LEGALITY OF MONITORING EMPLOYEES

IF YOU ARE USING CYCLOPE

WE RECOMMEND

To inform your employees the following:

  • Your company owns the entire IT infrastructure (both hardware, software and communication), as well as the intellectual property of all business data, in any form – and it has the right to access, secure and protect these data and assets.
  • Privacy at work is limited – meaning that employees can have limited expectation to privacy, within the work environment. Also, the usage of company resources (cars, fixed / mobile phones, Internet connections, fax, printers, computers) can be monitored or supervised to determine operating parameters, optimize them or detect abuse.
  • There is an acceptable use policy (AUP) that explains how company resources can be used and whether they can be used for personal purposes. If you do not have such a policy, we recommend you to define one.
  • There are restrictions on using certain applications, communication protocols or equipment inside the company. Again, if you do not have such a policy, we recommend that you to define one.
label

There could be consequences if employees are using the company’s resources in a way that violates the company’s policies. A short list of examples could be: using the company’s mobile phone for personal calls, using the company car outside working hours, listing personal documents or accessing / using web sites or forbidden applications (example: downloading of torrents or copyrighted materials on the company’s computers).