Want to track employee computer activity? There are some critical things that you need to know before you get started. This article will help business owners analyze the pros and cons of employee monitoring and provide managers with the best practices that they should follow when they use a monitoring app to track their team’s productivity.
Hello! Today I will be showing you all of the solutions available in the CurrentWare Suite. Each solution can be purchased individually for the greatest flexibility or as a bundle for the best value.
The CurrentWare suite can monitor and manage remote, on-premises, and hybrid users, making them ideal tools for managing the productivity and security of a remote workforce.
Alright, let’s get started.
With the CurrentWare web console you can manage policies, review dashboards, and run user activity reports from the convenience of a web browser.
Your CurrentWare solutions are installed and managed by your company either on-premises or on a virtual machine hosted by a cloud service provider of your choice, giving you full control over your data.
CurrentWare is also a Citrix-ready partner, making Windows VDI deployments simple for your organization.
The CurrentWare Suite includes:
Each solution allows you to apply unique policies for each group of users or computers. These policies will be enforced even when the computers are disconnected from the network.
Let’s start with AccessPatrol
With AccessPatrol you can:
With BrowseControl you can:
Let’s move on to BrowseReporter
With BrowseReporter you can:
Finally, with enPowerManager you can:
If you would like to try out CurrentWare for yourself you can instantly get a free trial at CurrentWare.com/Download or book a demo with our sales team at CurrentWare.com/Sales
This video is current as of version 7.0, which was released in February 2022. For the most up-to-date information on the latest features please visit our release notes at CurrentWare.com/support/release-notes/
Ready to improve productivity and endpoint security? With CurrentWare’s computer tracking software, tracking the computer activity of your users is as easy as installing the solution on their computers and remotely running reports from a convenient central console.
If you’re reading this article, chances are that you plan to start monitoring your employees with computer tracking software—if you aren’t already.
Understanding the potential concerns of your employees is critical for increasing employee buy-in for employee monitoring software. Before you deploy employee monitoring software in your business, let’s evaluate the pros and cons of monitoring employees.
As you can see, monitoring employees in the workplace with computer tracking software is not inherently risk-free.
In order for managers to get the full benefits of computer tracking software companies need to have a clear understanding of the laws that affect their business. Companies must also be prepared to address potential objections that your employees may have. I will touch more on what you can do to mitigate these concerns later in this article.
Want to create a successful employee monitoring strategy? Check out the Ultimate Guide to Employee Monitoring, an in-depth guide with tips for increasing employee buy-in, choosing the best employee monitoring software for your business, and legal considerations you need to know when monitoring employees.
Thanks for checking out the latest CurrentWare Video. In this video, we’re going to cover the reasons why you should monitor employee computer activity.
If you like this or other videos we’ve produced, hit the subscribe button below. Stay tuned to the end to learn how to get a free trial of all of the software I demo today.
Employee monitoring involves understanding how your employees are using company provided technology during work hours. There are five main benefits and considerations to employee monitoring that we will cover today:
So let’s start off with how monitoring can help employee productivity.
44% of employees admit to being distracted by the internet at work, and employees in the US have admitted to wasting 1-2 hours a day browsing the internet.
Employees that know they’re being monitored will avoid excessive personal usage of the internet and computer applications. In addition, in the event an employee is underperforming, employee monitoring reports on their computer activity can be used to help the employee understand their actions and enhance their productivity.
The second important reason to monitor activity is to address inappropriate internet usage & avoid legal liability.
As compliance requirements increase for various businesses, industries & jurisdictions, employers have a responsibility to ensure their employees are complying with regulations such as HIPAA, CCPA, CIPAA and GDPR.
By enabling computer monitoring, you can ensure that your staff are complying with these requirements. In addition, by monitoring & setting alerts, you can instantly be notified if employees are visiting inappropriate websites such as pornography, adult or other websites.
The third reason to monitor computer activity is for cybersecurity purposes & to prevent data loss.
By knowing which websites an employee is visiting, which files are being downloaded or shared, and which external devices and endpoints are being used, company administrators can manage cyber security risks and data loss prevention efforts.
Data breaches and associated risks can cost businesses millions of dollars in damages along with reputational risk, so being aware of these risks and monitoring them can provide significant benefits for every organization. In addition, by using alerts, and setting up risk profiles for users, you can audit activities and groups for questionable employee behavior.
Due to Covid-19, the year 2020 has seen a significant shift to remote work for various companies and organizations. This brings us to our 4th reason to monitor an employee’s computer usage: remote workforce management.
52% of CIOs surveyed suspect that one or more of their mobile workers have been hacked or caused a mobile security issue in the last 12 months. Employee monitoring software can be used to monitor for high-risk activity and verify that employee activity on company networks is legitimate.
The final reason to monitor employees is for bandwidth management purposes. With CurrentWare’s BrowseReporter tool, you can determine who is hogging bandwidth by streaming videos and uploading/downloading excessively large files.
Employees who are hogging bandwidth can slow down the entire network, negatively affecting the productivity of other employees and reducing the performance of business critical operations.
That’s it for this video. If you have any thoughts on this video or other reasons why computers should be monitored, feel free to comment below.
If you’d like to give any of CurrentWare’s computer and device monitoring solutions a try, please check out our free trial at currentware.com/download or get in touch with us and we’d be happy to help!
Note: The above video showcases a legacy user interface for BrowseReporter. To see the most up-to-date features and interface please visit the BrowseReporter product page
Companies will use a computer use policy to communicate the acceptable use of work devices to their users. Having a documented acknowledgment of expectations is essential for ensuring that users are aware of their responsibilities, but it’s not the full solution.
A study by Dr. Kimberly S. Young & Dr. Carl J. Case found that among large firms, user activity monitoring software was rated as the most effective deterrent of inappropriate web use, followed by policies and training.
Workplaces that want to enforce their acceptable use policies will deploy software that monitors employee computer activity to provide managers with evidence of misuse. These desktop tracking software solutions provide activity logs with details such as internet activity, bandwidth consumption, and app usage.
Desktop use reports are incredibly valuable for understanding whether or not each user is using technology appropriately.
To improve the enforcement of their acceptable use policies companies will combine a user activity monitoring tool with web filtering software. This allows them to proactively block inappropriate websites while monitoring internet usage for websites that may need to be blocked or restricted.
Throughout their careers most employees will come to know a “shirker”—a coworker or colleague who goes out of their way to avoid doing their fair share of the work.
These shirkers are likely to engage in goldbricking and cyberloafing, spending much of their work time on social media and other unproductive websites rather than their assigned projects.
Shirkers are more than just a major productivity drain, they’re a serious detriment to employee morale. Once employees catch on that one of their team members is getting away with spending their days surfing the internet while they work tirelessly, resentment is guaranteed to follow.
Managers need to be aware of these morale-draining shirkers so they can address their behavior before it affects their team’s projects.
How computer tracking software improve productivity
Naturally, tracking employee computer usage is just one of many ways to spot when an employee isn’t working to their full potential. The key value in using monitoring tools to collect this data is to have a clear picture of what is happening throughout your entire workforce so you can make data-informed productivity management decisions.
The COVID-19 pandemic presented an urgent need for many businesses to provide work-from-home accommodations for their employees.
Unless you already managed a remote-first organization this transition must have been a serious learning curve.
Now that there has been plenty of time to settle down, you may have noticed that there are a lot of challenges when managing remote teams.
Remote work isn’t going away anytime soon, either. 82% of U.S. office workers in a Global Workplace Analytics survey said that they want to continue to work from home, at least weekly, when the pandemic is over. If you’d like to remain competitive, you may want to consider offering remote work options well after the pandemic is over.
When it comes to remote workforce management many leaders worry that their employees will be distracted, or worse – actively disengaged – while they work from home. These concerns are perfectly normal, especially when assessing new employees that have not yet built trusting relationships.
While it’s true that remote employee computer tracking software can help identify poor performers, it can be used for so much more than that. The insights provided by these tools provide an opportunity to improve visibility and refine work processes when employees work from home.
The important thing to realize is that While managing a remote workforce comes with unique challenges, many of the very same skills and tools that you used to manage in-office workers can be used to manage remote employees as well.
The benefits of monitoring remote employees
When using employee monitoring software to manage remote employees, it’s important to understand that desktop activity and automatic time tracking features are not reliable as a standalone productivity metric. Instead, this data helps to identify potential problems that may need to be addressed such as excessive distractions from key projects.
Want to improve your remote workforce management skills? Check out these tips
To keep your business operations flowing smoothly your employees need access to reliable, secure, and fast internet connections. To ensure that your network performs at its best you need to limit the number of bandwidth hogs on your network.
What’s a bandwidth hog? A bandwidth hog is a source of internet traffic that uses a large amount of data. This includes large files that take a long time to download, video streaming services, and data-heavy applications.
Not all bandwidth hogs are inherently bad. Some business resources genuinely need to send or receive a large amount of data to meet your company’s needs. Unfortunately, if your network is strained from nonproductive bandwidth hogs there may not be enough bandwidth for mission-critical systems.
Monitoring bandwidth usage improves the speed of your network by identifying the sources of excessive bandwidth consumption so that you can address them. These tools will show you if employees are abusing bandwidth hogs such as video streaming services like YouTube, Twitch, or Netflix.
Depending on your environment blocking these sites altogether may be counterproductive; video sites such as YouTube can be truly valuable resources for tutorials.
So, how can you tell the difference between productive and unproductive use? Once the bandwidth usage reports have alerted you to a problematic site you can easily monitor employee web browsing history to see whether their use is providing value to the company.
Once you’ve identified the bandwidth hogs, you can decide what method works best for you: You can block them entirely or coach your employees to limit their bandwidth usage.
Once employees have been coached, you can continue to monitor their bandwidth usage to verify if they made the expected adjustments to their web browsing habits. If not, their data will provide clear evidence that further corrective actions are required.
The data that you can collect with employee tracking software isn’t limited to internet browsing history.
The tracking features of these tools also provide insights into other desktop activities such as the use of an unauthorized app, anomalous data transfers to USB devices, and suspicious login attempts.
Collecting this data is essential for making sure that confidential material isn’t leaving the company.
How tracking user desktop usage protects data
Automated time tracking features help managers keep track of projects, tasks, and overall team productivity. From a team and project management perspective some time tracking tools will integrate directly with project management tools such as Trello, Asana, and Monday.
Automatic time tracking features allows team members to focus on their projects without manually clocking in and out for each task, though there is a risk that the team time tracking features will inaccurately attribute time spent on one project to another project. For this reason automatic team time tracking features are best used to validate existing team time tracking measures rather than outright replacing them.
For example, team time tracking software could be used for idle time tracking in your team; you can see which team members are actively using their workstations and which team members are spending project time elsewhere.
As an employer, you may tolerate a degree of personal use on company computers, but most companies need to be careful about what websites their employees are accessing. If employees use the internet to access websites with pornography or prejudiced content their employer may be held liable for their actions.
How employee monitoring protects companies from liability risks
While web filters are an excellent tool for preventing access to inappropriate content, they are not entirely foolproof. Some websites may not yet be on your block list or tech-savvy employees may even find a way to bypass web filters altogether. Combining a web filter with a user activity monitoring tool provides an added layer of defense against unwanted internet activities.
Want to learn how to track the computer use of your users? The best solution to monitor computer activities for you will depend on the type of activities you would like to track.
If you would like to try tracking user activity today, you can get started with a free trial of any of CurrentWare’s user tracking software solutions.
Thanks for checking out the latest CurrentWare how-to video. Today we will cover How to Monitor Internet Use.
If you like this or other videos we’ve produced, hit the subscribe button below. Stay tuned to the end to learn how to get a free trial of the software I demo today.
In a previous video, we covered some of the benefits of monitoring employees including for productivity reasons, to avoid legal liability and to prevent cyber threats. In this video, we’re going to cover how to monitor internet use and some of the industry best practices.
We’re going to be using BrowseReporter, CurrentWare’s computer monitoring solution.
This solution requires an agent to be installed on your employee’s computers. Once installed, their computer activity is streamed to your server where you can run reports and view their activity.
To start off, we recommend you determine which browsers are being used by your company. This is a good time to look at your company’s policy and determine which default browser you recommend. You can also find out which browsers your employees are using with BrowseReporter’s application monitoring report. In addition, you can actually block the installation or use of other browsers by using CurrentWare’s BrowseControl solution.
The next step is to figure out what time period you want to look at. You can pull reports on demand at any desired time period including last 7 days, last month or a custom date range.
For this example, we’ll look at yesterday’s results. Now you can actually schedule these reports to email automatically to the appropriate person on your team, but in this case we are going to use on-demand reports, pulling the reports up as needed.
So let’s jump in and start with a snapshot report on employee internet use based on productivity.
With the CurrentWare Employee Productivity Report, you get a simple snapshot into how much time was spent on websites that are deemed to be productive. The definition of productive is based on our proprietary system of ranking each website based on whether it’s productive, unproductive or neutral. You can even change the categorization of websites based on your business needs to make this report more helpful.
Looking at the CurrentWare console, we’ll pull up the employee productivity report for employee Conan. We will look at yesterday’s performance and see that Conan was only 24% productive. The majority of his time was spent on Social Media and Sports websites vs. work related tasks.
The next way to assess productivity is to see which sites someone has spent the most time on. For example, if you know the employee is on the sales team and should be spending the majority of time on salesforce.com, you can investigate and see which are the main sites they are really browsing.
By pulling up the Top Domains visited report, we can see exactly which domains Conan browsed yesterday by Active Time and Total Time. Similar to the previous report, we see the majority of his time was spent on Facebook and ESPN.
One of the most interesting features of CurrentWare’s internet monitoring reports are related to tracking the actual activity of a user and not letting the data get convoluted with different tabs or windows that a user has open.
BrowseReporter has 3 different ways to determine how the internet and applications are being used:
Active Time measures how long the current window is in focus, giving you the most accurate report on where users spent their time on websites and applications. BrowseReporter has the capability to determine which website tab was active at the top of the screen so you get extremely accurate reporting on where they spent their time.
Total Time measures the total duration the window is opened for, from the start time until the end time regardless of whether the window was in focus or not. Not every user acts the same. Some users switch between two monitors. Some like to stream content in the background. No matter what their behaviors are, BrowseReporter can track the total time they spent on the websites whether or not they were focused on the window.
Finally, Idle time measures how long the user is away from his computer after the mouse and keyboard stopped moving. By default, idle time is tracked after 20 minutes of inactivity. Time tracking should be fair. If your users are not in front of their computers, BrowseReporter will separate the time tracked into idle time so you can filter it out if you need to during report generation.
Now if you want to investigate the exact website pages that the employee visited, you can use the Sites visited report. This report breaks down each url in detail along with how much time was spent on each page.
This lets you distill down if they were looking at pages related to work on those domains or if it was something more personal. This is specifically helpful for domains like youtube.com which for certain industries or roles can provide value, but knowing which exact video was watched can help you understand the use case by the employee.
Finally, we recommend investigating productivity by looking at employee keyword searches.
This report allows you to Review the exact search keywords used by employees and Identify employees that are distracted or struggling with specific topics. In addition, you can also discover employee sentiment and monitor for high-risk search terms such as attempts to find adult-oriented websites.
In this keywords searched example we can see employee Greg has searched lots of personal items into google over the past working days. This helps you understand where they may be spending their time and what they are browsing in google.
That’s it for this video on how to monitor internet use with BrowseReporter. If you have any thoughts on the reports or suggestions we’ve covered in this video, feel free to comment below..
If you’d like to give BrowseReporter or any of the other CurrentWare Solutions a try, please check our free trial at currentware.com/download or get in touch with us and we’d be happy to help!
NOTE: The above video contains a legacy user interface for BrowseReporter. To see the most up-to-date version, please visit the BrowseReporter product page.
The best way to increase productivity and see what websites your employees have visited is with CurrentWare’s employee tracking software BrowseReporter. Using this software allows you to see the specific websites that your employees have visited, how long they have spent actively using the websites, and when they visited them.
Manually checking employee web browser history and viewing temporary internet cache files is unreliable as employees can use private browsing modes to hide their web browsing activity. A dedicated activity monitoring software such as BrowseReporter will track employee internet use for unproductive and suspicious activity while keeping that data safe from tampering to ensure accuracy.
If you would like to know what web browsers your employees are using (Chrome, Edge, Firefox, Opera, etc) you can use BrowseReporter’s app usage monitoring features. After identifying what browsers are in use you can add any unsupported browsers to the blocked list of an application blocker to prevent further use.
Why monitor and limit the web browsers that employees can use?
NOTE: The above video features a legacy user interface for BrowseReporter. To see the latest features and interface please visit the BrowseReporter product page.
The benefits of monitoring app usage
Understanding the application usage of your employees is critical for streamlining your IT asset management process.
While the best practice is to lock down employee computers so that they cannot install unwanted software, this is not always enough to stop the use of an unwanted app.
For example, Software-as-a-Service (SaaS) platforms do not require a direct installation. Employees can simply sign up for a free account or get approval from their finance department for a paid account. This ease of acquisition has made app sprawl far more difficult to manage without some form of monitoring in place.
If there is any disconnect between your IT department and your procurement process, there is a significant risk that employees will use an app that your IT department is not aware of.
Even worse, there may even be non-IT employees in your company that have the permissions necessary to install programs on company computers.
Ready to start tracking real-time computer usage? Get started today with a free trial of BrowseReporter, CurrentWare’s employee computer activity tracking software.
CurrentWare’s activity monitoring software BrowseReporter can also be used to monitor remote workers.
Options for monitoring remote workers with BrowseReporter
For more information, check out this article: How to Monitor Employees Working From Home
Malicious insider threats can try to log in to company systems after hours and try to steal sensitive data undetected. Auditing when employees log in and out provides opportunities to detect these suspicious activities.
CurrentWare’s remote power management software enPowerManager tracks when users log in, startup, shut down, or sleep their PCs. It also tracks user logon session time so you can easily see how long employees have been logged in.
To audit logon events with enPowerManager you simply need to install the CurrentWare client on your employee’s workstations and connect the clients to a self-hosted CurrentWare Server that is installed on-premises or on a cloud platform of your choice.
Hey everyone, this is Dale here. I am the Digital Marketing Manager for CurrentWare.
In today’s video, I’d like to show off the new USB activity dashboards introduced to AccessPatrol in version 7.0.
These dashboards provide a convenient overview of the peripheral device usage of your entire workforce as well as specific groups or users—all from the convenience of a web browser.
They work in tandem with AccessPatrol’s device control features and USB activity reports to protect sensitive data against the security risks of portable storage devices.
Today’s video is just a sneak peek of what AccessPatrol is capable of; as time goes on you can expect to see further enhancements and data points added to these dashboards.
At this time, AccessPatrol can track activities from the following peripherals:
This device usage data is used to populate various graphs across AccessPatrol’s dashboards. You can further refine how granular this data is by limiting the time frame, selecting only specific groups, and even investigating individual users.
Having these metrics available at a glance makes detecting potential insider threats far more efficient as your organization scales.
Any groups or users that need to be reviewed further can be investigated using the more granular dashboards and AccessPatrol’s device activity reports.
For a more proactive approach to insider threat management you can set up targeted alerts that will notify designated staff members when these high-risk activities occur.
For the most up-to-date information on AccessPatrol’s activity tracking and data loss prevention capabilities, visit our knowledge base at CurrentWare.com/Support or visit the AccessPatrol product page at CurrentWare.com/AccessPatrol
In the overview dashboard you can review the following metrics:
Moving on to the Files Dashboard you will see…
Finally, we have the Devices Dashboard.
In this dashboard, we have…
As you can see, we have specific users that are repeatedly trying to use devices that have not been approved for use by the organization.
While this could just be an accidental oversight on the user’s part, there’s a risk that it’s something much more serious.
For example, what if this is actually a disgruntled employee trying to steal trade secrets or sensitive customer data so they can bring it to a competitor, or worse, sell it to cybercriminals on the dark web.
Between the costs associated with a damaged reputation, fines, loss of competitive advantage, and remediation, a data breach like this could completely ruin a company.
Before we confront this employee or send them for retraining, let’s investigate this incident further so we can make an informed decision.
Clicking on this user, we’ll be taken to a dashboard that focuses exclusively on their activity.
Looking at the Devices graph we can see that they have made multiple attempts to use blocked devices.
Scrolling down, we can see that they’ve been trying to use unauthorized portable storage devices.
Since AccessPatrol is currently blocking any devices that are not explicitly allowed, I know that the only way sensitive data is leaving through a USB drive is if it’s a device that we’ve allowed before. So, let’s take a closer look at how they’ve been using their approved devices.
As you can see here, the types of files that they are transferring are more than capable of containing sensitive data; let’s take a look at the file names for more details.
With the Activity Log we can use the filters, sorting, and column options to isolate our view to the entries we’re the most interested in.
Once we find something that looks off, we have more than enough information to confront this employee and take any necessary corrective actions.
Ready to protect your sensitive data against theft to USB portable storage devices? Block and monitor peripheral device usage today with a free trial of AccessPatrol, CurrentWare’s USB control software.
Simply visit CurrentWare.com/Download to get started instantly, or get in touch with us at CurrentWare.com/Contact to book a demo with one of our team members. See you next time!
The best practice for preventing data breaches to insider threats with USB peripheral storage devices is to block them altogether with device control software such as CurrentWare’s AccessPatrol.
The thing is, it’s not always practical to completely block USB devices.
In environments where portable storage hardware is needed the devices that can be used can be limited to a company-approved Allowed List. As an added layer of protection, any file transfers to these USB devices can be monitored for suspicious activity.
Why audit USB device usage?
Is there such a thing as too much employee monitoring?
Yes, there most certainly is.
When it comes to what you are allowed to monitor, many believe that if an employee is using company equipment, on company time, and getting paid by the company, that the company has every right to monitor their equipment and what they are doing with it.
While in the majority of cases a company can leverage user activity monitoring software so long as the company has a legitimate business reason for doing so, it’s not always that simple. A variety of factors influence what employers can and cannot monitor.
There’s a resource management side to it as well; user activity monitoring software captures a lot of data. Will you or a member of your staff be manually reviewing the reports? Will you use alerts to notify you of specific activities? Will you only be checking in when other concerns prompt you to dig deeper?
How granular your approach is will depend on your company’s resources, risk tolerance, applicable regulatory or contractual requirements, and policies.
FREE WHITE PAPER
Best Practices for Monitoring Employees
In today's privacy-conscious world employers need to monitor employees in a way that is transparent, minimally invasive, and respectful of employee privacy
Read this white paper to learn the best practices for monitoring employees in the workplace.
Yes, but there are limitations.
Even in jurisdictions where employers are allowed to use user activity monitoring software to monitor their employees, there are limitations as to what can and cannot be monitored. For examples, other forms of monitoring such as GPS tracking and audio recording are much more regulated than basic computer monitoring features.
When determining how employee monitoring will be used in your organization it is important to understand the potential privacy implications for your employees and what factors influence your right to monitor your users.
For example, organizations that are subject to GDPR are required to use a Data Protection Impact Assessment (DPIA) that evaluates their method of tracking against the potential impacts it may have on employee privacy.
Legal factors that influence employee monitoring
As the relationship between workplace privacy and employee monitoring evolves there is a strong chance that data privacy laws that are similar to California Consumer Privacy Act (CCPA) and Europe’s General Data Protection Regulation (GDPR) will continue to be adopted.
When it comes to determining how to legally monitor your employees, the best practice is to consult with a legal professional. Employee monitoring laws vary considerably and as the world becomes more aware of data privacy there will be new laws and regulations to consider.
Employee monitoring is an excellent tool for understanding how your workforce operates.
Unfortunately a history of overly-invasive deployments has caused serious concerns among employees, like:
Is my employer spying on me?
They’re just doing this to find an excuse to fire me
If they’re monitoring what I do at work, they obviously don’t trust me
This is not what you want your employees to feel.
In this video I’m going to guide you through the best practices for monitoring employees so you can avoid these mistakes and concerns from your employees
Hello and welcome to the CurrentWare YouTube channel.
My name is Neel Lukka and I am the managing director here at CurrentWare.
After watching this video you can learn more about this topic by reading our new white paper “Employee Monitoring: Best practices for balancing productivity, security and privacy”
You can find the link for that in the description below.
Before we start, I just want to give a quick disclaimer here.
I’m not a lawyer and this is not legal advice. These tips are for informational purposes only. If you want to use employee monitoring software in your company be sure to consult with a legal professional first.
Alright, let’s jump in
First up is the very best tip I can give you.
If you want to succeed, you have to let your employees know that they are being monitored.
Employees that do not know if they are being monitored, why they are being monitored, and how they are being monitored are more likely to have negative reactions to being monitored,
such as
Having higher rates of stress and anxiety
Being less likely to accept being monitored
And, ironically, becoming less productive
That’s not to say that transparency is going to negate each and every concern that your employees may have.
But if you start with transparency from the very beginning you have a far better chance of proving to your employees that these tools aren’t being used to spy on them.
By being transparent you’re also giving the chance to hear about their concerns from the start. This lets you work with them to make an employee monitoring strategy that is fair and minimally invasive.
Here are 4 transparency boosting tips:
Involve a representative sample of employees when you start planning your goals and the metrics you want to capture
Tell your employees what metrics are being captured, how they’ll be used, and what is being used to capture them
Have your staff read and sign policies that disclose your intended use of the employee monitoring software
and finally, give them access to their own data so they can see exactly what’s being captured. They can even use this data to manage their own productivity, which is a major bonus
The second tip I have for you is don’t use employee monitoring to micromanage
One of the reasons that monitoring can be perceived negatively is that it feels like it’s being used to punish employees. They worry that it’s the software equivalent of a micromanaging boss staring over their shoulder while they work, just waiting for them to slip up.
Some employers do monitor internet use to make sure employees aren’t getting carried away, but did you know that so-called “unproductive” internet browsing has actually been found to have a positive impact on productivity?
It’s true! But only if that browsing doesn’t take up more than 12% of their work time.
Employees feel far better about being monitored when they’re given the autonomy to self-manage first. Managers can step in if things are getting carried away or if their employees are visiting clearly inappropriate websites.
The third and final tip I have for you today is to not monitor more than you have to.
Think about it this way – if I told you that I wanted to make sure that employee’s weren’t visiting not safe for work websites, you’d think I was crazy for asking for a direct feed into their webcams.
The bottom line is this:
If you can meet your company’s goals with a less invasive method of monitoring, do it that way.
For example, if you want some backup for your acceptable use policies you can use internet monitoring software to see what sites are being visited.
But there’s no need to track individual keystrokes
Or maybe you want to protect data from being stolen. You can monitor the flow of data without recording audio clips of private conversations
Finally, maybe you want to track the work habits of employees that are working remotely or from home. Give them a company-provided device rather than monitoring their personal computers
That’s it for now.
If you want learn more, check out our new white paper “Employee Monitoring: Best practices for balancing productivity, security and privacy”
You can find the link for that in the description below.
If you’d like to try out employee monitoring in your company, visit CurrentWare.com/Download for a free trial of BrowseReporter, our computer monitoring software.
And as always stay tuned to our YouTube channel for more videos about employee monitoring, cyber security, and CurrentWare’s workforce management software.
Ready to use employee PC activity tracking software in your business? Follow these best practices to create an effective employee monitoring strategy that is transparent, minimally invasive, and respectful of employee privacy.
If you would like to dive deeper into this topic, you can download our free white paper Employee Monitoring: Best Practices for Balancing Productivity, Security and Privacy.
“If organizations wish to monitor their employees, they should be clear about its purpose and that it brings real benefits. Organizations also need to make employees aware of the nature, extent, and reasons for any monitoring”
Spokesperson from the UK’s Information Commissioner’s Office
Employees that are not aware that they are being monitored, why they are being monitored, and how they are being monitored are less likely to find employee monitoring acceptable.
A survey by Dtex Systems found that 77% of employed Americans would be less concerned with employee monitoring so long as they are transparent about it and let them know up front.
Being openly transparent about workforce monitoring is essential. Using an employee activity tracker as a form of PC spy software risks harming employee morale and creating a culture of distrust in your company.
How to be transparent
As an employer it is important that you do not lead with the assumption that your employees have the same expectations of privacy in the workplace as you do. Use company policies, handbooks, and other tools to set a clear indication as to whether or not your employees should expect privacy when they use company computers.
Get started today—Download the FREE template and customize it to fit the needs of your organization.
In addition to improving transparency, an acceptable use policy is a perfect opportunity to provide your employees with clear expectations when they use technology in the workplace. Having these documents on file also provides an opportunity to demonstrate that your employees have provided you with informed consent for employee monitoring.
What to include in an acceptable use policy
“Employers must not use tech to control and micromanage their staff. Monitoring toilet breaks, tracking, and snooping on staff outside working hours creates fear and distrust. And it undermines morale.”
Frances O’Grady, General Secretary of the British Trades Union Congress (As reported by Raconteur)
When you monitor your employees the best practice is to only monitor what is needed to meet your organization’s goals.
You must also weigh the potential impacts on employee privacy against the benefits to your business. If a less invasive form of monitoring can adequately meet your company’s goals it is best to consider that alternative.
When it comes to actually viewing the data you collect, you should also consider whether or not you have a reasonable business case for doing so. For example, archiving employee emails is a standard business practice for many organizations but snooping through employee conversations without any suspicion of malfeasance will simply come off as spying rather than monitoring.
“In my view, information collected by keystroke logging software becomes ‘necessary’ within the meaning of section 33(c) of the Act only when there is no less intrusive way of collecting sufficient information to address a particular management issue.
Frank Work, Information and Privacy Commissioner of Alberta, 2005
Furthermore, surreptitious use of the software will result in ‘necessary’ information only where forewarning employees that such a program will be used means that information needed for management cannot be collected.”
In June of 2005 the Alberta Office of the Information and Privacy Commissioner released Order F2005-003. In this order Frank Work, the Information and Privacy Commissioner of Alberta, addressed a complaint against Parkland Regional Library.
The library had secretly installed keystroke logging software on the workstation of an information technology employee. When the employee discovered the computer spy software they made a complaint to the Office of the Information and Privacy Commissioner as they were concerned that this covert monitoring may have captured their personal banking information, including their usernames and password.
The library’s justification for using the keystroke monitoring tool was that they wanted to ensure that their workstations were being used for work purposes and that any personal use by employees be reasonably limited and controlled.
While the Commissioner did agree that using software to know how employees are using their working time may be necessary, the library had given their employee permission to conduct personal internet banking on their company-provided workstation during non-working time and they installed the overly-invasive monitoring software without the employee’s knowledge.
Due to the lack of transparency and the high probability that keystroke logging would capture sensitive personal information, the library’s use of the software was deemed to be unjust. The Commissioner also noted that less-intrusive means were available for collecting the information needed for managing.
Using desktop monitoring apps for tracking employee activity on a personal device is likely to reveal sensitive personal information. This includes protected classes of information such as religion, sexuality, and health status.
Employee monitoring software also requires you to install some kind of monitoring agent on their individual devices. Employees using personal devices for work may not be comfortable having tracking software installed on their devices, especially if there is any doubt as to what is being captured and when.
Rather than directly monitoring an employee’s personal device, you can have them remotely connect to a monitored company-owned computer. That way any and all monitoring that takes place is limited to working hours on a computer that is intended to exclusively be used for work purposes.
Another alternative is to schedule employee monitoring to only occur during designated work hours. This allows employees to treat their devices as work-only devices during the workday while having full freedom to use the devices for personal use in their off-hours.
You can take this approach even further by providing employees with access to their own activity data. That way they can clearly see what is (and is not) being captured.
When you first use employee monitoring software you’ll become acutely aware of computer use habits that you may not have been previously aware of.
When evaluating this data it’s important to realize that these browsing habits have always been there; you’re simply being given a granular overview of it.
At first it may be tempting to immediately curtail any and all computer activity that is considered unproductive, but being overzealous when doing so may actually negatively impact the overall productivity of your employees.
Consider this: As a leader you need to do all you can to enable your employees to perform their best. Employees that are empowered to improve their own productivity perform better than those who feel they are being subject to micromanagement.
If an otherwise high performing employee is immediately scolded for checking their Facebook during a slow period at work, they’re going to feel like they are not trusted to perform at their best.
Besides, computer activity data isn’t a reliable standalone productivity metric. There are other factors that need to be considered before deciding whether or not corrective actions need to be taken.
What to consider when evaluating activity data from monitoring tools
Ensuring that employees retain their autonomy when being monitored will go a long way to maintaining morale and satisfaction in the workplace. The best practice is to limit direct action on individual employees to serious infractions such as blatant time theft or browsing NSFW sites.
Rather than addressing every minor infraction you should use this data to make informed productivity management decisions. For example, excessive unproductive web browsing may be an indication that employees or departments are underutilized. You can use this data to identify opportunities to adjust work processes and reduce excessive idle time.
Naturally, if underperforming employees are maliciously spending excessive amounts of time on unproductive web browsing and their deadlines are being missed you will need to step in. But if otherwise high performing employees are maintaining their standard of excellence it is best to trust them to manage their own productivity.
Employee monitoring data can be highly sensitive depending on its nature. When you monitor your employees you need to treat the data the same way they would any other sensitive data. This includes providing it with protections such as restricting who can access the data and keeping it within a secured network.
Employee computer activity tracking tools are valuable assets for improving productivity and security.
If you would like to use these tracking tools in your business you first need to understand the data privacy laws of your jurisdiction, determine how you will monitor employees in a way that is transparent and fair, and find the best employee monitoring software for your needs.
Ready to get advanced insights into how your employees spend their time? Reach out to the CurrentWare team for a demo of BrowseReporter, CurrentWare’s employee and computer monitoring software.
Cookie | Duration | Description |
---|---|---|
__cfruid | session | Cloudflare sets this cookie to identify trusted web traffic. |
cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
JSESSIONID | session | The JSESSIONID cookie is used by New Relic to store a session identifier so that New Relic can monitor session counts for an application. |
LS_CSRF_TOKEN | session | Cloudflare sets this cookie to track users’ activities across multiple websites. It expires once the browser is closed. |
OptanonConsent | 1 year | OneTrust sets this cookie to store details about the site's cookie category and check whether visitors have given or withdrawn consent from the use of each category. |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Cookie | Duration | Description |
---|---|---|
__cf_bm | 30 minutes | This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. |
_zcsr_tmp | session | Zoho sets this cookie for the login function on the website. |
Cookie | Duration | Description |
---|---|---|
_calendly_session | 21 days | Calendly, a Meeting Schedulers, sets this cookie to allow the meeting scheduler to function within the website and to add events into the visitor’s calendar. |
_gaexp | 2 months 11 days 7 hours 3 minutes | Google Analytics installs this cookie to determine a user's inclusion in an experiment and the expiry of experiments a user has been included in. |
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_ga_GY6RPLBZG0 | 2 years | This cookie is installed by Google Analytics. |
_gcl_au | 3 months | Provided by Google Tag Manager to experiment advertisement efficiency of websites using their services. |
_gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |
CONSENT | 2 years | YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data. |
Cookie | Duration | Description |
---|---|---|
_opt_expid | past | Set by Google Analytics, this cookie is created when running a redirect experiment. It stores the experiment ID, the variant ID and the referrer to the page that is being redirected. |
IDE | 1 year 24 days | Google DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile. |
NID | 6 months | NID cookie, set by Google, is used for advertising purposes; to limit the number of times the user sees an ad, to mute unwanted ads, and to measure the effectiveness of ads. |
test_cookie | 15 minutes | The test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies. |
VISITOR_INFO1_LIVE | 5 months 27 days | A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface. |
YSC | session | YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages. |
yt-remote-connected-devices | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt-remote-device-id | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt.innertube::nextId | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
yt.innertube::requests | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
Cookie | Duration | Description |
---|---|---|
_dc_gtm_UA-6494714-6 | 1 minute | No description |
_gaexp_rc | past | No description available. |
34f6831605 | session | No description |
383aeadb58 | session | No description available. |
663a60c55d | session | No description available. |
6e4b8efee4 | session | No description available. |
c72887300d | session | No description available. |
cookielawinfo-checkbox-tracking | 1 year | No description |
crmcsr | session | No description available. |
currentware-_zldp | 2 years | No description |
currentware-_zldt | 1 day | No description |
et_pb_ab_view_page_26104 | session | No description |
gaclientid | 1 month | No description |
gclid | 1 month | No description |
handl_ip | 1 month | No description available. |
handl_landing_page | 1 month | No description available. |
handl_original_ref | 1 month | No description available. |
handl_ref | 1 month | No description available. |
handl_ref_domain | 1 month | No description |
handl_url | 1 month | No description available. |
handl_url_base | 1 month | No description |
handlID | 1 month | No description |
HandLtestDomainName | session | No description |
HandLtestDomainNameServer | 1 day | No description |
isiframeenabled | 1 day | No description available. |
m | 2 years | No description available. |
nitroCachedPage | session | No description |
organic_source | 1 month | No description |
organic_source_str | 1 month | No description |
traffic_source | 1 month | No description available. |
uesign | 1 month | No description |
user_agent | 1 month | No description available. |
ZCAMPAIGN_CSRF_TOKEN | session | No description available. |
zld685336000000002056state | 5 minutes | No description |