 950: 940: 913: 909: 896: 882: 873: 867: 853: 838: 829: 820: 811: 802: 798: 788: 777:. Retrieved 771: 761: 752: 748: 738: 724: 716: 711: 702: 698: 688: 663: 659: 653: 641:. Retrieved 637:the original 626: 609: 605: 580:cite journal 571: 565: 531:Surveillance 477: 466: 459:surveillance 444: 435: 424: 408: 405:Legal Issues 369: 341: 323:Pennsylvania 282: 266: 250: 249: 233: 232: 209: 208: 196: 195: 183: 182: 171: 170: 166: 137:surveillance 132: 131: 116: 107: 97: 90: 83: 76: 64: 52:Please help 47:verification 44: 1530:Trade union 1520:Remote work 1495:Job sharing 1470:Corporation 1419:Undermining 1339:Psychopathy 1189:Goofing off 1184:Generations 1169:Empowerment 1014:Absenteeism 998:Aspects of 931:10419/22931 755:(2): 44–55. 612:(3): 4–14. 481:human error 463:performance 420:human right 315:Connecticut 251:Key logging 145:performance 1591:Categories 1576:Employment 1475:Employment 1284:Narcissism 1234:Inequality 1229:Incivility 1204:Harassment 1174:Evaluation 1109:Drug tests 1024:Aggression 1000:workplaces 833:ECHR 754, 779:2021-12-30 715:Burks, F. 557:References 395:harassment 366:Legal Uses 331:New Jersey 302:California 80:newspapers 1612:Workplace 1549:Templates 1334:Profanity 1329:Probation 1269:Menopause 1259:Listening 1199:Happiness 1099:Diversity 1084:Democracy 1074:Coworking 680:145446935 618:231233456 360:amendment 352:telephone 311:workplace 110:June 2018 1463:See also 1454:Workwear 1444:Workload 1434:Wellness 1424:Violence 1414:Turnover 1409:Training 1389:Strategy 1379:Sabotage 1354:Rat race 1294:Overwork 1124:Emotions 1089:Deviance 1059:Conflict 1039:Bullying 956:March 3, 614:ProQuest 495:See also 455:sabotage 379:security 377:Protect 348:internet 327:Colorado 319:New York 294:Maryland 263:Legality 1602:Privacy 1480:Factory 1429:Virtual 1364:Revenge 1324:Privacy 1279:Mobbing 1049:Culture 1044:Climate 705:(3): 4. 643:May 13, 278:misused 157:privacy 94:scholar 1510:Office 1394:Stress 1314:Phobia 1244:Jargon 1194:Gossip 1007:Topics 678:  616:  489:client 286:Canada 96:  89:  82:  75:  67:  1224:Humor 906:(PDF) 676:S2CID 356:email 101:JSTOR 87:books 958:2020 645:2013 586:link 329:and 244:and 227:and 73:news 1490:Job 926:hdl 918:doi 668:doi 354:or 56:by 1593:: 949:. 924:. 914:12 912:. 908:. 819:. 803:63 801:. 797:. 770:. 751:. 747:. 703:63 701:. 697:. 674:. 664:30 662:. 610:63 608:. 594:^ 582:}} 578:{{ 350:, 325:, 321:, 317:, 220:. 991:e 984:t 977:v 960:. 934:. 928:: 920:: 890:. 876:. 847:. 805:. 782:. 753:1 732:. 682:. 670:: 647:. 620:. 588:) 574:. 397:. 123:) 117:( 112:) 108:( 98:· 91:· 84:· 77:· 50:. 20:)

Index

Workplace surveillance

verification
improve this article
adding citations to reliable sources
"Employee monitoring"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
surveillance
Organizations
performance
trade secrets
employee satisfaction
privacy
Employee monitoring software
Telephone tapping
Video surveillance
Electronic Communications Privacy Act
Electronic Communications Privacy Act#Employee privacy
Computer and network surveillance
Email privacy
Geolocation software
Device tracking software
Keystroke logging
employees' privacy
personal information

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.