How to Monitor Employee Computer Activity (& Why You Should)

Employee Monitoring -How to Monitor Internet Use

Want to learn how to monitor employee computer activity? Watch this video to learn more about monitoring employee computer usage with BrowseReporter.

BrowseReporter is a versatile employee computer activity monitoring software for monitoring internet and application usage. CurrentWare’s customers use BrowseReporter to gain advanced insights into employee productivity and technology usage across their organization.

  • Track employee computer activity to see the websites they visit, how long they spend browsing each website, and the category of each site.
  • Get employee activity alerts automatically sent straight to your inbox on a set schedule or when specific computer activities occur
  • Use one of the dozens of employee computer activity reports to make data-informed management decisions, enforce acceptable use policies, and protect your company against unlawful or inappropriate computer usage.


Best Practices for Monitoring Employees

In today's privacy-conscious world employers need to monitor employees in a way that is transparent, minimally invasive, and respectful of employee privacy

Read this white paper to learn the best practices for monitoring employees in the workplace.

Why Monitor Employee Computers?

Thanks for checking out the latest CurrentWare Video. In this video, we’re going to cover the reasons why you should monitor employee computer activity.

If you like this or other videos we’ve produced, hit the subscribe button below. Stay tuned to the end to learn how to get a free trial of all of the software I demo today.

Employee monitoring involves understanding how your employees are using company provided technology during work hours. There are five main benefits and considerations to employee monitoring that we will cover today:

  1. Employee Productivity management
  2. Addressing inappropriate technology usage, legal liability, and compliance
  3. Managing cybersecurity and data loss prevention
  4. Understanding how remote workers / out of office users are engaging with technology
  5. Understanding bandwidth usage and limiting exposure and costs 

So let’s start off with how monitoring can help employee productivity. 

44% of employees admit to being distracted by the internet at work, and employees in the US have admitted to wasting 1-2 hours a day browsing the internet. 

Employees that know they’re being monitored will avoid excessive personal usage of the internet and computer applications. In addition, in the event an employee is underperforming, employee monitoring reports on their computer activity can be used to help the employee understand their actions and enhance their productivity.

The second important reason to monitor activity is to address inappropriate internet usage & avoid legal liability. 

As compliance requirements increase for various businesses, industries & jurisdictions, employers have a responsibility to ensure their employees are complying with regulations such as HIPAA, CCPA, CIPAA and GDPR. 

By enabling computer monitoring, you can ensure that your staff are complying with these requirements. In addition, by monitoring & setting alerts, you can instantly be notified if employees are visiting inappropriate websites such as pornography, adult or other websites.

The third reason to monitor computer activity is for cybersecurity purposes & to prevent data loss.

By knowing which websites an employee is visiting, which files are being downloaded or shared, and which external devices and endpoints are being used, company administrators can manage cyber security risks and data loss prevention efforts. 

Data breaches and associated risks can cost businesses millions of dollars in damages along with reputational risk, so being aware of these risks and monitoring them can provide significant benefits for every organization. In addition, by using alerts, and setting up risk profiles for users, you can audit activities and groups for questionable employee behavior.

Due to Covid-19, the year 2020 has seen a significant shift to remote work for various companies and organizations. This brings us to our 4th reason to monitor an employee’s computer usage: remote workforce management. 

52% of CIOs surveyed suspect that one or more of their mobile workers have been hacked or caused a mobile security issue in the last 12 months. Employee monitoring software can be used to monitor for high-risk activity and verify that employee activity on company networks is legitimate. 

The final reason to monitor employees is for bandwidth management purposes. With CurrentWare’s BrowseReporter tool, you can determine who is hogging bandwidth by streaming videos and uploading/downloading excessively large files. 

Employees who are hogging bandwidth can slow down the entire network, negatively affecting the productivity of other employees and reducing the performance of business critical operations.

That’s it for this video. If you have any thoughts on this video or other reasons why computers should be monitored, feel free to comment below. 

If you’d like to give any of CurrentWare’s computer and device monitoring solutions a try, please check out our free trial at or get in touch with us and we’d be happy to help!

Note: The above video showcases a legacy user interface for BrowseReporter. To see the most up-to-date features and interface please visit the BrowseReporter product page

Why is employee monitoring software so popular? This video shows the key reasons why employers monitor employee computer activity.

Key reasons for tracking employee computer activity

  1. Employee Productivity management
  2. Addressing inappropriate technology usage, legal liability, and compliance
  3. Improving cybersecurity and data loss prevention
  4. Understanding how remote workers / out of office users are engaging with technology
  5. Understanding bandwidth usage and limiting exposure and costs 

Try a Free Trial of CurrentWare’s Employee Computer Monitoring Software

  1. Sign up for the free trial to get the employee monitoring software installation files
  2. Following these installation instructions, install the CurrentWare Console on a manager’s computer and deploy the CurrentWare Clients on your employee’s computers
  3. You are now monitoring employee computer activity. From the CurrentWare Console, you can use BrowseReporter to run employee computer activity reports. These reports allow you to see how your employees are spending their time during the work day.

Sample Reports for Tracking Employee Computer Activity

Hey everyone, this is Dale here. I am the Digital Marketing Manager for CurrentWare.

In today’s video, I’d like to show off the new USB activity dashboards introduced to AccessPatrol in version 7.0.

These dashboards provide a convenient overview of the peripheral device usage of your entire workforce as well as specific groups or users—all from the convenience of a web browser.

They work in tandem with AccessPatrol’s device control features and USB activity reports to protect sensitive data against the security risks of portable storage devices.

Today’s video is just a sneak peek of what AccessPatrol is capable of; as time goes on you can expect to see further enhancements and data points added to these dashboards.

At this time, AccessPatrol can track activities from the following peripherals:

  1. Portable storage devices such as USB flash drives, external hard drives, optical discs, tape drives, and SD cards
  2. and Mobile devices including smartphones, PDAs, and tablets

This device usage data is used to populate various graphs across AccessPatrol’s dashboards. You can further refine how granular this data is by limiting the time frame, selecting only specific groups, and even investigating individual users.

Having these metrics available at a glance makes detecting potential insider threats far more efficient as your organization scales. 

Any groups or users that need to be reviewed further can be investigated using the more granular dashboards and AccessPatrol’s device activity reports.

For a more proactive approach to insider threat management you can set up targeted alerts that will notify designated staff members when these high-risk activities occur. 

For the most up-to-date information on AccessPatrol’s activity tracking and data loss prevention capabilities, visit our knowledge base at or visit the AccessPatrol product page at

 In the overview dashboard you can review the following metrics:

  • File Operations that happened over the selected time period, including the number of files that have been copied/created, the number of files that have been deleted, and the number of files that have been renamed/saved as.
  • Overall Device Activities, with a breakdown of how many of the peripherals were authorized and how many were blocked from use.
  • The Top 5 File Types graph shows the most common file types that are copied/created or deleted to and from portable storage devices
  • The Top 5 Device Types graph shows the most common classes of peripheral devices that are blocked and allowed
  • The Top 5 Files Operations graph shows which groups or users have the greatest number of files that have been Copied/Created and Deleted to and from portable storage devices
  • The Top 5 Devices Activities graph shows which groups or users have the greatest number of Blocked and Allowed devices.
  • And finally, The Activity Log provides access to the raw data, with controls to show and hide certain columns, filter and sort data, conduct searches, and export the data to an Excel spreadsheet or PDF. Each dashboard has their own Activity Log with columns that are relevant to that specific dashboard.

Moving on to the Files Dashboard you will see…

  • A timeline of file operations that shows the relationship between the various operations over the course of the selected time period. This can be used to search for patterns in anomalous device usage, such as peaks in file transfers outside of regular operating hours.
  • You will also see graphs with the Top File Types Copied/Created to internal hard drives and external devices
  • Below that, we have graphs that show the users or groups that have Copied/Created or Deleted the most files
  • And, just like the overview dashboard, there is an Activity Log with the raw data.

Finally, we have the Devices Dashboard

In this dashboard, we have…

  • A device activities graph that shows a timeline with the number of allowed and blocked devices each day. This can be further refined to show an hourly breakdown of a specific day so you can find out what time your users were attempting to use blocked devices. 
  • Next, we have graphs with the users or groups that have the most allowed and blocked devices activity over the selected time period. 
  • Scrolling down to the Activity Log, we can use the sorting controls to take a closer look at the users that have been attempting to use unauthorized peripherals.

As you can see, we have specific users that are repeatedly trying to use devices that have not been approved for use by the organization.

While this could just be an accidental oversight on the user’s part, there’s a risk that it’s something much more serious. 

For example, what if this is actually a disgruntled employee trying to steal trade secrets or sensitive customer data so they can bring it to a competitor, or worse, sell it to cybercriminals on the dark web.

Between the costs associated with a damaged reputation, fines, loss of competitive advantage, and remediation, a data breach like this could completely ruin a company.

Before we confront this employee or send them for retraining, let’s investigate this incident further so we can make an informed decision.

Clicking on this user, we’ll be taken to a dashboard that focuses exclusively on their activity. 

Looking at the Devices graph we can see that they have made multiple attempts to use blocked devices. 

Scrolling down, we can see that they’ve been trying to use unauthorized portable storage devices.

Since AccessPatrol is currently blocking any devices that are not explicitly allowed, I know that the only way sensitive data is leaving through a USB drive is if it’s a device that we’ve allowed before. So, let’s take a closer look at how they’ve been using their approved devices.

As you can see here, the types of files that they are transferring are more than capable of containing sensitive data; let’s take a look at the file names for more details.

With the Activity Log we can use the filters, sorting, and column options to isolate our view to the entries we’re the most interested in. 

Once we find something that looks off, we have more than enough information to confront this employee and take any necessary corrective actions.

Ready to protect your sensitive data against theft to USB portable storage devices? Block and monitor peripheral device usage today with a free trial of AccessPatrol, CurrentWare’s USB control software.

Simply visit to get started instantly, or get in touch with us at to book a demo with one of our team members. See you next time!

What Is Employee Monitoring Software?

Remote Employee Monitoring Software - Productivity, Security, Analytics

Employee monitoring software—also known as employee desktop monitoring software or computer monitoring software—is a software solution that business owners use to monitor employee computer activity. Employers use employee monitoring software for insider threat detection, to improve employee productivity, and to gain insights into how their employees work.

Employee monitoring software gives business owners, managers, and IT staff members insights into how employees use technology in the workplace. These insights can be used to evaluate employee performance, as a time tracking tool for remote employees, or to analyze employee activity for high-risk or anomalous behavior.

Learn more: What is Employee Monitoring Software?

What to Look for in the Best Employee Monitoring Software

With so many vendors to choose from, it can be difficult to pick the best employee monitoring software for your needs. During your evaluation, keep an eye out for these employee and computer monitoring features to make tracking employee computer activity effective for your company.

Productivity Tracking

BrowseReporter productivity dashboard - individual user

Most employee monitoring solutions include features that assist with tracking your employees’ productivity. The best employee monitoring software will help you track employee performance by tracking employee activity on websites and applications.

These employee monitoring solutions will include the ability to define which applications and websites are considered productive, unproductive, and neutral in your organization.

Since an app or website that’s deemed productive for one job function may be considered unproductive for another, the best employee monitoring software will allow you to customize what is considered productive and distracting activities for each department.

For example, social media activity is a critical function of many marketing roles and should be considered productive, whereas it would not be work-related for most other roles.

Employee Internet Activity Monitoring

employee internet mangement - handle workplace internet abuse

One of the most common uses of employee desktop monitoring software is website tracking. Monitoring employee internet use in a company can ensure that websites such as social media, pornography, and phishing sites are not being accessed on company devices.

Monitoring employee activity in this way improves employee productivity by providing business owners with evidence of excessive web browsing. Website tracking is also an important security feature as high-risk user behavior could help compromise the network.

This data can be shared with employees so they can use the insights to improve their work performance.

Application Usage Tracking

Application Tracking - Save Money on Unused Software

Using employee monitoring software to track the computer applications used by employees helps measure software license utilization rates, identify the excessive use of unproductive software, and detect unauthorized programs.

Without this visibility, a business could fall victim to shadow IT related security vulnerabilities. While not all unauthorized programs are malicious it’s critical that monitoring tools are in place to detect any software that needs to be managed by the IT department.

Active Time vs Total Time Tracking

Idle Time Tracking - How active are your employees? CurrentWare

Time tracking with employee monitoring software can provide incredibly valuable insights, but only if the reports are truly accurate.

Employee monitoring software that tracks active time will track how long applications and websites are actively used by the users, whereas  employee monitoring software that only tracks total time report a list of applications and websites that were open on the computer without properly contextualizing whether the employee was actually using them or if they were simply opened and left running in the background.

The best employee monitoring software will have the ability to report what employees are truly doing. The reporting of active time allows IT administrators and managers to trust and understand the reports generated, giving them the opportunity to generate actionable outcomes from the employee activity data.

Custom Data Retention Settings

Organizations that have a legal requirement to use employee monitoring software need to ensure that the data is accessible for review. 

Employee monitoring software with configurable data retention settings makes auditing, compliance, and storage less of a hassle for large-scale deployments. The ideal employee monitoring software will allow the organization to store the data indefinitely to ensure that records are maintained as long as needed.

Automated purging saves organizations considerable costs on storage and administration as they will not need to manually purge the data, purchase new storage hardware, or upgrade to a greater storage volume with their cloud storage provider.

This automated culling is especially important for any business that is subject to data privacy legislation. These regulations typically require that employee information is only kept for as long as it is relevant and necessary for the company. 

Remote Workforce Management

remote workforce management - Essential Tools for managing a remote team

The modern workforce is no longer exclusively in-house and 9-5 – they are a mix of traditional and non-traditional staff such as remote workers, transient workers, hybrid workers, contractors, and temporary workers. 

The rising demand for flexible work options means that employee monitoring software solutions need to have the flexibility and features to support the unique needs of a blended workforce.

To monitor out-of-office employees, the software must support one of the following:

  • Local caching to allow for the temporary local collection of user behavior data until they are re-connected to the company’s internal network
  • Port forwarding to allow for live monitoring of out-of-office workers
  • The ability to deploy the employee monitoring software to a cloud server

Tracking of Both Users & Devices

A group of employees reviewing reports

Device monitoring will track all activity on a specific device whereas user monitoring will track the individual user regardless of the device they use. 

In a workplace setting where the employer wants to understand the browsing habits of individual employees, device-level insights may not provide sufficient details as their employees may not have a designated workstation (in the case of hot desking) or they may share devices with their coworkers.

When selecting an employee monitoring software vendor, organizations should ensure that both device-level and user-level monitoring is available to provide them with the best flexibility for their needs. Having access to both features is excellent for tailoring the insights reported based on the unique needs of managers, human resources, and IT administrators.

Administrative Permissions & Groupings

AccessPatrol central web console close up

The best employee monitoring software will support user grouping features such as Organizational Units (OUs) within Active Directory. This allows administrators to efficiently implement and adjust bespoke settings based on department, location, user, the types of information handled, and other important considerations. 

Bespoke settings ensure that the solution does not cause a bottleneck in productivity. Inflexible employee monitoring software will cause less at-risk users to have the same policy restrictions and monitoring policies as users that perform tasks with sensitive information such as personal health information (PHI).

For large enterprises and other expanding organizations, the ability to group users and devices based on location, department or role is crucial to limit the time investment required in managing the monitoring solution. 

Best-in-class employee monitoring software solutions allow for granular control of the product’s features including who can run reports, who has access to a given group’s reports, and who will receive automated email reports based on the activity of the designated groups.

Real-Time Alerts & Notifications

Real-time alerts and other employee monitoring software notifications are a critical component of insider threat management as they can be configured to alert administrators to insider threats engaging in suspicious or risky behavior. 

Real time alerts can include: 

  • File Operations Alerts: Alerts when an attempt is made to copy files to an unauthorized external storage, when sensitive file types are being accessed, or other suspicious file operations. This is especially useful for preventing breaches caused by malicious insider threats.
  • Inappropriate Website Use: An employee attempts to access websites that are considered not safe for work (NSFW) in the organization.
  • Browsing/Bandwidth Limit Reached: An alert can be sent to users when they have exceeded their allotted browsing time or bandwidth usage for the day.

CurrentWare’s Employee Productivity Tracking & Security Software

CurrentWare is a software suite that includes the best employee monitoring software, device control software, web filtering software, and remote PC power management software. Each solution operates from the same central CurrentWare console; they can be purchased separately for the most flexibility or as a full suite for the best value.

CurrentWare is hosted on-premises with deployment options that support the monitoring and managing of remote workers. It can be installed transparently or in stealth mode, with the monitored employee oblivious to the software’s activities. Due to the lack of a mobile app or cross-platform support it is best used in Windows-based environments.

With CurrentWare you can monitor employee web browsing and software usage, prevent the use of unauthorized USB devices, and block access to certain apps and websites that are against your company’s standards.

When monitoring internet use, CurrentWare’s employee monitoring software BrowseReporter differentiates between active time and idle time to indicate if the employee was actually using their computer and whether or not they were actively browsing a given website.

Automated email alerts can be configured to notify managers, HR, and security personnel when unwanted activities occur such as visiting inappropriate websites or transferring files to USB storage devices.

Overview of Each Module

BrowseReporter Employee Monitoring Software

BrowseReporter is the best employee monitoring software for tracking the websites and applications your employees use. It is the ideal tool to monitor employees for enforcing acceptable use policies, improving employee productivity and efficiency, and protecting your network against unwanted computer activities. 

With BrowseReporter employee monitoring software installed on your employees computer it will capture the websites they visit and the applications they use. It includes a reporting utility for generating tabular and graphical user activity reports.

BrowseReporter employee monitoring software includes an employee productivity report that compares the time that employees spend on websites and applications that are productive vs those that are not. These classifications are pre-determined to start and can be customized to better fit what is considered productive for your organization.

AccessPatrol Device Control Software

AccessPatrol is a device control software that provides a proactive solution for protecting company data against data theft.

AccessPatrol includes device control features for a variety of peripheral devices including USBs, CD/DVDs, BlueTooth, WiFi, FireWire, iPods, and MP3s. Granular device control policies can be customized for each user, department, or organizational unit.

Company-authorized peripheral devices can be added to an allow list and temporary access codes can be generated by administrators to bypass restrictions in special circumstances. This provides companies with the means to monitor and restrict USB device use without affecting productivity and collaboration.

AccessPatrol also functions as an employee monitoring software for tracking USB activity. It includes USB activity dashboards as well as file operations alerts that can be configured to notify IT administrators of suspicious USB activities, making it a valuable data loss prevention and security compliance tool. 

BrowseControl Web Filtering Software

BrowseControl is an easy-to-use web filter that helps organizations enforce policies, improve productivity, reduce bandwidth consumption, and meet compliance requirements – no matter where their users are located.

With BrowseControl you can ensure a safe and productive environment by blocking high-risk, distracting, or inappropriate websites, improve network performance by blocking bandwidth hogs, and prevent users from using unsanctioned applications and software-as-a-service providers

BrowseControl’s security policies are enforced by a software agent that is installed on your user’s computers. This allows the solution to continue blocking websites and applications even when computers are taken off-site.

BrowseControl’s central console allows you to configure your security policies from the convenience of a web browser. 

With BrowseControl you can Block or allow websites based on URL, category, domain, or IP address, assign custom policies for each group of computers or users, prevent users from launching specific applications, and block network ports to reduce the attack surface of your network

There are three key methods for blocking websites with BrowseControl:

The Blocked List allows you to block specific websites based on URL, domain, or IP address

Category Filtering allows you to block millions of websites across over 100 content categories including pornography, social media, and virus-infected sites.

and finally, you can use the Allowed List to allow specific websites that would otherwise be blocked based on their category, or for the greatest security and control you can block all websites except for those that are on the Allowed List.

When your users try to visit a blocked website they can either be presented with a custom warning message or directed to another site, such as a page with a reminder of your organization’s internet use policy.

With BrowseControl’s App Blocker you can prevent your users from launching specific applications.

Simply select the group you would like to restrict, enter the Original Filename of the application to the Application List, and add it to the blocked applications list.

When the user tries to launch the blocked application they can be presented with a custom warning message that alerts them of the restriction.

BrowseControl is best used in tandem with our computer monitoring software BrowseReporter. Using both solutions provides the visibility and control you need to ensure that your organization’s computers are being used appropriately.

Don’t let internet abuse run rampant in your organization. Take back control over web browsing with a free trial of BrowseControl.

Get started today by visiting

If you have any technical questions during your evaluation our support team is available to help you over a phone call, live chat, or email.

Thank you!

BrowseControl web filtering software blocks websites based on URLs and content categories. Granular internet restriction policies can be customized for each user, department, or organizational unit. It includes other device restriction features such as an app blocker, port filter, and internet restriction scheduler.

enPowerManager Remote PC Power Manager

enPowerManager Logo, remote computer power management software

enPowerManager is an effective solution for remotely managing PC power policies. The central console allows businesses to configure advanced power policies and establish automatic startup and shutdown times to conserve energy and reduce costs.

enPowerManager includes reports on computer power states such as logon/logoff times and reports with timestamped startup/shutdown/sleep events. These reports help technicians identify the uptime of remote endpoints and allows managers to verify that offsite employees are logging in and out during expected timeframes.

You can use enPowerManager’s logon auditing reports in tandem with BrowseReporter’s employee monitoring software data to get a complete picture of employee productivity.

CurrentWare Employee Monitoring Software Pricing

A hand counts several $100 US bills

The full CurrentWare Suite starts at $8.99 USD per license per month for companies that purchase less than 100 licenses. 

When purchased individually, BrowseReporter, AccessPatrol, and BrowseControl start at $3.99 USD per license per month for companies that purchase less than 100 licenses. enPowerManger starts at $1.99 USD per license per month.

There are discounts available for large volumes of licenses, educational organizations, non-profits, managed services providers, and businesses that pre-purchase multiple year plans.

CurrentWare offers a 14 day free trial for up to 10 team members.

CurrentWare Employee Monitoring Software Reviews

"When we first saw the employee tracking reports we were totally surprised by some of the behaviors that had gone under the radar" - Kevin Porsche, IT Admin, Shady Maple

”As a ‘novice’ I was able to set up with help from support in about an hour. Previous software took forever and didn’t work as advertised; this software worked right out of the box. It allows my workers to use the internet and make money for the practice without distraction/temptation to use personal websites/email/shopping.”
Gerard B., Office Manager

”The team and product have been nothing but a great experience. I’m glad I found this product because I was able to fill a hole in our security footprint quite easily. The team at Currentware reaches out quite frequently to check-in and even have me demo future deployments for feedback.”
Nicholas S., IT Service Desk Supervisor

”We are able to make sure employees are not spending work time on the internet, and if there is an issue we have the documentation to prove it.”
Ken W., IT Manager

”I have found the Real-time monitoring in conjunction with the Active vs Total Browsing time reports to be extremely helpful in getting the full picture of how efficient our workforce really is.”
Scott S., Sr Systems Engineer

Tips for Managing Employee Privacy When Using Employee Monitoring Software

Employee monitoring is an excellent tool for understanding how your workforce operates.

Unfortunately a history of overly-invasive deployments has caused serious concerns among employees, like:

Is my employer spying on me?

They’re just doing this to find an excuse to fire me

If they’re monitoring what I do at work, they obviously don’t trust me

This is not what you want your employees to feel. 

In this video I’m going to guide you through the best practices for monitoring employees so you can avoid these mistakes and concerns from your employees

Hello and welcome to the CurrentWare YouTube channel. 

My name is Neel Lukka and I am the managing director here at CurrentWare.

After watching this video you can learn more about this topic by reading our new white paper “Employee Monitoring: Best practices for balancing productivity, security and privacy”

You can find the link for that in the description below.

Before we start, I just want to give a quick disclaimer here. 

I’m not a lawyer and this is not legal advice. These tips are for informational purposes only. If you want to use employee monitoring software in your company be sure to consult with a legal professional first.

Alright, let’s jump in

First up is the very best tip I can give you.

If you want to succeed, you have to let your employees know that they are being monitored.

Employees that do not know if they are being monitored, why they are being monitored, and how they are being monitored are more likely to have negative reactions to being monitored

such as

Having higher rates of stress and anxiety

Being less likely to accept being monitored

And, ironically, becoming less productive

That’s not to say that transparency is going to negate each and every concern that your employees may have.

But if you start with transparency from the very beginning you have a far better chance of proving to your employees that these tools aren’t being used to spy on them. 

By being transparent you’re also giving the chance to hear about their concerns from the start. This lets you work with them to make an employee monitoring strategy that is fair and minimally invasive.

Here are 4 transparency boosting tips:

Involve a representative sample of employees when you start planning your goals and the metrics you want to capture

Tell your employees what metrics are being captured, how they’ll be used, and what is being used to capture them

Have your staff read and sign policies that disclose your intended use of the employee monitoring software

and finally, give them access to their own data so they can see exactly what’s being captured. They can even use this data to manage their own productivity, which is a major bonus

The second tip I have for you is don’t use employee monitoring to micromanage

One of the reasons that monitoring can be perceived negatively is that it feels like it’s being used to punish employees. They worry that it’s the software equivalent of a micromanaging boss staring over their shoulder while they work, just waiting for them to slip up.

Some employers do monitor internet use to make sure employees aren’t getting carried away, but did you know that so-called “unproductive” internet browsing has actually been found to have a positive impact on productivity?

It’s true! But only if that browsing doesn’t take up more than 12% of their work time.

Employees feel far better about being monitored when they’re given the autonomy to self-manage first. Managers can step in if things are getting carried away or if their employees are visiting clearly inappropriate websites.

The third and final tip I have for you today is to not monitor more than you have to.

Think about it this way – if I told you that I wanted to make sure that employee’s weren’t visiting not safe for work websites, you’d think I was crazy for asking for a direct feed into their webcams. 

The bottom line is this: 

If you can meet your company’s goals with a less invasive method of monitoring, do it that way.

For example, if you want some backup for your acceptable use policies you can use internet monitoring software to see what sites are being visited. 

But there’s no need to track individual keystrokes

Or maybe you want to protect data from being stolen. You can monitor the flow of data without recording audio clips of private conversations

Finally, maybe you want to track the work habits of employees that are working remotely or from home. Give them a company-provided device rather than monitoring their personal computers

That’s it for now. 

If you want learn more, check out our new white paper “Employee Monitoring: Best practices for balancing productivity, security and privacy”

You can find the link for that in the description below.

If you’d like to try out employee monitoring in your company, visit for a free trial of BrowseReporter, our computer monitoring software.

And as always stay tuned to our YouTube channel for more videos about employee monitoring, cyber security, and CurrentWare’s workforce management software.

When implementing employee monitoring software an employer has the responsibility of maintaining employee privacy expectations. While employers generally have the right to monitor employee activity on company-owned computers they must balance their legitimate business interests with data collection and privacy laws such as the California Consumer Privacy Act.

Tips for protecting employee privacy when using employee monitoring software

  • Expectation of Privacy: Employers must set clear workplace privacy expectations by notifying their employees about the employee data they intend to collect. You can inform employees about the use of employee monitoring software with a company policy such as an electronic monitoring policy.
  • Transparency: Ensure that employees understand how data is being collected, what data is being collected, and how that data will be used.
  • Limit Invasiveness: A privacy-first employee monitoring strategy tracks the minimum inputs needed to meet its stated purpose. For example, if the stated purpose is to enforce documented acceptable use policies this goal can be readily met through monitoring employee internet activity. Capturing webcam feeds and tracking individual keystrokes would be far more invasive than necessary.
  • Clear Purpose: Employers must understand why they are collecting employee data so they can use it appropriately and only collect what is necessary. Employee monitoring tools can be used to track employee productivity, improve the visibility of remote workers, protect company devices against misuse, time tracking/employee attendance tracking, and detecting insider threats, among other uses.


Best Practices for Monitoring Employees

In today's privacy-conscious world employers need to monitor employees in a way that is transparent, minimally invasive, and respectful of employee privacy

Read this white paper to learn the best practices for monitoring employees in the workplace.

Employee Monitoring Software Case Studies

Shady Maple Follows Best Practices

“The employees find the reports to be an extremely helpful self-analysis tool, and use the reports to analyze and reconfigure priorities!”

Shady Maple is a farm market and fresh produce distributor based in Eastern Pennsylvania, USA. They use employee monitoring software and web filtering software to manage employee productivity and enforce the acceptable use of technology in the workplace.


During a period of rapid expansion Shady Maple realized that they needed to adapt their productivity management methods to scale with them. Excessive unproductive web browsing and file downloads were hogging the available bandwidth and distracting their employees. Without centralized access to web activity data they had no way to address this misuse of company resources.


Employee monitoring software reports from BrowseReporter gave Shady Maple the exact insights they needed to address the misuse of technology in the workplace. They could readily identify the websites that were responsible for excessive bandwidth consumption, address inappropriate web activity in the workplace, and provide employees with an opportunity to self-manage their non-work web browsing.

BrowseControl’s category web filtering feature provided Shady Maple with a quick and convenient solution for proactively blocking websites that were known to contain pornography and other unsuitable content for their workplace.


  • Improved bandwidth availability. Bandwidth usage reports provided an opportunity to coach employees on Shady Maple’s internet use policies and block frequently abused websites that were unproductive and bandwidth-intensive. Employees were delighted by the increased productivity caused by improved network speeds.
  • A safer workplace. Shady Maple protected their network and their employees from unsafe and inappropriate websites. Continuous monitoring and web filtering became an integral part of their operations, allowing them to detect and block high-risk web activity.
  • Greater employee engagement. Direct access to their own web activity reports empowered Shady Maple’s employees to self-manage their productivity. With a scalable way to manage internet abuse without sacrificing autonomy Shady Maple noticed immediate improvements in the productivity of their employees.
  • Data-informed management. Employee monitoring reports gave Shady Maple’s Human Resources department the ability to present tangible evidence of disinclination to employees who had been underperforming.

Barclays’ Lack of Transparency Backfires

“The stress this is causing is beyond belief. It shows an utter disregard for employee wellbeing. Employees are worried to step away from their desks, have full lunch breaks, take bathroom breaks or even get up for water as we are not aware of the repercussions this might have on our statistics”

Barclays whistleblower via City A.M.

Barclays is a bank based in the UK. As they process data of European citizens they are expected to be compliant with GDPR’s data processing requirements. A lack of transparency surrounding their employee monitoring practices prompted an investigation in August of 2020 by the Information Commissioner’s Office (ICO), the United Kingdom’s privacy watchdog. 


Barclays installed employee productivity monitoring software on their employee’s workstations without their knowledge, consultation, or informed consent. Employees unexpectedly began receiving automated warnings once they fell below a certain activity threshold. The time that employees normally spent away from their computers became a source of inactivity that the program used to determine who would receive the warnings. 

Because Barclays did not communicate their intentions before implementing the employee monitoring software solution, their employees were uncertain as to how their activity data would be used. They became increasingly concerned that time spent stepping away from their desks, having full lunch breaks, or taking bathroom breaks would be used against them in performance evaluations.


Barclays wasn’t wrong for wanting to use employee monitoring software to improve employee productivity. Unfortunately their implementation lacked the transparency necessary to communicate the goals and intentions of their solution adequately. The combination of ambiguity and automated warnings caused their workforce analytics project to be perceived as an oppressive top-down disciplinary tool. 

Improve Employee Productivity With BrowseReporter

BrowseReporter gives us exactly what we needed. I can easily see exactly what sites people are visiting, when they visit them, and how long they stay there.

Ready to get advanced insights into how your employees spend their time? Reach out to the CurrentWare team for a demo of BrowseReporter, CurrentWare’s employee and computer monitoring software.

Sai Kit Chu
Sai Kit Chu
Sai Kit Chu is a Product Manager with CurrentWare. He enjoys helping businesses improve their employee productivity & data loss prevention efforts through the deployment of the CurrentWare solutions.