Wednesday, November 12, 2008

HR Policies - Web Surfing at Work--Can You Stop It?

It seems that no matter how many times you remind employees to stop personal use of the Internet, they keep on surfing. Today's expert has solutions.
 
Internet usage at work is tough one, says Laura E. Innes, a partner at the law firm of Simpson, Garrity & Innes in South San Francisco. But there are practical steps that employers can take.

Internet Use Policy

First of all, you definitely want a policy on this topic, but you also want to be very open with your employees about Internet usage. Let them know that you are monitoring it. Remind them that employees' Internet histories are periodically reviewed to ensure that your policies are followed and that people aren't using the Internet inappropriately during working time.
 
No Deleting Internet History

This is important, says Innes: Have a rule that employees are not to delete their Internet history. Remember, employees are smart, and they figure all this stuff out. So if you tell them that they can't use the Internet for personal Web browsing and that you're going to look at their history, they'll delete their history so it won't be there.
 
So you have to say, "You're not allowed to delete your history." Make that a violation of the policy.
 
What About Key-Loggers?

If you are going to use a key-logger program that monitors computer keystrokes, the situation is the same. Make sure people know that you monitor, and then make sure you actually do monitor.
 
Many of her clients have implemented a random system, Innes says. For example, "Two percent of our employees' Internet usage will be randomly reviewed every week," and do it.
 
If you find that someone is on a non-work-related Internet site, tell them: "We noticed that you were on eBay Tuesday afternoon, and there's no reason for you to do that in connection with your business for XYZ company. That's a violation of our policy. This is an oral warning. If you violate the policy again, additional discipline—including termination—could follow."
 
What to Do with Personal Information

With any kind of monitoring, you're going to get personal information. Don't go into it any more than is absolutely necessary to confirm that the employee was doing something inappropriate.
 
So, for example, if an employee on a delivery route diverged from the route without permission, and went 6 blocks away and was parked in front of some building for 2 hours, all you really care about is that she was off the route for 2 hours. You don't care whether she was parked in front of a Planned Parenthood facility, a counselor's office, or was shopping.
 
Similarly, when you see e-mails that clearly are not business e-mails, look at them enough to identify that it's not business e-mail, and then stop reading. You don't want to get into all of the details about hip replacement surgery.
 
No Personal E-Mail

Often employers say, "Do not use your e-mail account for personal business," or "We monitor e-mail and review employee usage records." By doing this, they hope to remove the expectation of privacy.
 
It is helpful to have such policies, but be sure to enforce your rules, says Innes. If you are tacitly allowing employees to use their business address for personal correspondence, you may not have diminished their expectation of privacy.
 
One approach is to say, "If you want to use our computers for personal e-mail, do so during restroom or meal breaks, and use a private e-mail account such as Hotmail or AOL."
 
Malware and Viruses

Finally, notes Innes, one additional reason to halt Internet browsing: Visits to certain sites can put malware—destructive programs like viruses, worms, and Trojan horses—on your system.

Innes's anecdotal experience suggests that half of her clients' difficult computer system problems come from employees using the Internet for personal use and downloading some sort of malware or virus.

In the next issue of the Advisor: Policy considerations for Internet usage and some good news—your Internet policies are already written!

Since When Is Your Office Surf City? Part 2

BLR offered tips for controlling surfing on company time; today we've got a list of key issues to consider when you write your Internet policy.

Here are particular topics to consider for your policy on Internet usage:

-- Security. Are all files downloaded from the Internet scanned for viruses? Are hard drives routinely scanned for viruses? Is virus software routinely updated?

-- Software. Can employees install downloaded "freeware" or other programs from the Internet onto their office computers?

-- Privacy. Do you inform employees that their use of the Internet may be monitored? Do you state that employees' computers are subject to inspection to determine whether there is a virus present, whether there is pornographic material present, or whether there is personal software present?

-- Games. Does your policy prohibit installing games on your computers?

-- Solicitation. Does your company policy regarding solicitation apply to the Internet? Do you prohibit the sale of personal items through advertising that is placed during working hours on the Internet? Do you prohibit the use of e-mail over the Internet to solicit during working hours?

-- Harassment. Does your policy explicitly forbid the use of the Internet to harass employees, vendors, customers, and others? Is there a method for tracing the origination of an abusive message over the Internet?

-- Abuses. Does your policy define what you consider to be abuses of the Internet, such as sending advertising, viewing pornographic material, or downloading movies or music?

-- Blogs. Does your policy address the creation of personal blogs at work or using company facilities?

-- VOIP. Does your policy address the use of Voice-Over-Internet-Protocol (VOIP) services? (VOIP services convert a voice into a digital signal that travels over the Internet.)

-- Monitoring. Do you tell employees that you can monitor the sites visited and the amount of time spent on the Internet?

-- Confidentiality. Do you require that documents sent via the Internet be encrypted?

Thanks to BLR

=======================================================

Amazon Unbox            - http://astore.amazon.com/amazon-unbox-video-downloads-20 
Video Downloads

Amazon Watches         - http://astore.amazon.com/amazon-watches-watches-watches-20

Amazon Computers     - http://astore.amazon.com/amazon-computers-computers-computers-20

Amazon Computer       - http://astore.amazon.com/amazon-computer-video-games-20
& Video Games