SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
PIB Insurance Brokers – Update
Risk Insights
Employee Internet Usage at Work
Employee Internet Usage at Work
For employees who spend their days
working on a computer, the internet is a
valuable, indispensable resource.
However, it can also create significant
liability issues for the company, not to
mention diminished productivity resulting
from personal business being conducted
on company computers. Therefore, it is
essential for employers to have clear,
specific internet usage policies that are
widely communicated and consistently
enforced.
Legal Liability
Through vicarious liability, employers
could be held responsible for the actions
or omissions of their employees.
Therefore, a company could legally be
held liable for any illegal or discriminatory
content that employees view or distribute
on those computers.
Discrimination and Harassment
Discrimination and sexual harassment can
result from an employee sending
inappropriate or offensive emails, or from
an employee viewing pornography, other
sexually explicit material, or content that
promotes hate and discrimination. Even if
the employee is not distributing such
inappropriate content, another employee
walking by could be offended and sue the
company for being subjected to a hostile
work environment.
Illegal Activity
Another legal liability for employers is any
computer activity that involves or leads to
illegal activity. This can include accessing
illegal information, participating in illegal
activities online or using information
found online to commit a crime. Even if
the employer was unaware of the
inappropriate or illegal computer activity,
it can be liable for negligent supervision
of employees. Any content stored on the
computer is in both the employee’s and
employer’s ‘possession’.
Misuse of Company Email
Another type of legal liability could result
from improper use of company email. For
example, if an employee sends personal
email from his or her company account or
uses his or her company email address to
identify themselves in a chat room or on
a website, then the company is liable for
any statements made or actions
performed. This could bring up issues of
defamation, discrimination or links to
illegal activity simply by the employee
misusing a company email account.
Technological Risks
Accessing unauthorised websites can also
pose risks to the company’s computer or
network. Just one click of the mouse can
expose a computer to a destructive virus
or allow a hacker access to sensitive
company information.
Drain on Productivity
Studies have revealed that employees
often spend large amounts of time
‘surfing’ the web or conducting personal
business on the computer during work
hours. While incidental personal use is
understandable, more than that can be a
significant drain on your resources by
paying employees who are not
consistently working.
Costs of Liability
There can be significant costs, financial
and otherwise, associated with claims of
computer or internet abuse by
employees. Legal actions and settlements
can be extremely costly to the company,
whether it is for discrimination,
harassment or illicit activity. In addition,
dismissing employees guilty of
misconduct can be expensive and time-
consuming, both in finding and training a
replacement, and in potential legal fees if
there is a legal dispute as a result.
The effect on other employees can be
substantial as well. If it is a case involving
discrimination or harassment, affected
employees can become disenfranchised
with the company itself, even if the
company did nothing wrong and had a
swift, appropriate response. Also, the
company can suffer from a damaged
reputation from the incident, and its
name may become linked in people’s
minds as associated with the incident.
Employee Computer Usage Policy
The first step for employers to protect the
company is to have a thorough, specific
and well-communicated Employee
Computer Usage Policy. Not only can such
a policy help prevent improper or illegal
computer activity by employees, it will
also go far to protect the company in the
event of an investigation or legal action.
The policy should emphasise that the
employees are using company property
and that there is no reasonable
expectation of privacy when working on
company equipment. This extends to all
websites visited and emails sent or
received. The policy should make clear
that the company ‘owns’ the employee’s
emails and that they can be viewed at any
time and/or used against the employee in
future legal proceedings.
It is also vital that the policy spell out
what the company deems as
inappropriate use: hate, discrimination,
harassment, child pornography, illegal
content, sexually illicit content, etc. In
addition, it should explain the
consequences for abusing computer
usage privileges or failure to follow any
portion of the policy.
Employee Education
In addition to crafting such a policy,
employees need to be fully aware of it.
Employers should ask all employees to
sign the policy, and then employees
should retain a copy so that they are
always aware of the policy and
consequences involved with violating it.
Education of the company policy
regarding computer use can not only
discourage misconduct, but also can
prevent accidental liability issues from
employees who didn’t realise that an
action was harmful or inappropriate.
Monitor Employee Activity
Having a computer usage policy is not
enough. The employer must also be
diligent in monitoring employee activity,
particularly if an individual is suspected of
misconduct. Employers should consider
implementing a filtering system in their
computer network that blocks harmful or
inappropriate websites based on
keywords identified by the company.
Let employees know about the filtering
system and that the company will be
periodically monitoring their computer
activities. This will act as an added
deterrent for inappropriate behaviour or
abuse.
For more information on this topic or for
assistance in creating an appropriate
Employee Computer Use policy, contact
PIB Insurance Brokers today.
Provided by PIB Insurance Brokers
The content of this Risk Insights is of general interest and is not intended to apply to specific circumstances. It
does not purport to be a comprehensive analysis of all matters relevant to its subject matter. The content should
not, therefore, be regarded as constituting legal advice and not be relied upon as such. In relation to any
particular problem which they may have, readers are advised to seek specific advice. Further, the law may have
changed since first publication and the reader is cautioned accordingly.
© 2009-2010, 2012-2013 Zywave, Inc. All rights reserved.

Weitere ähnliche Inhalte

Was ist angesagt?

Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workShankar Myadharaveni
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employersdsalmeida
 
Is employer monitoring of employee email justified
Is employer monitoring of employee email justifiedIs employer monitoring of employee email justified
Is employer monitoring of employee email justifiedParker Donat
 
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...Kelly Hart & Hallman LLP
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)Wissam Abdel Baki
 
Employees Privacy Issues And Legal Rights
Employees Privacy Issues And Legal RightsEmployees Privacy Issues And Legal Rights
Employees Privacy Issues And Legal RightsSaad Mazhar
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacyG&A Partners
 
USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationArmstrong Teasdale
 
Chapter 8 review
Chapter 8 reviewChapter 8 review
Chapter 8 reviewpejansen
 
Employment and Social Media: An Introduction to the Rules for Human Resource ...
Employment and Social Media: An Introduction to the Rules for Human Resource ...Employment and Social Media: An Introduction to the Rules for Human Resource ...
Employment and Social Media: An Introduction to the Rules for Human Resource ...Elizabeth Lewis
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)hassan777898
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy PresentationSarah Forbes
 
Internet usepolicy
Internet usepolicyInternet usepolicy
Internet usepolicyAnkit Juneja
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward F. T. Charfauros
 
Artifacts... that's the name of the game! avengercon - nov 2018
Artifacts... that's the name of the game!   avengercon - nov 2018Artifacts... that's the name of the game!   avengercon - nov 2018
Artifacts... that's the name of the game! avengercon - nov 2018Fernando Tomlinson, CISSP, MBA
 
e-Safety webinar - Nov 2013
e-Safety webinar - Nov 2013e-Safety webinar - Nov 2013
e-Safety webinar - Nov 2013Jisc Scotland
 

Was ist angesagt? (20)

Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_work
 
Liabilty
LiabiltyLiabilty
Liabilty
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employers
 
Workplace Privacy
Workplace PrivacyWorkplace Privacy
Workplace Privacy
 
Is employer monitoring of employee email justified
Is employer monitoring of employee email justifiedIs employer monitoring of employee email justified
Is employer monitoring of employee email justified
 
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
Employees Privacy Issues And Legal Rights
Employees Privacy Issues And Legal RightsEmployees Privacy Issues And Legal Rights
Employees Privacy Issues And Legal Rights
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacy
 
Workplace Privacy
Workplace PrivacyWorkplace Privacy
Workplace Privacy
 
USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities Presentation
 
Chapter 8 review
Chapter 8 reviewChapter 8 review
Chapter 8 review
 
Employment and Social Media: An Introduction to the Rules for Human Resource ...
Employment and Social Media: An Introduction to the Rules for Human Resource ...Employment and Social Media: An Introduction to the Rules for Human Resource ...
Employment and Social Media: An Introduction to the Rules for Human Resource ...
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy Presentation
 
Final powerpoint for social media club program
Final  powerpoint for social media club programFinal  powerpoint for social media club program
Final powerpoint for social media club program
 
Internet usepolicy
Internet usepolicyInternet usepolicy
Internet usepolicy
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
 
Artifacts... that's the name of the game! avengercon - nov 2018
Artifacts... that's the name of the game!   avengercon - nov 2018Artifacts... that's the name of the game!   avengercon - nov 2018
Artifacts... that's the name of the game! avengercon - nov 2018
 
e-Safety webinar - Nov 2013
e-Safety webinar - Nov 2013e-Safety webinar - Nov 2013
e-Safety webinar - Nov 2013
 

Ähnlich wie Risk Insight - Employee Internet Usage at Work

Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxsusanschei
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxhealdkathaleen
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Vijay Dalmia
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012PBeisty
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Human Resources & Payroll
 
TMI CYBER INSURANCE BROCHURE
TMI CYBER INSURANCE BROCHURETMI CYBER INSURANCE BROCHURE
TMI CYBER INSURANCE BROCHUREShan Budesha
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Members Presentation
Members PresentationMembers Presentation
Members PresentationAlex Pfeiffer
 
Social media policy
Social media policySocial media policy
Social media policySMBBGR
 
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docxM3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docxsmile790243
 
Creating a Dealership Social Media Policy With Teeth
Creating a Dealership Social Media Policy With TeethCreating a Dealership Social Media Policy With Teeth
Creating a Dealership Social Media Policy With TeethJim Radogna
 
Managing Social Media Risks for Municipalities (and More)
Managing Social Media Risks for Municipalities (and More)Managing Social Media Risks for Municipalities (and More)
Managing Social Media Risks for Municipalities (and More)Dan Michaluk
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
Social Media in the Workplace Linky Trott Ab.docx
Social Media in the Workplace Linky Trott     Ab.docxSocial Media in the Workplace Linky Trott     Ab.docx
Social Media in the Workplace Linky Trott Ab.docxwhitneyleman54422
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Common Mistakes to Avoid in Payroll Processing Services.pdf
Common Mistakes to Avoid in Payroll Processing Services.pdfCommon Mistakes to Avoid in Payroll Processing Services.pdf
Common Mistakes to Avoid in Payroll Processing Services.pdfpaysquare consultancy
 

Ähnlich wie Risk Insight - Employee Internet Usage at Work (20)

Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
Staff newsletter
Staff newsletterStaff newsletter
Staff newsletter
 
Social Media And The Workplace February 2012
Social Media And The Workplace   February 2012Social Media And The Workplace   February 2012
Social Media And The Workplace February 2012
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?
 
TMI CYBER INSURANCE BROCHURE
TMI CYBER INSURANCE BROCHURETMI CYBER INSURANCE BROCHURE
TMI CYBER INSURANCE BROCHURE
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Members Presentation
Members PresentationMembers Presentation
Members Presentation
 
Social media policy
Social media policySocial media policy
Social media policy
 
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docxM3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
M3 ASSIGNMENT 2M3 Assignment 2Iram BautistaB6120 Communic.docx
 
Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses Cyber Liabilty: A new exposure for businesses
Cyber Liabilty: A new exposure for businesses
 
Cyber liabilty
Cyber liabiltyCyber liabilty
Cyber liabilty
 
Radogna
RadognaRadogna
Radogna
 
Creating a Dealership Social Media Policy With Teeth
Creating a Dealership Social Media Policy With TeethCreating a Dealership Social Media Policy With Teeth
Creating a Dealership Social Media Policy With Teeth
 
Managing Social Media Risks for Municipalities (and More)
Managing Social Media Risks for Municipalities (and More)Managing Social Media Risks for Municipalities (and More)
Managing Social Media Risks for Municipalities (and More)
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
Social Media in the Workplace Linky Trott Ab.docx
Social Media in the Workplace Linky Trott     Ab.docxSocial Media in the Workplace Linky Trott     Ab.docx
Social Media in the Workplace Linky Trott Ab.docx
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Common Mistakes to Avoid in Payroll Processing Services.pdf
Common Mistakes to Avoid in Payroll Processing Services.pdfCommon Mistakes to Avoid in Payroll Processing Services.pdf
Common Mistakes to Avoid in Payroll Processing Services.pdf
 

Mehr von Gary Chambers

Cyber Security Breaches Survey 2018
Cyber Security Breaches Survey 2018Cyber Security Breaches Survey 2018
Cyber Security Breaches Survey 2018Gary Chambers
 
Millennially Minded - Future of Work
Millennially Minded - Future of WorkMillennially Minded - Future of Work
Millennially Minded - Future of WorkGary Chambers
 
Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018Gary Chambers
 
UK Employee Absence - Provided by Raconteur
UK Employee Absence - Provided by RaconteurUK Employee Absence - Provided by Raconteur
UK Employee Absence - Provided by RaconteurGary Chambers
 
The Wannacry Effect - Provided by Raconteur
The Wannacry Effect - Provided by RaconteurThe Wannacry Effect - Provided by Raconteur
The Wannacry Effect - Provided by RaconteurGary Chambers
 
Banned buzzwords by Raconteur
Banned buzzwords by RaconteurBanned buzzwords by Raconteur
Banned buzzwords by RaconteurGary Chambers
 
Benefits of Cyber Insurance
Benefits of Cyber InsuranceBenefits of Cyber Insurance
Benefits of Cyber InsuranceGary Chambers
 
Regulatory Update - Criminal finances Act
Regulatory Update - Criminal finances ActRegulatory Update - Criminal finances Act
Regulatory Update - Criminal finances ActGary Chambers
 
Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017Gary Chambers
 
12 steps to prepare for GDPR
12 steps to prepare for GDPR12 steps to prepare for GDPR
12 steps to prepare for GDPRGary Chambers
 
Energy Efficiency Insurance Brochure
Energy Efficiency Insurance BrochureEnergy Efficiency Insurance Brochure
Energy Efficiency Insurance BrochureGary Chambers
 
Employment Law - Criminal Record Checks
Employment Law - Criminal Record ChecksEmployment Law - Criminal Record Checks
Employment Law - Criminal Record ChecksGary Chambers
 
HSE Safety Cornerstones - August 2017
HSE Safety Cornerstones - August 2017HSE Safety Cornerstones - August 2017
HSE Safety Cornerstones - August 2017Gary Chambers
 
HSE Business Plan2017/18
HSE Business Plan2017/18HSE Business Plan2017/18
HSE Business Plan2017/18Gary Chambers
 
News brief - Spring Budget 2017 highlights
News brief - Spring Budget 2017 highlightsNews brief - Spring Budget 2017 highlights
News brief - Spring Budget 2017 highlightsGary Chambers
 
HR Brief - First Quarter
HR Brief - First QuarterHR Brief - First Quarter
HR Brief - First QuarterGary Chambers
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidanceGary Chambers
 
Cyber risks and liabilities February 2017
Cyber risks and liabilities February 2017Cyber risks and liabilities February 2017
Cyber risks and liabilities February 2017Gary Chambers
 
2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UKGary Chambers
 
Professional Indemnity
Professional IndemnityProfessional Indemnity
Professional IndemnityGary Chambers
 

Mehr von Gary Chambers (20)

Cyber Security Breaches Survey 2018
Cyber Security Breaches Survey 2018Cyber Security Breaches Survey 2018
Cyber Security Breaches Survey 2018
 
Millennially Minded - Future of Work
Millennially Minded - Future of WorkMillennially Minded - Future of Work
Millennially Minded - Future of Work
 
Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018Cyber Risks - Legal innovation 2018
Cyber Risks - Legal innovation 2018
 
UK Employee Absence - Provided by Raconteur
UK Employee Absence - Provided by RaconteurUK Employee Absence - Provided by Raconteur
UK Employee Absence - Provided by Raconteur
 
The Wannacry Effect - Provided by Raconteur
The Wannacry Effect - Provided by RaconteurThe Wannacry Effect - Provided by Raconteur
The Wannacry Effect - Provided by Raconteur
 
Banned buzzwords by Raconteur
Banned buzzwords by RaconteurBanned buzzwords by Raconteur
Banned buzzwords by Raconteur
 
Benefits of Cyber Insurance
Benefits of Cyber InsuranceBenefits of Cyber Insurance
Benefits of Cyber Insurance
 
Regulatory Update - Criminal finances Act
Regulatory Update - Criminal finances ActRegulatory Update - Criminal finances Act
Regulatory Update - Criminal finances Act
 
Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017Cyber Risks & Liabilities - Sept/Oct 2017
Cyber Risks & Liabilities - Sept/Oct 2017
 
12 steps to prepare for GDPR
12 steps to prepare for GDPR12 steps to prepare for GDPR
12 steps to prepare for GDPR
 
Energy Efficiency Insurance Brochure
Energy Efficiency Insurance BrochureEnergy Efficiency Insurance Brochure
Energy Efficiency Insurance Brochure
 
Employment Law - Criminal Record Checks
Employment Law - Criminal Record ChecksEmployment Law - Criminal Record Checks
Employment Law - Criminal Record Checks
 
HSE Safety Cornerstones - August 2017
HSE Safety Cornerstones - August 2017HSE Safety Cornerstones - August 2017
HSE Safety Cornerstones - August 2017
 
HSE Business Plan2017/18
HSE Business Plan2017/18HSE Business Plan2017/18
HSE Business Plan2017/18
 
News brief - Spring Budget 2017 highlights
News brief - Spring Budget 2017 highlightsNews brief - Spring Budget 2017 highlights
News brief - Spring Budget 2017 highlights
 
HR Brief - First Quarter
HR Brief - First QuarterHR Brief - First Quarter
HR Brief - First Quarter
 
Bring your own device guidance
Bring your own device guidanceBring your own device guidance
Bring your own device guidance
 
Cyber risks and liabilities February 2017
Cyber risks and liabilities February 2017Cyber risks and liabilities February 2017
Cyber risks and liabilities February 2017
 
2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK2016 Cyber Security Breaches Survey for the UK
2016 Cyber Security Breaches Survey for the UK
 
Professional Indemnity
Professional IndemnityProfessional Indemnity
Professional Indemnity
 

Kürzlich hochgeladen

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseri bangash
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...Suhani Kapoor
 

Kürzlich hochgeladen (20)

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
VIP Call Girls Gandi Maisamma ( Hyderabad ) Phone 8250192130 | ₹5k To 25k Wit...
 

Risk Insight - Employee Internet Usage at Work

  • 1. PIB Insurance Brokers – Update Risk Insights Employee Internet Usage at Work
  • 2. Employee Internet Usage at Work For employees who spend their days working on a computer, the internet is a valuable, indispensable resource. However, it can also create significant liability issues for the company, not to mention diminished productivity resulting from personal business being conducted on company computers. Therefore, it is essential for employers to have clear, specific internet usage policies that are widely communicated and consistently enforced. Legal Liability Through vicarious liability, employers could be held responsible for the actions or omissions of their employees. Therefore, a company could legally be held liable for any illegal or discriminatory content that employees view or distribute on those computers. Discrimination and Harassment Discrimination and sexual harassment can result from an employee sending inappropriate or offensive emails, or from an employee viewing pornography, other sexually explicit material, or content that promotes hate and discrimination. Even if the employee is not distributing such inappropriate content, another employee walking by could be offended and sue the company for being subjected to a hostile work environment. Illegal Activity Another legal liability for employers is any computer activity that involves or leads to illegal activity. This can include accessing illegal information, participating in illegal activities online or using information found online to commit a crime. Even if the employer was unaware of the inappropriate or illegal computer activity, it can be liable for negligent supervision of employees. Any content stored on the computer is in both the employee’s and employer’s ‘possession’. Misuse of Company Email Another type of legal liability could result from improper use of company email. For example, if an employee sends personal email from his or her company account or uses his or her company email address to identify themselves in a chat room or on a website, then the company is liable for any statements made or actions performed. This could bring up issues of defamation, discrimination or links to illegal activity simply by the employee misusing a company email account.
  • 3. Technological Risks Accessing unauthorised websites can also pose risks to the company’s computer or network. Just one click of the mouse can expose a computer to a destructive virus or allow a hacker access to sensitive company information. Drain on Productivity Studies have revealed that employees often spend large amounts of time ‘surfing’ the web or conducting personal business on the computer during work hours. While incidental personal use is understandable, more than that can be a significant drain on your resources by paying employees who are not consistently working. Costs of Liability There can be significant costs, financial and otherwise, associated with claims of computer or internet abuse by employees. Legal actions and settlements can be extremely costly to the company, whether it is for discrimination, harassment or illicit activity. In addition, dismissing employees guilty of misconduct can be expensive and time- consuming, both in finding and training a replacement, and in potential legal fees if there is a legal dispute as a result. The effect on other employees can be substantial as well. If it is a case involving discrimination or harassment, affected employees can become disenfranchised with the company itself, even if the company did nothing wrong and had a swift, appropriate response. Also, the company can suffer from a damaged reputation from the incident, and its name may become linked in people’s minds as associated with the incident. Employee Computer Usage Policy The first step for employers to protect the company is to have a thorough, specific and well-communicated Employee Computer Usage Policy. Not only can such a policy help prevent improper or illegal computer activity by employees, it will also go far to protect the company in the event of an investigation or legal action. The policy should emphasise that the employees are using company property and that there is no reasonable expectation of privacy when working on company equipment. This extends to all websites visited and emails sent or received. The policy should make clear that the company ‘owns’ the employee’s emails and that they can be viewed at any time and/or used against the employee in future legal proceedings.
  • 4. It is also vital that the policy spell out what the company deems as inappropriate use: hate, discrimination, harassment, child pornography, illegal content, sexually illicit content, etc. In addition, it should explain the consequences for abusing computer usage privileges or failure to follow any portion of the policy. Employee Education In addition to crafting such a policy, employees need to be fully aware of it. Employers should ask all employees to sign the policy, and then employees should retain a copy so that they are always aware of the policy and consequences involved with violating it. Education of the company policy regarding computer use can not only discourage misconduct, but also can prevent accidental liability issues from employees who didn’t realise that an action was harmful or inappropriate. Monitor Employee Activity Having a computer usage policy is not enough. The employer must also be diligent in monitoring employee activity, particularly if an individual is suspected of misconduct. Employers should consider implementing a filtering system in their computer network that blocks harmful or inappropriate websites based on keywords identified by the company. Let employees know about the filtering system and that the company will be periodically monitoring their computer activities. This will act as an added deterrent for inappropriate behaviour or abuse. For more information on this topic or for assistance in creating an appropriate Employee Computer Use policy, contact PIB Insurance Brokers today.
  • 5. Provided by PIB Insurance Brokers The content of this Risk Insights is of general interest and is not intended to apply to specific circumstances. It does not purport to be a comprehensive analysis of all matters relevant to its subject matter. The content should not, therefore, be regarded as constituting legal advice and not be relied upon as such. In relation to any particular problem which they may have, readers are advised to seek specific advice. Further, the law may have changed since first publication and the reader is cautioned accordingly. © 2009-2010, 2012-2013 Zywave, Inc. All rights reserved.