Time Theft—Are Your Employees Stealing Time at Work?

Employee time theft; who's actually working?

Whether through maliciousness or negligence, time theft at work is a pervasive practice among salaried and hourly employees alike.

A Forbes article has even stated that the average employee steals approximately 4.5 hours per week from their employer, totaling nearly 6 full work weeks per year. This costs businesses hundreds of billions of dollars a year worldwide.

This article will help employers and managers understand the causes of employee time theft at work, the types of time theft, and how to optimize employee time for the company’s benefit.

Software to Spot & Prevent Employee Time Theft

BrowseReporter is a versatile computer user activity monitoring software that helps organizations enforce policies, meet compliance requirements, and understand how their users operate – no matter where they’re located.

BrowseReporter’s detailed user activity reports provide insights like…

  • Are our users following organizational policies? Are there any unwanted activities that need to be addressed?
  • How engaged are our users? Do they spend the majority of their time on-task? And…
  • Are our users making use of the software we’ve invested in? Should we reduce the number of licenses we pay for?

The computer activity data is collected by a software agent that is installed on your computers. The agent connects to a database on your organization’s network, allowing you to maintain complete control over the data.

BrowseReporter’s central console allows you to run reports on your user’s computer activities from the convenience of a web browser. 

There are dozens of reports to choose from, including…

  • User productivity reports with an overview of how much time was spent on websites that are productive, unproductive, or neutral. These classifications can be customized to match what is productive for your users.
  • There are also detailed internet activity reports that show you what websites your users have visited, how long they spent browsing each site, and the amount of bandwidth consumed.
  • And finally, the application usage reports show you what software is being used, how long it was used for, and who was using it.

BrowseReporter’s reports can be generated on-demand, on a set schedule, or automatically sent to your inbox to alert you of specific events.

Using the End-User Reports feature you can even provide your users with on-demand access to their own data. This lets them benefit from the insights that you have.

BrowseReporter can even be deployed with optional privacy-enhancing features.

You can…

  • Display a custom message to notify users that they are being monitored
  • Make the client visible in the system tray
  • Stop monitoring outside of standard operating hours, and…
  • Disable certain types of tracking altogether 

These optional features allow you to customize your BrowseReporter deployment to fit the needs of your organization.

BrowseReporter is best used in tandem with our web filtering software BrowseControl. Using both solutions provides you with the visibility and control you need to ensure that your organization’s computers are being used appropriately

Ready to make data-informed decisions? Get actionable insights into the activity of your users with a free trial of BrowseReporter.

Get started today by visiting CurrentWare.com/Download

If you have any questions during your evaluation our technical support team is available to help you over a phone call, live chat, or email.

Thank you!

Want to ensure that your employees are focused on their tasks? With CurrentWare’s employee computer monitoring software, preventing time theft at work is as easy as installing the solution on your employee’s computers, blocking distracting websites, and running reports on their computer activity from a convenient central console.

  • Track web browsing including time spent on each site, the exact URL, the web page title, and more
  • Monitor application usage to see who is playing games or using unauthorized software
  • Track idle time to see how active your employees are on their computers
  • Monitor bandwidth usage to see who is slowing down the network with Netflix, Twitch, and Sports streaming
Table of Contents

What is Time Theft?

Time Theft In The Workplace

At its core, time theft occurs when an employee accepts payment for work or time they did not actually complete. This practice comes in a range of severity, from employees mismanaging their allocated break times all that way up to intentionally fraudulent claims.

This practice is not always done maliciously, as is the case when employees accidentally forget to punch in/out on their time cards or if a lack of employee time tracking infrastructure causes them to overestimate time spent on work or underestimate time spent on breaks.

This theft of time goes both ways, too. A 2018 report from Good Jobs First and the Jobs With Justice Education Fund found that many leading U.S. employers have engaged in wage theft to reduce their payroll expenses. These payroll-profiting practices include forcing employees to work off the clock or depriving them of required overtime pay.

On the employer’s side, in 2011 the American Society of Employers estimated that 20% of every dollar earned by a U.S. company is lost to time theft at work.

Types of Time Theft (How do Employees Steal Time?)

In addition to what is covered in this section, time theft at work could also include “cyberloafing” with social media and personal emails, “goofing off”, spending excessive time socializing, sleeping, playing games, working unauthorized overtime, exaggerating the time spent working on tasks, and working on personal tasks and projects at work.

Buddy Punching

“Buddy Punching” is a form of time card fraud where an employee clocks in on the behalf of another employee, allowing them to get paid for time that was not spent at work.

The American Payroll Association reported in 2017 that buddy punching costs employers $373 million annually.

Buddy punching is used by an employee to fraudulently claim that they worked hours that they were not actually present for. For example, this could range from having someone punch them in when they are running late from an allocated break to taking entire days away from work while claiming their time was spent working.

A 2017 survey conducted by PollFish found that 16% of US workers aged 18+ admitted to participating in buddy punching and time clock fraud. This high percentage of buddy punchers should be alarming to all companies, especially considering that some people surveyed would likely not even admit to committing time clock fraud themselves.

Fraudulently clocking in on a time clock may run afoul of various laws. Those that are caught stealing time by intentionally manipulating their time clock may be subject to an employee time theft punishment including and up to dismissal.

Overextending Allocated Breaks Without Permission

man a little too relaxed in an office, his feet are on the desk

There are many different types of work breaks and the amount of time allotted to each can vary. The most common types include lunch, bathroom visits, smoke breaks, snacking, and general rest.

In most instances, staff members can be allotted 30 minutes to an hour for a standard lunch break. In more labor-intensive jobs, it is common practice for the boss to allow more frequent and/or longer breaks in order to prevent exhaustion. 

Overall, there are many studies that promote the health benefits that come with allowing employees to take brief pauses throughout the day, including this study by Science Daily that claims employees who take a break every hour are more productive than those that don’t.

So, there’s not much of an argument against allowing pauses throughout the work day. In fact, there are laws throughout federal and local governments that mandate them. But what happens when employees start abusing the amount of time they spend on break and take longer rest periods than allowed?

Let’s do a quick extrapolation and see how it breaks down over the course of a year.

Employee X takes a 40 minute lunch instead of their allotted 30 minutes each day. Over the course of a 5 day work week, that’s 50 minutes per week that is wasted. 200 minutes over the period of a month. 2,400 minutes throughout the year. 

That’s a total of 40 hours wasted annually on lunch breaks alone, the equivalent of an entire week’s worth of work. If Employee X is being paid $20/hour, then their actions costs $800 annually in lost time.

When breaks become an excuse for excessive personal time at work, your business is losing precious employee time and attendance.

Misuse of the Internet (Smartphones Too!)

An employee browsing the Internet on a laptop computer with different websites that are being tracked by the Internet monitoring software.

Technology has helped practically every type of business develop its services and workforces to be more connected, convenient, and accessible. Computers, smartphones, and the internet help companies connect with customers and allow large workforces to easily collaborate on group projects.

Without the internet and its technologies, many companies would not even exist. But, despite its necessity and many benefits, the internet can be misused by employees in a way that can cause major loss for a business.

The International Data Corporation estimates that 30 to 40 percent of employee internet activity is non-work-related. This misuse of the internet in the workplace is costing US businesses $63 billion in lost productivity each year, according to Websense Inc.

The internet has been around for decades at this point, and we all have likely witnessed an employee switching the screen on their desktop so that they don’t get caught playing games, checking their personal email, or scrolling through their social media feeds during their shift. 

While it’s true that short, frequent breaks make people more productive, excessive unproductive web browsing may cause employees to lose more working hours than they realize.

Employers can use employee and computer monitoring tools to track and correct excessive cyberloafing; but what about employees who simply use their smartphones?

With smartphones in everybody’s pocket, staff members can freely check social media, stream movies, and play time-consuming games without being caught. 

Smartphones make employee productivity management a difficult task: 

  • They’re personal devices, so you can’t monitor or restrict web browsing and app usage on them like you can on a business-provided device.
  • Even if the office network’s WiFi is filtered and monitored, staff members can readily use their personal data plans to surf the web.
  • Even with surveillance cameras in place, staff members can just take their phones to an area without video surveillance.

However, unless you work in an industry with above-average security requirements (such as national defense and other highly classified government environments), outright banning cell phones isn’t the right way to go.

Banning cell phones in the workplace for productivity reasons could harm morale by communicating to employees that they are not trusted to self-manage their own workloads. As a best practice, you should focus less on the individual ebbs and flows of concentration and more on the quality and timeliness of the employee’s output.

Paid Leave Fraud

Man writing in notebook

One of the more extreme and legally technical forms of time theft occurs when employees abuse their organization’s paid leave program.

Whether it be for new parents, or for those who are battling a chronic or debilitating illness, paid leave is common within most companies and is often backed by government policy and programs.

Unfortunately, the steps that are involved in permitting a paid leave for an employee can be extensive, and there have been many cases in which the employee was abusing their paid leave.

In Ottawa, Canada, a city employee was found to have taken a total of 32 annual leave days over a number of years without ever recording it into the time tracking system. 

Another employee from the same municipal workforce was found to have been handing in medical notes in order to claim paid time off while actually working for a different business during those paid leave days.

When paid leave is granted, it is the organization itself that needs to pay the employee during their leave. Fraudulent abuse of the paid leave system causes significant business losses.

Why Does Time Theft Happen?

Employee Burnout

A man sits at his desk working on a computer. The shadowy figure of a colleague looms behind him.

Employees are more likely to commit time theft at work when they are burnt out. Chronic stress, a toxic workplace culture, and a lack of equity in the workplace are all potential triggers for burnout in employees. Employees that become burnt out will be actively disengaged and far more likely to commit time theft as a way of getting back at their employers.

Employees that do not feel fairly compensated for their efforts or are otherwise dissatisfied with their work-life are less engaged and are more likely to exhibit counterproductive work behaviors (CWB) such as a lack of engagement, excessive personal activities during work hours, or fraudulently reporting hours worked.

Financial Troubles

A hand counts several $100 US bills

Employees that are experiencing financial distress are more likely to steal time from their employer. They may manipulate their time card to misrepresent the time they spend on the job site in order to be paid for work that they did not put in. 

Stealing time in this way may also provide a window of opportunity for the employee to work a second job for a few hours per week while claiming that time on their primary employer’s time clocks. This payroll manipulation allows those in financial distress to illegitimately claim more hours on their payroll.

Poor Supervision

One of the most prevalent causes of time theft at work is quite simply poor on-site supervision.  When unscrupulous employees know that they can get away with stealing business time by playing games, taking extended breaks throughout their shift, making excessive personal phone calls, and browsing the internet while on the clock they could be incentivized to do so.

While managers should not be micromanaging all of the time their staff spends at work, there needs a culture of accountability in place to avoid payroll manipulation and disengagement. One employee accidentally running late from their 60-minute lunch break may be no big deal but employers need to be willing to perform corrective actions to prevent intentional types of time theft.

Tools such as scheduling software help improve employee supervision with insights into how employees are allocated and how they are expected to spend their time.

Lack of Motivation

A woman in professional attire stares off-screen, distracted

Employees that are unmotivated by their daily tasks are far more likely to waste company time and become time thieves. Whether the work is too easy or simply uninteresting, workers will often find non-work-related activities to pass time through the day.

To keep employees engaged while on the clock you should provide more rewarding tasks. Depending on the individual employee a more rewarding task could be one that is more challenging, requires more relevant skills, or involves added responsibility.

Workplace Culture

Employees that avoid work while on the clock may be influenced by their immediate colleagues and managers. For example, if low-level forms of time theft at work are prevalent and consistently left unaddressed this will create a culture that employees use as an example of what is acceptable for them to do.

Another way that company culture can contribute to supporting various types of time theft is when employees are in an environment that disproportionately punishes tardiness. 

Naturally, excessive time mismanagement needs to be addressed to prevent time theft at work. That said, if a few minutes per week is punished too severely the lingering fear of punishment may incentivize an employee to consider buddy punching or other forms of punch clock manipulation rather than being transparent about their accidental 61-minute lunch break.

Lack of Clear Guidance & Accountability

A group of employees in a meeting

Time theft can occur when employees are not given clear expectations. If employees are not aware that the less-malicious examples of time theft (excessive socializing, over-extending breaks, etc) are a concern for the organization, they may inadvertently participate in these activities without a second thought.

By clearly communicating expectations for time spent at work and enforcing those expectations through formal policies, codes of conduct, regular message reinforcement, and monitoring, you can establish a baseline with which employees can operate from and allow them to be coached to better suit the needs and expectations of your organization

On the other hand, time theft can also happen maliciously.

Sometimes employees that willingly engage in time theft may also be doing so simply because the opportunity is present. Part of an organization’s time theft mitigation strategy needs to account for this possibility by implementing systems that can accurately track and verify employee time.

Unscrupulous Employees Working From Home

Cybersecurity Risks of Remote Workers

A lot has happened since the COVID-19 pandemic first hit in March of 2020. One of the biggest changes to many people’s daily lives has been the shift to working from home. 

With the virus’ ability to quickly spread, employers were forced into adapting work from home strategies in order to keep afloat. This meant that workers were taking their office equipment to their homes and make-shifting their own sort of office environment in order to emulate a traditional work experience.

But the fact remains that a home office is not a traditional office space, and with that comes the inevitable fact that employee supervision for remote workers is very hard to manage. Without the oversight of managers and peers, employees working from home are susceptible to a wide range of distractions. Disgruntled or unscrupulous workers may even take advantage of this lack of visibility to steal time from their employers.

These incidents can range from running personal errands during work hours, not working their agreed-upon hours, or taking extended breaks while on the clock without the support of their business. Each of these distractions costs companies money in time lost and are prime examples of remote employee time theft.

How to Prevent Time Theft at Work

Secure Time Cards & Time Tracking

Idle Time Tracking - How active are your employees? CurrentWare

Gone are the days of Fred Flintstone and Barney Rubble clocking into their job with an old timesheet on the old time clock. With a modern automated time clock or time tracking application that uses multi-factor authentication systems you can reduce the risk of buddy punching on time clocks and maintain an accurate payroll.

Time & Attendance Policy

A businessman hands a piece of paper and a pen to their employee to sign

Clear guidance and policies/codes of conduct are essential tools for establishing accountability, communicating expectations, and preventing punch clock/payroll manipulation.

Organizations need to develop time and attendance policies that are appropriate for the job at hand and easy enough for employees to understand. These policies should be regularly reviewed and administered in order to prevent employee time theft.

With your time and attendance policies set, your staff will have a pillar to be held accountable to. Ensure that they clearly understand your organization’s expectations and reinforce their accountability to those expectations through enforcement and coaching.

Block Unproductive Websites and Apps

Screenshot of BrowseControl URL filter blocked websites list
With BrowseControl’s URL Filter you can block unproductive websites

Internet time theft is one of the most pervasive example of time theft at work. With internet time theft, employees spend excessive personal time on unproductive websites and applications. Actively disengaged employees use these types of time theft to avoid work responsibilities and misrepresent the time they spend on their tasks.

A Gallup report found that actively disengaged employees cost the U.S. $450 to $550 billion per year in lost productivity. Social media, news, and games can all become a temptation for even the best of employees, amounting to significant losses.

Organizations can prevent internet time theft with internet restriction software. These solutions proactively prevent access to distracting websites during specified working hours; solutions such as BrowseControl can even by configured to allow access to unproductive websites during designated rest periods, allowing employees to take care of personal tasks.

To prevent employees from downloading distracting applications such as games, some internet restriction tools also comes with integrated features for blocking unauthorized downloads.

Monitor and Report Time Theft at Work

Hey everyone, this is Dale here. I am the Digital Marketing Manager for CurrentWare.

In today’s video, I’d like to show off the new user activity data dashboards that were introduced to BrowseReporter in version 6.0.2. 

With these dashboards, you can review the productivity levels, web browsing, application usage, and bandwidth consumption of your entire workforce from the convenience of a web browser. 

These dashboards work in tandem with BrowseReporter’s computer activity reports to provide valuable insights into how technology is used in your organization.

Today’s video is just a sneak peek of what BrowseReporter is capable of; as time goes on you can expect to see further enhancements and data points added to these dashboards.

How the Dashboards Work

To begin using the new dashboards simply select the groups or users you would like to review, then select the desired time period.

Here at the top of the Overview dashboard, you will see a comparison between the data from this period and the previous time period. This gives you a high-level glance into whether the given metrics have increased or decreased during this timeframe.

Below that, we have graphs showing the Top 5 most used websites and applications. This shows you what computer activities your users spend the most time on.

Next, you’ll see the top 5 most active and idle users or groups. 

BrowseReporter automatically switches from Active Time Tracking to Idle Time Tracking when the user stops using their keyboard or mouse for a set period of time; this threshold can be changed to fit your organization’s needs.

Dashboards for Specific Groups/Users

Let’s drill down even further by clicking on one of our groups.

In this group sub-dashboard, you can see the most productive and unproductive users in the group, along with a dedicated Activity Log. 

Likewise, if we started out looking at a specific user rather than a group we would be taken to a sub-dashboard with that specific user’s online status and computer activity data.

Activity Log For Raw User Activity Data

The activity log lets you review the raw data that is used to populate the dashboards. 

You can use the search function to find specific information, use the column men u to adjust what columns appear, and sort the data that is displayed.

What data points are available in the Activity Log will vary depending on the dashboard you’re viewing.

For example, here in the Overview dashboard, we have access to Group or usernames along with several active and idle time metrics.

In the productivity dashboard, we’d have access to the group or user name, the number of users, and various productivity metrics.

Likewise, the Activity Log of the Websites dashboard shows domain names, active time, web content categories, and the productivity categorization for the domain.

The Activity Log of the Applications dashboard shows the application name, process name, active time, and idle time.

If you’d like to use the Activity Log data in a business intelligence tool you can easily export your user activity data to an Excel spreadsheet. 

If you’d like to provide a visual copy of the Activity Log to someone else, you can use the Export to PDF function. The PDF will display the Activity Log, including hyperlinks to the sub-dashboards of the groups or users shown. 

So long as the viewer has access to an operator account with sufficient permissions they’ll be able to follow these hyperlinks to learn more about the selected user or group.

To finish things off, let’s take a look at the dashboards offered in version 6.0.2

Productivity Dashboard

Switching over to the Productivity dashboard you will see how much time was spent on productive, unproductive, and neutral web browsing. You’ll also see who the most productive and unproductive users or groups are, as well as the top 5 websites and categories. 

What is considered productive can be customized by going to BrowseReporter’s Productivity Grading window; a shortcut to this can be found in the dashboard settings. 

From here you’ll be able to specify whether a given website category or a specific domain should be labeled as productive, unproductive, or neutral.

Internet Browsing Dashboard

Moving on to the Websites dashboard you will find the total active and idle time for the selected groups or users, the top 5 websites and most active users, as well as the web browsing Activity Log.

Application Usage Dashboard

In the applications dashboard, you will find similar graphs showing how much time was spent using applications, the top 5 most used applications, the 5 users that spent the most time using applications, and the application usage Activity Log.

Bandwidth Consumption Dashboard

Finally, we have the bandwidth usage dashboard. Here you’ll be able to see who is using the most bandwidth and how much bandwidth was used each day.  

If you’d like to see what websites are responsible for anomalies in bandwidth usage you can run BrowseReporter’s Bandwidth Usage by URL report. 

This report will show you the exact websites that are consuming bandwidth; from there you can decide whether the bandwidth hogs need to be blocked with BrowseControl or if other corrective measures need to be taken.

Conclusion

Ready to boost operational efficiency, employee productivity, and endpoint security with advanced awareness and control over how your employees use technology in the workplace? 

Get started today with a FREE trial of any of our software solutions. 

Simply visit CurrentWare.com/Download to try our software for yourself or get in touch with us at CurrentWare.com/Contact.

Thank you!

One of the most difficult parts of mitigating time theft is a lack of resources for identifying its prevalence. Software to monitor employee internet usage will give human resources (HR) and management the insights it needs to understand the prevalence of time theft in your organization. With the data collected through employee internet monitoring software, your organization can make educated coaching decisions and improve your employee’s mindfulness of distractions they engage in and how it may be impacting their performance.

Tools for Monitoring & Preventing Time Theft

CurrentWare is a global provider of solutions for web filtering, internet usage monitoring, bandwidth tracking, and data loss prevention.

If you would like to better understand how the internet is used (or misused) in your workplace you can try our internet monitoring solution BrowseReporter and our web filter BrowseControl with a FREE no commitment 14-day trial.

BrowseReporter Computer Monitoring Software

  • Track Internet Activities
  • Automated Email Reports
  • Bandwidth Monitoring
  • Record Application Usage
  • Remote Screen Capture

BrowseControl Web Filter

BrowseControl is an easy-to-use web filter that helps organizations enforce policies, improve productivity, reduce bandwidth consumption, and meet compliance requirements – no matter where their users are located.

With BrowseControl you can ensure a safe and productive environment by blocking high-risk, distracting, or inappropriate websites, improve network performance by blocking bandwidth hogs, and prevent users from using unsanctioned applications and software-as-a-service providers

BrowseControl’s security policies are enforced by a software agent that is installed on your user’s computers. This allows the solution to continue blocking websites and applications even when computers are taken off-site.

BrowseControl’s central console allows you to configure your security policies from the convenience of a web browser. 

With BrowseControl you can Block or allow websites based on URL, category, domain, or IP address, assign custom policies for each group of computers or users, prevent users from launching specific applications, and block network ports to reduce the attack surface of your network

There are three key methods for blocking websites with BrowseControl:

The Blocked List allows you to block specific websites based on URL, domain, or IP address

Category Filtering allows you to block millions of websites across over 100 content categories including pornography, social media, and virus-infected sites.

and finally, you can use the Allowed List to allow specific websites that would otherwise be blocked based on their category, or for the greatest security and control you can block all websites except for those that are on the Allowed List.

When your users try to visit a blocked website they can either be presented with a custom warning message or directed to another site, such as a page with a reminder of your organization’s internet use policy.

With BrowseControl’s App Blocker you can prevent your users from launching specific applications.

Simply select the group you would like to restrict, enter the Original Filename of the application to the Application List, and add it to the blocked applications list.

When the user tries to launch the blocked application they can be presented with a custom warning message that alerts them of the restriction.

BrowseControl is best used in tandem with our computer monitoring software BrowseReporter. Using both solutions provides the visibility and control you need to ensure that your organization’s computers are being used appropriately.

Don’t let internet abuse run rampant in your organization. Take back control over web browsing with a free trial of BrowseControl.

Get started today by visiting CurrentWare.com/Download

If you have any technical questions during your evaluation our support team is available to help you over a phone call, live chat, or email.

Thank you!

  • Control Internet Access
  • URL White / Black Lists
  • Category Filtering
  • Application Blocking
  • Port Filtering

Tips for Employee Monitoring & Time Tracking

One of the difficulties of employee monitoring is that employees may feel that they are not trusted to manage their own schedules or they may worry that “big brother” is micromanaging their time and making uninformed judgements about their work ethics based on the data collected.

To help generate much-needed support from the employees in your workforce, there are ways to balance your time theft strategy to a reasonable standard.

Monitoring While Respecting Privacy

Employee monitoring is an excellent tool for understanding how your workforce operates.

Unfortunately a history of overly-invasive deployments has caused serious concerns among employees, like:

Is my employer spying on me?

They’re just doing this to find an excuse to fire me

If they’re monitoring what I do at work, they obviously don’t trust me

This is not what you want your employees to feel. 

In this video I’m going to guide you through the best practices for monitoring employees so you can avoid these mistakes and concerns from your employees

Hello and welcome to the CurrentWare YouTube channel. 

My name is Neel Lukka and I am the managing director here at CurrentWare.

After watching this video you can learn more about this topic by reading our new white paper “Employee Monitoring: Best practices for balancing productivity, security and privacy”

You can find the link for that in the description below.

Before we start, I just want to give a quick disclaimer here. 

I’m not a lawyer and this is not legal advice. These tips are for informational purposes only. If you want to use employee monitoring software in your company be sure to consult with a legal professional first.

Alright, let’s jump in

First up is the very best tip I can give you.

If you want to succeed, you have to let your employees know that they are being monitored.

Employees that do not know if they are being monitored, why they are being monitored, and how they are being monitored are more likely to have negative reactions to being monitored, 

such as

Having higher rates of stress and anxiety

Being less likely to accept being monitored

And, ironically, becoming less productive

That’s not to say that transparency is going to negate each and every concern that your employees may have.

But if you start with transparency from the very beginning you have a far better chance of proving to your employees that these tools aren’t being used to spy on them. 

By being transparent you’re also giving the chance to hear about their concerns from the start. This lets you work with them to make an employee monitoring strategy that is fair and minimally invasive.

Here are 4 transparency boosting tips:

Involve a representative sample of employees when you start planning your goals and the metrics you want to capture

Tell your employees what metrics are being captured, how they’ll be used, and what is being used to capture them

Have your staff read and sign policies that disclose your intended use of the employee monitoring software

and finally, give them access to their own data so they can see exactly what’s being captured. They can even use this data to manage their own productivity, which is a major bonus

The second tip I have for you is don’t use employee monitoring to micromanage

One of the reasons that monitoring can be perceived negatively is that it feels like it’s being used to punish employees. They worry that it’s the software equivalent of a micromanaging boss staring over their shoulder while they work, just waiting for them to slip up.

Some employers do monitor internet use to make sure employees aren’t getting carried away, but did you know that so-called “unproductive” internet browsing has actually been found to have a positive impact on productivity?

It’s true! But only if that browsing doesn’t take up more than 12% of their work time.

Employees feel far better about being monitored when they’re given the autonomy to self-manage first. Managers can step in if things are getting carried away or if their employees are visiting clearly inappropriate websites.

The third and final tip I have for you today is to not monitor more than you have to.

Think about it this way – if I told you that I wanted to make sure that employee’s weren’t visiting not safe for work websites, you’d think I was crazy for asking for a direct feed into their webcams. 

The bottom line is this: 

If you can meet your company’s goals with a less invasive method of monitoring, do it that way.

For example, if you want some backup for your acceptable use policies you can use internet monitoring software to see what sites are being visited. 

But there’s no need to track individual keystrokes

Or maybe you want to protect data from being stolen. You can monitor the flow of data without recording audio clips of private conversations

Finally, maybe you want to track the work habits of employees that are working remotely or from home. Give them a company-provided device rather than monitoring their personal computers

That’s it for now. 

If you want learn more, check out our new white paper “Employee Monitoring: Best practices for balancing productivity, security and privacy”

You can find the link for that in the description below.

If you’d like to try out employee monitoring in your company, visit CurrentWare.com/Download for a free trial of BrowseReporter, our computer monitoring software.

And as always stay tuned to our YouTube channel for more videos about employee monitoring, cyber security, and CurrentWare’s workforce management software.

If you would like to use monitoring solutions as a part of your time theft mitigation strategy, it is important to respect the privacy of your employees.

Only use the amount of monitoring that is appropriate for the needs of your organization, and ask for explicit consent from employees that will be monitored as a part of their work activities. For traveling or remote employees that require the use of a tracked device for work, it helps to provide them with a dedicated work device as the monitoring of personal devices can feel like a significant privacy violation for most employees.

Set Reasonable Expectations For Your Employees

Man giving a presentation

With all of the concerns your organization may have regarding time theft it is important to consider that typically, the ultimate goal is to cultivate a workforce that is full of employees that are happy, engaged, and productive. Internet and application monitoring should be used to identify and coach repeat offenders and address productivity issues, not to micromanage your employees. 

When assessing the prevalence and severity of time theft, you should consider the “human factor” behind your workforce—your workforce is full of multi-dimensional humans with needs outside of their immediate work obligations. By allowing a reasonable degree of flexibility for non-work activities such as taking personal calls/emails as needed or engaging in brief team-building conversations, you will make your staff feel trusted and valued, leading to an increase of engagement and productivity through greater job satisfaction.

Conclusion

While not all forms of time theft are malicious, having employees stealing company time is a significant drain on productivity. If left unchecked stealing time at work can become a pervasive issue. With a combination of time clock management software, company policies, web filtering and internet monitoring software, and proactive supervision you can prevent employee time theft in your company.


Ready to take back control over internet abuse in your organization? Get started today with a FREE trial of our internet monitoring and web filtering software solutions.

Sai Kit Chu
Sai Kit Chu
Sai Kit Chu is a Product Manager with CurrentWare. He enjoys helping businesses improve their employee productivity & data loss prevention efforts through the deployment of the CurrentWare solutions.
Free download: Employee Monitoring Starter Kit from CurrentWare

Get Your Free Employee Monitoring Starter Kit

Essentials for implementing a successful employee monitoring strategy

👉 Templates for policies and disclosures

👉 Presentations for key stakeholders

👉 Best practices for monitoring employees

Thank You! We'll Reach Out Soon

Pin It on Pinterest