Employee monitoring is a form of workplace surveillance where employers collect data regarding their employees’ computer usage, location, and productivity.
This guide will detail the various methods that employers use for monitoring employees in the workplace, the pros and cons of employee monitoring in the workplace, and provide helpful resources for creating your very own employee monitoring strategy.
Ready to get advanced insights into how your employees spend their time? Reach out to the CurrentWare team for a demo of BrowseReporter, CurrentWare’s employee and computer monitoring software.
Thanks for checking out the latest CurrentWare Video. In this video, we’re going to cover the reasons why you should monitor employee computer activity.
If you like this or other videos we’ve produced, hit the subscribe button below. Stay tuned to the end to learn how to get a free trial of all of the software I demo today.
Employee monitoring involves understanding how your employees are using company provided technology during work hours. There are five main benefits and considerations to employee monitoring that we will cover today:
So let’s start off with how monitoring can help employee productivity.
44% of employees admit to being distracted by the internet at work, and employees in the US have admitted to wasting 1-2 hours a day browsing the internet.
Employees that know they’re being monitored will avoid excessive personal usage of the internet and computer applications. In addition, in the event an employee is underperforming, employee monitoring reports on their computer activity can be used to help the employee understand their actions and enhance their productivity.
The second important reason to monitor activity is to address inappropriate internet usage & avoid legal liability.
As compliance requirements increase for various businesses, industries & jurisdictions, employers have a responsibility to ensure their employees are complying with regulations such as HIPAA, CCPA, CIPAA and GDPR.
By enabling computer monitoring, you can ensure that your staff are complying with these requirements. In addition, by monitoring & setting alerts, you can instantly be notified if employees are visiting inappropriate websites such as pornography, adult or other websites.
The third reason to monitor computer activity is for cybersecurity purposes & to prevent data loss.
By knowing which websites an employee is visiting, which files are being downloaded or shared, and which external devices and endpoints are being used, company administrators can manage cyber security risks and data loss prevention efforts.
Data breaches and associated risks can cost businesses millions of dollars in damages along with reputational risk, so being aware of these risks and monitoring them can provide significant benefits for every organization. In addition, by using alerts, and setting up risk profiles for users, you can audit activities and groups for questionable employee behavior.
Due to Covid-19, the year 2020 has seen a significant shift to remote work for various companies and organizations. This brings us to our 4th reason to monitor an employee’s computer usage: remote workforce management.
52% of CIOs surveyed suspect that one or more of their mobile workers have been hacked or caused a mobile security issue in the last 12 months. Employee monitoring software can be used to monitor for high-risk activity and verify that employee activity on company networks is legitimate.
The final reason to monitor employees is for bandwidth management purposes. With CurrentWare’s BrowseReporter tool, you can determine who is hogging bandwidth by streaming videos and uploading/downloading excessively large files.
Employees who are hogging bandwidth can slow down the entire network, negatively affecting the productivity of other employees and reducing the performance of business critical operations.
That’s it for this video. If you have any thoughts on this video or other reasons why computers should be monitored, feel free to comment below.
If you’d like to give any of CurrentWare’s computer and device monitoring solutions a try, please check out our free trial at currentware.com/download or get in touch with us and we’d be happy to help!
Note: The above video showcases a legacy user interface for BrowseReporter. To see the most up-to-date features and interface please visit the BrowseReporter product page
There are several types of employee monitoring that employers can use depending on their goals. This section will overview the most common types of employee monitoring in the workplace.
The 2007 Electronic Monitoring & Surveillance Survey from the American Management Association (AMA) found that 66% of employers monitor internet use. 65% of those surveyed also use web filtering software to block websites.
Employers primarily monitor and restrict internet access to prevent employees from accessing inappropriate or dangerous websites, though these tools are also used to restrict the use of unproductive websites.
Using employee tracking software to track how much time an employee is idle or browsing unproductive websites also provides companies with insights into engagement, allowing them to optimize how technology is used by both remote and in-office employees.
Why do employers use employee monitoring software?
Computer monitoring is a catch-all term for using employee monitoring software to monitor computer events such as application use, USB activity, websites visited, screenshots, and logon activity. 94% of organizations use some form of computer monitoring to measure productivity and improve security.
Why do businesses monitor computer use?
43% of employers in the American Management Association report monitor the email activity of their staff. Email monitoring is typically done with automated tools that scan for keywords, though 40% of the employers in the report stated they use manual email monitoring methods.
Why do employers monitor emails?
GPS and other forms of location monitoring are a niche form of monitoring that is not as widely used as computer use tracking with employee monitoring software. The use of location tracking is often reserved for monitoring a company vehicle or mobile device in roles where frequent travel is required.
Why do employers use GPS tracking?
Keystroke logging (keylogging) is a highly controversial monitoring practice. Keyloggers track the individual keyboard inputs of employees and save that data for review. Keyloggers may be hardware or software-based.
As these monitoring systems capture individual keystrokes they pose significant security and privacy concerns. They are likely to capture sensitive information including passwords, credit card details, etc.
Storing sensitive information within the database of a keylogger is dangerous as unauthorized users or hackers could potentially access that information. For this reason, they are rarely used.
Why do employers use keyloggers?
Learn More: Should You Use Keylogger Software on Employee Computers?
Video surveillance is commonly performed through closed-circuit television (CCTV) systems. These technologies are commonly used as security systems rather than for measuring productivity. It is common for companies that interact with the public to use video surveillance in locations where there are concerns surrounding the security of employees and theft of company assets.
Why do employers use video surveillance?
Employee telephone monitoring is most often used to monitor the performance of phone-based customer support roles. Calls are often recorded to investigate complaints, assist in training, and ensure that employees are adhering to the quality standards of the organization.
Why do employers monitor phone calls?
Thanks for checking out the latest CurrentWare how-to video. Today we will cover How to Monitor Internet Use.
If you like this or other videos we’ve produced, hit the subscribe button below. Stay tuned to the end to learn how to get a free trial of the software I demo today.
In a previous video, we covered some of the benefits of monitoring employees including for productivity reasons, to avoid legal liability and to prevent cyber threats. In this video, we’re going to cover how to monitor internet use and some of the industry best practices.
We’re going to be using BrowseReporter, CurrentWare’s computer monitoring solution.
This solution requires an agent to be installed on your employee’s computers. Once installed, their computer activity is streamed to your server where you can run reports and view their activity.
To start off, we recommend you determine which browsers are being used by your company. This is a good time to look at your company’s policy and determine which default browser you recommend. You can also find out which browsers your employees are using with BrowseReporter’s application monitoring report. In addition, you can actually block the installation or use of other browsers by using CurrentWare’s BrowseControl solution.
The next step is to figure out what time period you want to look at. You can pull reports on demand at any desired time period including last 7 days, last month or a custom date range.
For this example, we’ll look at yesterday’s results. Now you can actually schedule these reports to email automatically to the appropriate person on your team, but in this case we are going to use on-demand reports, pulling the reports up as needed.
So let’s jump in and start with a snapshot report on employee internet use based on productivity.
With the CurrentWare Employee Productivity Report, you get a simple snapshot into how much time was spent on websites that are deemed to be productive. The definition of productive is based on our proprietary system of ranking each website based on whether it’s productive, unproductive or neutral. You can even change the categorization of websites based on your business needs to make this report more helpful.
Looking at the CurrentWare console, we’ll pull up the employee productivity report for employee Conan. We will look at yesterday’s performance and see that Conan was only 24% productive. The majority of his time was spent on Social Media and Sports websites vs. work related tasks.
The next way to assess productivity is to see which sites someone has spent the most time on. For example, if you know the employee is on the sales team and should be spending the majority of time on salesforce.com, you can investigate and see which are the main sites they are really browsing.
By pulling up the Top Domains visited report, we can see exactly which domains Conan browsed yesterday by Active Time and Total Time. Similar to the previous report, we see the majority of his time was spent on Facebook and ESPN.
One of the most interesting features of CurrentWare’s internet monitoring reports are related to tracking the actual activity of a user and not letting the data get convoluted with different tabs or windows that a user has open.
BrowseReporter has 3 different ways to determine how the internet and applications are being used:
Active Time measures how long the current window is in focus, giving you the most accurate report on where users spent their time on websites and applications. BrowseReporter has the capability to determine which website tab was active at the top of the screen so you get extremely accurate reporting on where they spent their time.
Total Time measures the total duration the window is opened for, from the start time until the end time regardless of whether the window was in focus or not. Not every user acts the same. Some users switch between two monitors. Some like to stream content in the background. No matter what their behaviors are, BrowseReporter can track the total time they spent on the websites whether or not they were focused on the window.
Finally, Idle time measures how long the user is away from his computer after the mouse and keyboard stopped moving. By default, idle time is tracked after 20 minutes of inactivity. Time tracking should be fair. If your users are not in front of their computers, BrowseReporter will separate the time tracked into idle time so you can filter it out if you need to during report generation.
Now if you want to investigate the exact website pages that the employee visited, you can use the Sites visited report. This report breaks down each url in detail along with how much time was spent on each page.
This lets you distill down if they were looking at pages related to work on those domains or if it was something more personal. This is specifically helpful for domains like youtube.com which for certain industries or roles can provide value, but knowing which exact video was watched can help you understand the use case by the employee.
Finally, we recommend investigating productivity by looking at employee keyword searches.
This report allows you to Review the exact search keywords used by employees and Identify employees that are distracted or struggling with specific topics. In addition, you can also discover employee sentiment and monitor for high-risk search terms such as attempts to find adult-oriented websites.
In this keywords searched example we can see employee Greg has searched lots of personal items into google over the past working days. This helps you understand where they may be spending their time and what they are browsing in google.
That’s it for this video on how to monitor internet use with BrowseReporter. If you have any thoughts on the reports or suggestions we’ve covered in this video, feel free to comment below..
If you’d like to give BrowseReporter or any of the other CurrentWare Solutions a try, please check our free trial at currentware.com/download or get in touch with us and we’d be happy to help!
NOTE: The above video contains a legacy user interface for BrowseReporter. To see the most up-to-date version, please visit the BrowseReporter product page.
Ready to start monitoring your employees? BrowseReporter is a versatile employee computer monitoring software for monitoring internet and application usage. In this video, you will learn how to monitor employee computers with BrowseReporter.
This section will outline the pros and cons of monitoring your staff with tools such as employee monitoring software. For more details, check out The Pros and Cons of Employee Monitoring.
The 2017 State of the American Workplace report from Gallup estimates that actively disengaged employees cost the U.S. between $483 billion to $605 billion each year in lost productivity. With staff monitoring tools an organization can discover early warning signs of disengagement such as excessive unproductive web browsing.
How monitoring is used to improve productivity
Employee monitoring software also improves the accuracy of time tracking by verifying that employees are active on their work devices. This can be an essential tool for detecting time theft in many organizations.
For example, in most cases, someone with a data entry role that clocks in at the start of the workday will reasonably be expected to continue working on their computers during business hours. If an excessive period of inactivity is found throughout the workday it may be a sign that they are engaging in time theft.
Underutilized software cost businesses in the US and UK an estimated $34 billion per year. Employee monitoring software detects redundant or underutilized software that can be decommissioned or consolidated.
How monitoring helps reduces software waste
It’s a common myth that staff monitoring software is for spying on staff and micromanaging how they spend their time at work.
In reality, modern workforce analytics software tools are incredibly valuable for workforce data gathering. Business leaders such as HR professionals, managers, and IT professionals need to make data driven decisions about business performance and workforce management.
They help predict and inform business outcomes with consistent, continuous measurement over time. This continuous data analysis provides far greater opportunities for workforce planning than traditional point-in-time surveys or subjective manager assessments.
How monitoring tools improve business intelligence:
Learn More: How Workforce Analytics Software Improves Business Performance
Shadow IT refers to any system, solution, or software that’s used without approval from the IT department. Gartner has predicted that by
“Shadow IT” – also known as Stealth IT, Client IT, or Fake IT – is any system, solution, or software that’s used by the employees of an organization without the knowledge and approval of the corporate IT department. Research from Everest Group estimates that shadow IT comprises 50% or more of IT spending in large enterprises.
It’s true that unknown and unmanaged applications are a potential security vulnerability, though that’s going to be of more interest to your IT department. From a manager’s perspective, shadow technologies are often productivity boosting solutions that could be officially adopted for everyone’s benefit.
By monitoring computer use managers can receive an overview of the programs and web-based tools used by their department. This gives them the opportunity to learn about these solutions so they can advocate for their official adoption. Once cleared by the corporate IT department these innovative solutions can be shared within the workgroup.
Organizations that collect, process, and/or store sensitive information are responsible for the security and integrity of it.
Computer monitoring software is used to ensure that staff are using company systems safely and handling sensitive information in a way that is compliant with the company’s security policies. This is particularly true of regulated industries such as healthcare, finance, and defense that have stringent data security requirements.
According to Verizon’s Protected Health Information Data Breach Report (PHIDBR) from 2016-2018 58% of data loss events in the healthcare industry involved insiders, making insider threats the greatest cybersecurity threat in that industry at the time. Monitoring activity on egress points such as USB storage devices and file sharing websites is crucial for detecting incidents of data theft and unsafe data handling.
Internet abuse in the workplace presents a significant risk if left unaddressed. Employees that visit hateful, pornographic, or otherwise harmful websites while at work create a hostile work environment for their coworkers. Failure to monitor for and address this type of behavior undermines organizational performance and creates serious legal liabilities for employers.
While internet use policies set standards for internet use in the workplace, without employee monitoring systems employers risk being unable to detect and deter egregious web browsing.
A 2003 study by Dr. Kimberly S. Young & Dr. Carl J. Case found that among large firms, electronic monitoring software was rated as the most effective deterrent of inappropriate web use, followed by policies and training.
Employee monitoring systems are a valuable tool to monitor your employees, but even the best employee monitoring systems have potential downsides. Before you use employee monitoring in the workplace you should consider both the benefits and the concerns they may have.
Overly invasive monitoring practices such as stealth monitoring, keystroke logging, and monitoring non-work web browsing can have a negative effect on morale and company culture.
Employees that are not aware that they are being monitored, why they are being monitored, and how they are being monitored are less likely to find the use of monitoring tools acceptable.
Fairness is essential when using monitoring tools. Ensuring that their employees retain their autonomy when being monitored will go a long way to reducing the potential effects on morale and company culture.
To reduce the effect that employee monitoring systems could have on morale, employers should make monitoring a standard workplace policy rather than singling out individual employees. They should also avoid using employee monitoring as a micromanaging tool.
Get started today—Download the FREE template and customize it to fit the needs of your organization.
The data collected by staff monitoring tools have the potential to be incredibly sensitive. Many employees worry that their data will be misused or accessed by unauthorized parties.
Employers need to treat the data that is collected by employee monitoring tools the same way they would any other sensitive data, providing it with equal protections such as restricting who can access the data and keeping it within a secured network.
Depending on the types of monitoring taking place employees may also worry that their personal lives are being monitored. Employers must do everything they can to limit monitoring to only what is necessary and keep their monitoring solutions separate from the personal lives of their employees.
How to Avoid Violating Employee Privacy Expectations
FREE WHITE PAPER
Best Practices for Monitoring Employees
In today's privacy-conscious world employers need to monitor employees in a way that is transparent, minimally invasive, and respectful of employee privacy
Read this white paper to learn the best practices for monitoring employees in the workplace.
When using staff monitoring tools it is essential that you are in compliance with any laws or regulations that pertain to an employee’s privacy rights in the workplace. Before implementing tracking software it’s essential that you consult with your legal counsel to go over any legal considerations for your jurisdiction.
For example, the Electronic Communications Privacy Act (ECPA) protects against the interception of in-transit digital and electronic communications. However, there is an exception for businesses. Employers typically have the right to access the communications of an employee on company resources when the monitoring is done in the ordinary course of business; this includes email and instant messaging.
When it comes to what you are allowed to monitor, many believe that if an employee is using company equipment, on company time, and getting paid by the company, that the company has every right to monitor their equipment and what the employee is doing with it.
While in the majority of cases a company can monitor their employees so long as they have a legitimate business reason for doing so, it’s not always that simple. A variety of factors influence what employers can and cannot monitor.
For example, keylogging software is an invasive form of employee monitoring that can potentially capture personal data such as passwords. Even with a policy in place, an employer may not have the legal right to use this type of monitoring.
Legal factors that influence an employer’s right to monitor
In 2020 the clothing store H&M received a €35.3m ($41.3m USD) fine for invasive staff monitoring practices.
H&M received the fine due to non-compliance with the General Data Protection Regulation (GDPR), a data security and privacy legislation that protects data subjects in the European Union (EU) and the European Economic Area (EEA).
Why was H&M’s monitoring considered invasive?
Managers at H&M collected sensitive personal information through extensive employee surveys and even notes from informal conversations.
The data included how staff conducted their holidays, medical symptoms, diagnoses for illnesses, family issues, and personal religious beliefs. That data was then made available to up to 50 managers who used that data to make employment-related decisions.
Since this collection was excessively invasive and collected information that was beyond any legitimate business need, the Data Protection Authority of Hamburg (HmbBfDI) opted to issue the fine.
Get started today—Download the FREE template and customize it to fit the needs of your organization.
Employee monitoring is an excellent tool for understanding how your workforce operates.
Unfortunately a history of overly-invasive deployments has caused serious concerns among employees, like:
Is my employer spying on me?
They’re just doing this to find an excuse to fire me
If they’re monitoring what I do at work, they obviously don’t trust me
This is not what you want your employees to feel.
In this video I’m going to guide you through the best practices for monitoring employees so you can avoid these mistakes and concerns from your employees
Hello and welcome to the CurrentWare YouTube channel.
My name is Neel Lukka and I am the managing director here at CurrentWare.
After watching this video you can learn more about this topic by reading our new white paper “Employee Monitoring: Best practices for balancing productivity, security and privacy”
You can find the link for that in the description below.
Before we start, I just want to give a quick disclaimer here.
I’m not a lawyer and this is not legal advice. These tips are for informational purposes only. If you want to use employee monitoring software in your company be sure to consult with a legal professional first.
Alright, let’s jump in
First up is the very best tip I can give you.
If you want to succeed, you have to let your employees know that they are being monitored.
Employees that do not know if they are being monitored, why they are being monitored, and how they are being monitored are more likely to have negative reactions to being monitored,
such as
Having higher rates of stress and anxiety
Being less likely to accept being monitored
And, ironically, becoming less productive
That’s not to say that transparency is going to negate each and every concern that your employees may have.
But if you start with transparency from the very beginning you have a far better chance of proving to your employees that these tools aren’t being used to spy on them.
By being transparent you’re also giving the chance to hear about their concerns from the start. This lets you work with them to make an employee monitoring strategy that is fair and minimally invasive.
Here are 4 transparency boosting tips:
Involve a representative sample of employees when you start planning your goals and the metrics you want to capture
Tell your employees what metrics are being captured, how they’ll be used, and what is being used to capture them
Have your staff read and sign policies that disclose your intended use of the employee monitoring software
and finally, give them access to their own data so they can see exactly what’s being captured. They can even use this data to manage their own productivity, which is a major bonus
The second tip I have for you is don’t use employee monitoring to micromanage
One of the reasons that monitoring can be perceived negatively is that it feels like it’s being used to punish employees. They worry that it’s the software equivalent of a micromanaging boss staring over their shoulder while they work, just waiting for them to slip up.
Some employers do monitor internet use to make sure employees aren’t getting carried away, but did you know that so-called “unproductive” internet browsing has actually been found to have a positive impact on productivity?
It’s true! But only if that browsing doesn’t take up more than 12% of their work time.
Employees feel far better about being monitored when they’re given the autonomy to self-manage first. Managers can step in if things are getting carried away or if their employees are visiting clearly inappropriate websites.
The third and final tip I have for you today is to not monitor more than you have to.
Think about it this way – if I told you that I wanted to make sure that employee’s weren’t visiting not safe for work websites, you’d think I was crazy for asking for a direct feed into their webcams.
The bottom line is this:
If you can meet your company’s goals with a less invasive method of monitoring, do it that way.
For example, if you want some backup for your acceptable use policies you can use internet monitoring software to see what sites are being visited.
But there’s no need to track individual keystrokes
Or maybe you want to protect data from being stolen. You can monitor the flow of data without recording audio clips of private conversations
Finally, maybe you want to track the work habits of employees that are working remotely or from home. Give them a company-provided device rather than monitoring their personal computers
That’s it for now.
If you want learn more, check out our new white paper “Employee Monitoring: Best practices for balancing productivity, security and privacy”
You can find the link for that in the description below.
If you’d like to try out employee monitoring in your company, visit CurrentWare.com/Download for a free trial of BrowseReporter, our computer monitoring software.
And as always stay tuned to our YouTube channel for more videos about employee monitoring, cyber security, and CurrentWare’s workforce management software.
“If organizations wish to monitor their employees, they should be clear about its purpose and that it brings real benefits. Organizations also need to make employees aware of the nature, extent and reasons for any monitoring”
Spokesperson from the UK’s Information Commissioner’s Office
Employers that want to monitor use any form of an employee monitoring system should notify their employees. Many companies will start by using acceptable use policies to disclose their intent to monitor. Combining company policies with other notification measures will help keep employees informed.
The best employee monitoring software will include transparency-boosting features such as end-user notifications and the ability for employees to review their own data.
When employers openly discuss their intention to deploy an employee monitoring system, employees are given an opportunity to engage in a dialogue where they can preemptively express their concerns and become educated on the employer’s intended use of the data collected.
This kit provides your organization with the tools it needs to implement a successful employee monitoring strategy.
Get started today—Download the FREE kit to get the most out of your organization’s employee monitoring solutions.
“Employers must not use tech to control and micromanage their staff. Monitoring toilet breaks, tracking, and snooping on staff outside working hours creates fear and distrust. And it undermines morale.”
Frances O’Grady, General Secretary of the British Trades Union Congress (TUC)
The best employee monitoring software can provide detailed reports on staff productivity, but it can also track details that many employees will find sensitive in nature. By limiting monitoring to general technology usage such as web browsing on work-related systems you can reduce the privacy impacts on employees.
If employee tracking software is being used to assess productivity it’s essential that this data is used fairly and transparently. If one employee is reprimanded for social media usage while another isn’t your employees will come to resent the implementation of employee monitoring software.
FREE WHITE PAPER
Best Practices for Monitoring Employees
In today's privacy-conscious world employers need to monitor employees in a way that is transparent, minimally invasive, and respectful of employee privacy
Read this white paper to learn the best practices for monitoring employees in the workplace.
CurrentWare’s BrowseReporter is the best employee monitoring software for tracking employee internet use. It includes detailed reports that are easy to understand. BrowseReporter tracks idle time separately and filters out background resources such as CDNs, letting you easily track how productive your employees are.
BrowseReporter’s screen capture features take automatic screenshots of your employee’s computer. These screenshots complement the detailed reports with a static recording of what the user was doing on their computer.
For tracking computers on your local area network, BrowseReporter also includes a remote screen capture feature, giving you a live video feed of your employee’s computer.
With BrowseReporter’s application usage tracking feature you can keep track of what applications are being used on your employee’s computer. These reports are a valuable tool for detecting shadow IT and ensuring that unproductive apps aren’t being used during work hours.
Streaming a 4K Ultra HD Netflix video consumes 7GB of data per hour. Employees that misuse the internet in their workplace aren’t only harming their own productivity, they also strain the available bandwidth and make network speeds slower for their coworkers.
BrowseReporter’s bandwidth monitoring reports are a valuable tool for detecting inappropriate internet use in the workplace and diagnosing network latency issues. Use BrowseReporter’s bandwidth monitor to check bandwidth usage for trends that indicate the misuse of technology in the workplace and suspicious network activity.
When employees work from home it can be difficult to keep track of their productivity.
With BrowseReporter’s remote user productivity reports, you can get a high-level overview of the amount of time spent on work-related websites when an employee is remote vs when they are working in the office.
A search engine employee monitoring tool like BrowseReporter helps companies to understand what their employees are searching for during work hours. At a glance, you can see if they are searching for ways to use social media, if they are struggling with a task, or if they are searching for inappropriate content that could harm your business.
Portable storage devices are a convenient piece of technology for sharing files, but they also pose a serious data security risk. AccessPatrol is an employee monitoring tool that blocks USBs and monitors file transfers to portable storage devices. Tools like AccessPatrol prevent data theft by recording file transfers and USB device usage and real-time alerting a designated user when high-risk file transfers are detected.
The Ultimate Guide to Employee Monitoring
This in-depth guide provides an employee monitoring software buyers guide, tips for creating an effective employee monitoring strategy, and legal considerations for using employee monitoring tools.
The Best Employee Monitoring Software
What to monitor employee activity such as internet and app usage? This list of the best employee monitoring software will help you pick the optimal monitoring solution for your business.
Workplace Monitoring Policy Template (Employee Privacy Policy)
This article has the tips you need to get started with writing your own employee monitoring policy. We’ll also provide you with a FREE employee monitoring policy template that you can download and tailor it to fit your needs.
Free Internet Usage Policy Template
A free employee internet usage template for you to download, edit, and use. Disclose the use of employee monitoring tools in your organization and set standards for internet use.
Workplace Privacy and Employee Monitoring: Best Practices (White Paper)
A free white paper that employers can use to develop a privacy-first employee monitoring strategy. It includes tips for reducing the privacy impacts of employee monitoring technology, the role of employee monitoring, case studies, and how to choose the best employee monitoring system.
SHRM: Managing Workplace Monitoring and Surveillance
Guidelines surrounding the legality of employee monitoring
General Data Protection Regulation (GDPR)
A valuable resource for researching and understanding Europe’s data privacy law.
Monitoring Employees in the Workplace: 6 Privacy Tips for Employers
These tips will reduce impacts on employee privacy so employers can maximize the benefits of their employee monitoring strategy.
How To Use Employee Monitoring Data
Employee monitoring is a powerful workforce analytics tool. Beyond improving individual productivity, tools like BrowseReporter can provide valuable insights into how your workforce operates. This article provides examples of how companies can use employee monitoring to improve their business intelligence.
Disclaimer: The contents of this article convey general information only and should not be construed as legal advice. CurrentWare advises consultation with legal counsel for advice and opinions on local laws and regulations that pertain to your business.
Cookie | Duration | Description |
---|---|---|
__cfruid | session | Cloudflare sets this cookie to identify trusted web traffic. |
cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
JSESSIONID | session | The JSESSIONID cookie is used by New Relic to store a session identifier so that New Relic can monitor session counts for an application. |
LS_CSRF_TOKEN | session | Cloudflare sets this cookie to track users’ activities across multiple websites. It expires once the browser is closed. |
OptanonConsent | 1 year | OneTrust sets this cookie to store details about the site's cookie category and check whether visitors have given or withdrawn consent from the use of each category. |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Cookie | Duration | Description |
---|---|---|
__cf_bm | 30 minutes | This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. |
_zcsr_tmp | session | Zoho sets this cookie for the login function on the website. |
Cookie | Duration | Description |
---|---|---|
_calendly_session | 21 days | Calendly, a Meeting Schedulers, sets this cookie to allow the meeting scheduler to function within the website and to add events into the visitor’s calendar. |
_gaexp | 2 months 11 days 7 hours 3 minutes | Google Analytics installs this cookie to determine a user's inclusion in an experiment and the expiry of experiments a user has been included in. |
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_ga_GY6RPLBZG0 | 2 years | This cookie is installed by Google Analytics. |
_gcl_au | 3 months | Provided by Google Tag Manager to experiment advertisement efficiency of websites using their services. |
_gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |
CONSENT | 2 years | YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data. |
Cookie | Duration | Description |
---|---|---|
_opt_expid | past | Set by Google Analytics, this cookie is created when running a redirect experiment. It stores the experiment ID, the variant ID and the referrer to the page that is being redirected. |
IDE | 1 year 24 days | Google DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile. |
NID | 6 months | NID cookie, set by Google, is used for advertising purposes; to limit the number of times the user sees an ad, to mute unwanted ads, and to measure the effectiveness of ads. |
test_cookie | 15 minutes | The test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies. |
VISITOR_INFO1_LIVE | 5 months 27 days | A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface. |
YSC | session | YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages. |
yt-remote-connected-devices | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt-remote-device-id | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt.innertube::nextId | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
yt.innertube::requests | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
Cookie | Duration | Description |
---|---|---|
_dc_gtm_UA-6494714-6 | 1 minute | No description |
_gaexp_rc | past | No description available. |
34f6831605 | session | No description |
383aeadb58 | session | No description available. |
663a60c55d | session | No description available. |
6e4b8efee4 | session | No description available. |
c72887300d | session | No description available. |
cookielawinfo-checkbox-tracking | 1 year | No description |
crmcsr | session | No description available. |
currentware-_zldp | 2 years | No description |
currentware-_zldt | 1 day | No description |
et_pb_ab_view_page_26104 | session | No description |
gaclientid | 1 month | No description |
gclid | 1 month | No description |
handl_ip | 1 month | No description available. |
handl_landing_page | 1 month | No description available. |
handl_original_ref | 1 month | No description available. |
handl_ref | 1 month | No description available. |
handl_ref_domain | 1 month | No description |
handl_url | 1 month | No description available. |
handl_url_base | 1 month | No description |
handlID | 1 month | No description |
HandLtestDomainName | session | No description |
HandLtestDomainNameServer | 1 day | No description |
isiframeenabled | 1 day | No description available. |
m | 2 years | No description available. |
nitroCachedPage | session | No description |
organic_source | 1 month | No description |
organic_source_str | 1 month | No description |
traffic_source | 1 month | No description available. |
uesign | 1 month | No description |
user_agent | 1 month | No description available. |
ZCAMPAIGN_CSRF_TOKEN | session | No description available. |
zld685336000000002056state | 5 minutes | No description |