Searching for employee internet management solutions? The internet is a powerful tool for improving employee productivity when it’s used for work-related purposes. Unfortunately, workplace internet abuse is a very real problem that contributes to a variety of productivity and security concerns. In this article, you will learn how to stop internet abuse in the workplace.
The best way to prevent workplace internet abuse is to monitor and restrict employee internet activity. Get started today with a FREE trial of CurrentWare’s employee internet management software solutions.
Table of ContentsWhen employee internet use is left unmanaged it provides opportunities for a variety of counterproductive work behaviors (CWB) such as cyberbullying, cyberloafing, sexual harassment, and data theft. Employers need to be conscious of these risks when they provide their employees with internet access in the workplace.
This next section will overview the top risks that need to be addressed as part of your employee internet management strategy. I will cover strategies for addressing these risks later in this article.
There is no doubt that the internet is an extremely valuable tool for improving the productivity and capability of your organization. That said, without an employee internet management framework an employee’s productivity can rapidly decline. Social media, forums, gambling sites, and gaming sites are all incredibly tempting distractions during a stressful work day.
Internet abuse in the workplace is devastating for employee productivity. Actively disengaged employees will participate in a form of time theft known as goldbricking. Employees that goldbrick will invent excuses to avoid their tasks, shirk their responsibilities, and engage in unproductive or harmful activities in the workplace.
Goldbricking is the practice of doing less work than one is able to while maintaining the appearance of working. The term originates from the confidence trick of applying a gold coating to a brick of worthless metal—while the worker may appear industrious on the surface, in reality they are less valuable. – Wikipedia
There’s another employee internet use phenomenon known as cyberloafing that you should be aware of as well. While not as serious as goldbricking, cyberloafing—the act of browsing non-work websites during work hours— is incredibly common.
In fact, a Salary.com survey found that 64% of employees engage in cyberloafing every day at work. Out of those employees, 39% said they wasted up to an hour on the Internet at work, 29% wasted 1-2 hours, and 32% wasted more than 2 hours per day.
Employees aren’t exactly feeling like they’re engaging in anything nefarious when they cyberloaf, either. A report from the Lee Kong Chian School of Business states that 97% of male survey participants and 85% of female participants believed cyberloafing was acceptable in the workplace
Cyberloafing—also known as cyberslacking— describes when an employee surfs the web for reasons that are not related to their job. This includes using workplace internet for personal use, playing computer games, and browsing social networking sites.
It’s not all bad, though.
According to a publication from Brent Coker of the University of Melbourne so-called “cyberloafing” can have a positive impact on employee productivity; so long as non-work internet browsing does not consume more than 12% of an employee’s work time.
As an employer it’s important that you trust your employees to limit their personal use of the internet to reasonable levels, however you should still have systems in place for identifying and addressing excessive cyberloafing and other undesirable uses of the internet in the workplace. I will cover strategies for addressing employee internet misuse later in this article.
The abuse of bandwidth hogs such as YouTube, Twitch, and Netflix drastically impact network performance. Employees that frequently use the internet for these non-work purposes dramatically affect the productivity of their coworkers by contributing to network latency.
If bandwidth hogs are left unmanaged they can lead to network crashes, dropped VoIP/video conferencing connections, and limitations to other business processes that rely on internet connectivity.
As part of your employee internet management strategy you should search for a computer monitoring solution that monitors employee bandwidth usage. This allows you to diagnose whether network latency is as a result of a genuine increase in demand or if bandwidth availability can be optimized by limiting the use of bandwidth hogs.
Providing employees with unrestricted internet access is a cybersecurity nightmare. The internet is rife with security threats like phishing emails, malware, and threat actors that would love nothing more than to compromise your organization’s network.
Employees that browse the internet at work risk unknowingly infecting company endpoints with malicious computer spy software that transmits keystrokes, files, and other sensitive information to threat actors.
That’s only that start of it; what about insider threats?
Insider threat management is top-of-mind for industries that handle electronic health records and financial data, but it needs to be included as a part of any organization’s security strategy.
Consider this: With unrestricted access to the internet an insider data theft incident can be as simple as a disgruntled (or negligent) employee logging in to a personal cloud storage website and transmitting sensitive data to an external server.
As an employer you are responsible for ensuring that your employees use company-provided resources appropriately; workplace internet misuse is no exception. Learning how to stop internet abuse in the workplace will ensure that your employees do not use company resources in a way that could leave you liable for damages.
If your employees use the company internet for illicit purposes such as piracy, data theft, harassment, hacking, and related activities there is a significant risk that your company will be held liable for any associated damages.
Piracy refers to the unlawful download of intellectual property and other copyrighted works such as movies, video games, music, and software. Pirating is often done with the aid of dedicated peer-to-peer (P2P) software programs, torrents, and websites that are dedicated to hosting pirated files.
Workplace internet abuse affects more than just a few individual employees. Unmanaged internet use risks creating a hostile work environment when employees browse the web for material that is not safe for work such as pornography, violence, hate speech, or otherwise inappropriate.
How common is browsing porn at work? 60% of respondents in a Sugarcookie survey admitted to watching porn at work at least once. They’re not always as discrete as they think they are, either; nearly 20% of them have been caught in the act. Why do employees watch porn at work? 58% said they were bored and 20% who watched said it was because they were stressed.
It’s bad enough that this is even happening at all, let alone the implications of an employee being unwillingly exposed to inappropriate content as a result of their coworker’s workplace internet abuse. CNBC previously reported that half of all workers in a survey said they’d been exposed to sexually explicit material by co-workers
As an employer, you cannot afford to avoid addressing these risks proactively. If you allow inappropriate web browsing to occur in your company you risk severely impacting employee morale and facing a lawsuit for sexual harassment or a hostile work environment claim.
Need to control employee internet use? Get started today with a fully function FREE trial of CurrentWare’s employee internet management solutions.
It depends. As with all things related to the law, there are some grey areas, differences in laws between jurisdictions, and competing precedents. That said, firing an employee for surfing the internet is not completely unprecedented: In 2009 alone 26% of organizations terminated workers for internet misuse.
Employees have been fired for:
When considering whether to fire an employee for internet abuse as part of your employee internet management strategy, it’s important that there is a precedent set for how your company defines acceptable vs inappropriate use of the internet.
Guidelines for terminating employees for internet abuse*
*This is not legal advice. Please seek legal counsel and consult your HR department regarding employment law in your jurisdiction.
Consistency is key. This segment from Guillaumes LLP contrasts two similar cases related to employee internet management with two very different outcomes.
In the case of Scarlett and another v Gloucester City Council ET/1401395/12, two employees dismissed for excessive personal internet use brought a successful unfair dismissal claim due to the informal nature of the employer’s internet policy and the prior provision of less serious sanctions for other members of staff who had done the same.
Guillaumes.com: Using the Internet at Work – What’s The Law?
In other cases, employers have been found to have acted lawfully in dismissing staff for excessive personal internet use. In McKinley v Secretary of State for Defence ET/2302411/04, an employment tribunal agreed with the employer that a senior member of staff spending 10% to 15% of his working time surfing the internet for personal use was excessive.”
Now that you know the risks of workplace internet abuse, it’s time to focus on solutions for managing employee internet use at work.
In this last section I will show you how to stop internet abuse in the workplace by guiding you through the use cases for employee internet management software, providing you with an internet use policy for communicating expectations to your employees, and going over the best practices for controlling internet access at work.
A majority of companies use some form of Employee Internet Management (EIM) software such as computer monitoring or web filtering software to stop internet abuse in the workplace. The visibility and control these technologies provide make them the ideal solution for preventing workplace internet abuse.
BrowseReporter is a versatile computer user activity monitoring software that helps organizations enforce policies, meet compliance requirements, and understand how their users operate – no matter where they’re located.
BrowseReporter’s detailed user activity reports provide insights like…
The computer activity data is collected by a software agent that is installed on your computers. The agent connects to a database on your organization’s network, allowing you to maintain complete control over the data.
BrowseReporter’s central console allows you to run reports on your user’s computer activities from the convenience of a web browser.
There are dozens of reports to choose from, including…
BrowseReporter’s reports can be generated on-demand, on a set schedule, or automatically sent to your inbox to alert you of specific events.
Using the End-User Reports feature you can even provide your users with on-demand access to their own data. This lets them benefit from the insights that you have.
BrowseReporter can even be deployed with optional privacy-enhancing features.
You can…
These optional features allow you to customize your BrowseReporter deployment to fit the needs of your organization.
BrowseReporter is best used in tandem with our web filtering software BrowseControl. Using both solutions provides you with the visibility and control you need to ensure that your organization’s computers are being used appropriately
Ready to make data-informed decisions? Get actionable insights into the activity of your users with a free trial of BrowseReporter.
Get started today by visiting CurrentWare.com/Download
If you have any questions during your evaluation our technical support team is available to help you over a phone call, live chat, or email.
Thank you!
“Employers that don’t monitor [their employees] will become fewer and fewer, not to nail employees, but because monitoring increasingly makes business sense.”
Manny Avramidis, president and CEO, the American Management Association
Employee monitoring is incredibly common. 94% of organizations surveyed in the 2018 Insider Threat Report said that they deploy some method of monitoring users. Monitoring employees in the workplace provides employers with the data they need to identify workplace internet abuse before it escalates.
Deciding whether to block a website outright or simply monitor for excessive use is a unique employee internet management challenge for organizations.
Companies that block access to certain websites at work are most often concerned about employees visiting sites with content that is related to pornography, gaming, social networking, entertainment, shopping, and sports.
To manage employee internet access more efficiently you can use web filtering software with a category filtering database. These convenient databases contain millions of websites that have been catalogued based on the content of the website. This allows you to effortlessly block inappropriate content without manually researching and entering individual URLs for each site.
How common is web filtering software? 89% of organizations limit employee internet access. 90% restrict web access to protect against malware/ransomware infections, 84% want to keep users from visiting inappropriate sites at work, and 83% aim to prevent unacceptable user behavior – Spiceworks
Avoid overblocking, though. If your company’s internet restriction policy is too severe you risk employees becoming frustrated and attempting to bypass your network’s web filter. Start by blocking websites that are always inappropriate such as pornography and hate sites. As you continue to monitor employee internet use you will discover whether or not other categories of websites are being abused in the workplace.
Concerned about cyberloafing? Rather than blocking unproductive websites outright, consider using employee internet monitoring software to ensure that unproductive browsing is within reasonable limits. This empowers employees to manage their own productivity while also providing you with the ability to address egregious misuse of the internet. Besides, 71% of employees in a Salary.com survey said they believe short breaks throughout the day are beneficial for their productivity.
If you are concerned about employees wasting time online, it’s important to realize that excessive cyberloafing is likely to be a symptom of a larger problem.
Employees that are engaged, sufficiently challenged without being overworked, and content with their work environment are not going to become actively disengaged and spend the majority of their day browsing social media.
As a part of your employee internet management strategy, you need to be prepared to address factors that contribute to internet abuse such as a lack of clear direction, employee burnout, dissatisfaction, and management practices that are incompatible with the employee’s needs.
To ensure that the internet is used appropriately by employees you need to provide them with clear internet usage guidelines. These guidelines will help to prevent employees from excessively surfing the internet and provide human resources staff and/or management with a precedent for correcting inappropriate browsing behavior.
An internet use policy is an excellent tool for providing your employees with an understanding of how they are expected to use technology in your organization. To get the most out of your internet use policy it is critical that it is consistently enforced.
An internet use policy is a document that provides users with rules and guidelines regarding the appropriate use of equipment, network and internet access. These policies cover topics such as the type of content users may access, whether or not personal use of the internet is permitted, and whether or not the internet use is monitored.
Need an internet use policy for your business? Download our free template.
Want to learn more? Check out our article 5 Ways to Enforce Your Acceptable Use Policy.
Deciding whether or not to allow your employees to use the internet for personal tasks is not as clear-cut as it may seem. There are a number of privacy and security concerns associated with personal internet usage.
For example, personal email accounts are more vulnerable than those protected by corporate email gateways. Employees that are being monitored on corporate systems may have sensitive information captured by the employee internet management software.
On the other hand, zero-tolerance policies for personal web browsing are likely to frustrate employees and negatively impact morale. When developing your internet use policy you must consider how you will balance network security, productivity, and employee satisfaction.
An employee internet management strategy is critical for ensuring that your employees use the internet responsibly and safely. A combination of employee internet management software, a satisfactory work environment, and a solid internet use policy will provide you with the tools you need to manage workplace internet abuse.
Need to manage employee internet use in your company? Get started with a free trial of CurrentWare’s employee internet management software solutions.
Related Article
How to Monitor Employee Internet Use
Cookie | Duration | Description |
---|---|---|
__cfruid | session | Cloudflare sets this cookie to identify trusted web traffic. |
cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
JSESSIONID | session | The JSESSIONID cookie is used by New Relic to store a session identifier so that New Relic can monitor session counts for an application. |
LS_CSRF_TOKEN | session | Cloudflare sets this cookie to track users’ activities across multiple websites. It expires once the browser is closed. |
OptanonConsent | 1 year | OneTrust sets this cookie to store details about the site's cookie category and check whether visitors have given or withdrawn consent from the use of each category. |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Cookie | Duration | Description |
---|---|---|
__cf_bm | 30 minutes | This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. |
_zcsr_tmp | session | Zoho sets this cookie for the login function on the website. |
Cookie | Duration | Description |
---|---|---|
_calendly_session | 21 days | Calendly, a Meeting Schedulers, sets this cookie to allow the meeting scheduler to function within the website and to add events into the visitor’s calendar. |
_gaexp | 2 months 11 days 7 hours 3 minutes | Google Analytics installs this cookie to determine a user's inclusion in an experiment and the expiry of experiments a user has been included in. |
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_ga_GY6RPLBZG0 | 2 years | This cookie is installed by Google Analytics. |
_gcl_au | 3 months | Provided by Google Tag Manager to experiment advertisement efficiency of websites using their services. |
_gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |
CONSENT | 2 years | YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data. |
Cookie | Duration | Description |
---|---|---|
_opt_expid | past | Set by Google Analytics, this cookie is created when running a redirect experiment. It stores the experiment ID, the variant ID and the referrer to the page that is being redirected. |
IDE | 1 year 24 days | Google DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile. |
NID | 6 months | NID cookie, set by Google, is used for advertising purposes; to limit the number of times the user sees an ad, to mute unwanted ads, and to measure the effectiveness of ads. |
test_cookie | 15 minutes | The test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies. |
VISITOR_INFO1_LIVE | 5 months 27 days | A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface. |
YSC | session | YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages. |
yt-remote-connected-devices | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt-remote-device-id | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt.innertube::nextId | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
yt.innertube::requests | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
Cookie | Duration | Description |
---|---|---|
_dc_gtm_UA-6494714-6 | 1 minute | No description |
_gaexp_rc | past | No description available. |
34f6831605 | session | No description |
383aeadb58 | session | No description available. |
663a60c55d | session | No description available. |
6e4b8efee4 | session | No description available. |
c72887300d | session | No description available. |
cookielawinfo-checkbox-tracking | 1 year | No description |
crmcsr | session | No description available. |
currentware-_zldp | 2 years | No description |
currentware-_zldt | 1 day | No description |
et_pb_ab_view_page_26104 | session | No description |
gaclientid | 1 month | No description |
gclid | 1 month | No description |
handl_ip | 1 month | No description available. |
handl_landing_page | 1 month | No description available. |
handl_original_ref | 1 month | No description available. |
handl_ref | 1 month | No description available. |
handl_ref_domain | 1 month | No description |
handl_url | 1 month | No description available. |
handl_url_base | 1 month | No description |
handlID | 1 month | No description |
HandLtestDomainName | session | No description |
HandLtestDomainNameServer | 1 day | No description |
isiframeenabled | 1 day | No description available. |
m | 2 years | No description available. |
nitroCachedPage | session | No description |
organic_source | 1 month | No description |
organic_source_str | 1 month | No description |
traffic_source | 1 month | No description available. |
uesign | 1 month | No description |
user_agent | 1 month | No description available. |
ZCAMPAIGN_CSRF_TOKEN | session | No description available. |
zld685336000000002056state | 5 minutes | No description |