Need a workplace monitoring policy? This article has the tips you need to get started with writing your electronic monitoring policy. We’ll also provide you with a FREE workplace monitoring policy template that you can download and customize to fit your needs.
Get started today—Download the FREE template and customize it to fit the needs of your organization.
CurrentWare’s powerful employee computer monitoring software solutions provide the insights you need to ensure that the devices in your network are used safely and productively.
A workplace monitoring policy—also known as an employee monitoring policy, electronic monitoring policy, or employee privacy policy—is a type of workplace privacy policy that is used to establish privacy expectations when monitoring employees in the workplace.
These workplace surveillance policies and procedures are also used to…
Employees that are aware that they are being monitored are more likely to adhere to company policies. A workplace monitoring policy works in tandem with acceptable use policies to ensure that employees understand what is expected of them when they use company-provided equipment.
Setting clear privacy expectations is essential when monitoring employees in the workplace. Having an employee privacy policy in place ensures that employees do not wrongfully assume that their computer usage is private when using company-provided IT assets.
The policy should also indicate to employees whether or not they are permitted to use workplace technology for personal reasons. If you will be monitoring their computer activity they must be informed that their personal use may be monitored so they can conduct themselves accordingly.
Without such a policy in place, your employees may use work computers for personal tasks without realizing that their traffic is being monitored. This could result in employees disclosing personal information that they may not want to be shared with those that have access to their user activity reports.
Getting informed consent is paramount for introducing computer monitoring software to your employees. Covert electronic monitoring is not only a liability risk, it is a surefire way to have the monitoring perceived as invasive.
Having employees acknowledge a workplace monitoring policy ensures that they are aware that their activity is being monitored, how their data will be used, and that their data is being kept secure from misuse.
Should they have any privacy concerns they will have an opportunity to discuss their concerns with human resources, their manager, or a designated privacy officer.
While not all jurisdictions require an overt disclosure, being transparent is still a best practice for monitoring employees in the workplace.
Besides, workplace privacy laws are constantly evolving. It is becoming increasingly common for employers to be required to notify their employees that monitoring is taking place.
Having a workplace privacy policy in place ensures that your business can demonstrate that your employees are aware of their privacy rights and that they have consented to the monitoring that is taking place.
Without a privacy policy in place, there is also a risk that evidence of employee misconduct collected through workplace monitoring may not be admissible evidence.
In addition, workplace privacy policies often extend beyond the scope of employee monitoring to cover other forms of data collection, such as when personally identifiable information (PII) of employees is collected for benefits, payroll, etc.
Workplace privacy and employee monitoring laws and regulations vary throughout each country, state/province, and jurisdiction. While not all companies will be required to have a written policy on the electronic monitoring of employees, having a monitoring policy in place is the best practice.
Employers that monitor their employees or networks in some capacity should have an employee electronic monitoring policy in place even if they are not legally required to do so—this will ensure that the organization is prepared for new regulations as they emerge. It will also ensure that their employees and users are aware of what is being monitored so they can fully understand the level of privacy they should expect on organization-owned systems.
For example, in Ontario employers that employ 25 or more employees on January 1 of any year are required to have a written policy on the electronic monitoring of employees in place. This requirement for a written policy on electronic monitoring of employees was introduced to the Employment Standards Act, 2000 (ESA) on April 11, 2022.
Furthermore, as of May 7, 2022, New York employers that monitor or intercept employee emails, internet usage, or telephone communications must provide written notice to those employees.
We’ve also seen similar transparency requirements in the California Privacy Rights Act and Europe’s General Data Protection Regulation (GDPR).
These examples serve as a reminder to employers that employee privacy rights are rapidly evolving, so they must follow the best practices for monitoring employees.
Employee monitoring is an excellent tool for understanding how your workforce operates.
Unfortunately a history of overly-invasive deployments has caused serious concerns among employees, like:
Is my employer spying on me?
They’re just doing this to find an excuse to fire me
If they’re monitoring what I do at work, they obviously don’t trust me
This is not what you want your employees to feel.
In this video I’m going to guide you through the best practices for monitoring employees so you can avoid these mistakes and concerns from your employees
Hello and welcome to the CurrentWare YouTube channel.
My name is Neel Lukka and I am the managing director here at CurrentWare.
After watching this video you can learn more about this topic by reading our new white paper “Employee Monitoring: Best practices for balancing productivity, security and privacy”
You can find the link for that in the description below.
Before we start, I just want to give a quick disclaimer here.
I’m not a lawyer and this is not legal advice. These tips are for informational purposes only. If you want to use employee monitoring software in your company be sure to consult with a legal professional first.
Alright, let’s jump in
First up is the very best tip I can give you.
If you want to succeed, you have to let your employees know that they are being monitored.
Employees that do not know if they are being monitored, why they are being monitored, and how they are being monitored are more likely to have negative reactions to being monitored,
such as
Having higher rates of stress and anxiety
Being less likely to accept being monitored
And, ironically, becoming less productive
That’s not to say that transparency is going to negate each and every concern that your employees may have.
But if you start with transparency from the very beginning you have a far better chance of proving to your employees that these tools aren’t being used to spy on them.
By being transparent you’re also giving the chance to hear about their concerns from the start. This lets you work with them to make an employee monitoring strategy that is fair and minimally invasive.
Here are 4 transparency boosting tips:
Involve a representative sample of employees when you start planning your goals and the metrics you want to capture
Tell your employees what metrics are being captured, how they’ll be used, and what is being used to capture them
Have your staff read and sign policies that disclose your intended use of the employee monitoring software
and finally, give them access to their own data so they can see exactly what’s being captured. They can even use this data to manage their own productivity, which is a major bonus
The second tip I have for you is don’t use employee monitoring to micromanage
One of the reasons that monitoring can be perceived negatively is that it feels like it’s being used to punish employees. They worry that it’s the software equivalent of a micromanaging boss staring over their shoulder while they work, just waiting for them to slip up.
Some employers do monitor internet use to make sure employees aren’t getting carried away, but did you know that so-called “unproductive” internet browsing has actually been found to have a positive impact on productivity?
It’s true! But only if that browsing doesn’t take up more than 12% of their work time.
Employees feel far better about being monitored when they’re given the autonomy to self-manage first. Managers can step in if things are getting carried away or if their employees are visiting clearly inappropriate websites.
The third and final tip I have for you today is to not monitor more than you have to.
Think about it this way – if I told you that I wanted to make sure that employee’s weren’t visiting not safe for work websites, you’d think I was crazy for asking for a direct feed into their webcams.
The bottom line is this:
If you can meet your company’s goals with a less invasive method of monitoring, do it that way.
For example, if you want some backup for your acceptable use policies you can use internet monitoring software to see what sites are being visited.
But there’s no need to track individual keystrokes
Or maybe you want to protect data from being stolen. You can monitor the flow of data without recording audio clips of private conversations
Finally, maybe you want to track the work habits of employees that are working remotely or from home. Give them a company-provided device rather than monitoring their personal computers
That’s it for now.
If you want learn more, check out our new white paper “Employee Monitoring: Best practices for balancing productivity, security and privacy”
You can find the link for that in the description below.
If you’d like to try out employee monitoring in your company, visit CurrentWare.com/Download for a free trial of BrowseReporter, our computer monitoring software.
And as always stay tuned to our YouTube channel for more videos about employee monitoring, cyber security, and CurrentWare’s workforce management software.
Watch this video to learn the best practices for monitoring employees in the workplace. For more information, download our FREE employee monitoring white paper.
As workplace privacy laws vary from state to state and country to country, drafting a uniform policy for all jurisdictions is not practical. That said, these are the most important elements that employers should consider including in their employee monitoring policy.
The best employee monitoring policy will disclose what is being monitored (data collection) with an explanation of why it is being monitored (legitimate interests). Being transparent about the legitimate business reasons for data collection helps employees understand the benefits of workplace monitoring.
For example…
Drafting this portion of the policy helps define the scope for employee monitoring so that your organization is clear about the benefits it seeks to gain. It also ensures that you (and your employees) have a clear understanding of how the data collection/processing fits into organizational goals.
Employees have a greater expectation of privacy on their personal devices. For that reason employers are typically limited in the amount of monitoring they can perform on personal electronic equipment, even if they are being used for work purposes.
For that reason, organizations that want to monitor employees in a BYOD environment will often monitor the networks and/or remotely accessed workstations that the personal devices connect to instead.
A BYOD monitoring disclosure is an essential part of a workplace monitoring policy. If employees use their personal devices for work in this way they may not realize that the workstation or the virtual private network (VPN) that they connect to is being monitored.
Most companies realize that occasional personal use can help employees decompress in between work tasks.
That said, if personal use is permitted employees must be made aware that employee monitoring software cannot reliably differentiate between personal computer use and work-related computer use. They must be informed that all personal use is being monitored and that authorized members of the organization may have access to it.
Note: In some jurisdictions allowing employees to use work devices for personal tasks may limit what can be monitored, particularly in the case of email monitoring.
The data collected through employee monitoring software may be considered sensitive. For that reason, their activity data must be protected with the same standard of security that other forms of personal information would be protected.
Disclosing what administrative and technical safeguards that are in place also goes a long way to assuring employees that their activity data will be protected against misuse and unauthorized disclosure.
Depending on the jurisdiction of your organization (and that of your employees) it will be subject to unique data security and privacy compliance requirements. Within your workplace monitoring policy, you can disclose what workplace privacy laws protect your employees so that they can be informed about their rights.
For example, European citizens may have privacy protections under GDPR or similar regulation, whereas an American employee may be protected by the CCPA or ECPA.
As a best practice, multinational companies should consider implementing similar privacy protections to all employees regardless of their geolocation. This ensures that the data collection feels fair and demonstrates to employees that their privacy is being protected out of genuine interest rather than simply being a compliance obligation.
Limiting who has access to employee data is an important part of a data privacy and security plan. Employee activity data should only be made available to the individual employee and a select number of authorized representatives that have been trained on their privacy and security responsibilities.
This training will include…
When considering who will have access to employee information, you should consider access from authorized third parties too. Will employee data be shared when requested by law enforcement? What about for troubleshooting purposes with the monitoring software vendor?
Note: As per our Terms of Service we will not have access to employee computer activity data unless it is directly provided by your company for troubleshooting purposes.
Employees should be provided with a designated point of contact that can field any questions or concerns that they may have. This person will typically be a human resources staff member, though it may be an internal privacy officer or external regulatory authority as well.
Use this sample electronic monitoring policy as the foundation for your internal employee privacy policy. This electronic monitoring policy template contains the essential elements that you should cover when monitoring employees in the workplace.
Get started today—Download the FREE template and customize it to fit the needs of your organization.
BEGINNING OF TEMPLATE
Effective Date: | Version Number: | Last Revised: |
[COMPANY] (the “Company”) is committed to maintaining a transparent and fair workplace. Through this Workplace Monitoring Policy (“Workplace Privacy Policy”) [COMPANY] will communicate the company’s intent to monitor its employees, provide information about the categories of data collected, inform employees about how their data will be secured and used, and clarify workplace privacy expectations when using company IT assets.
This policy contains references to the policies, procedures, and practices that will be followed by [COMPANY], its representatives, and any of its present or future subsidiaries when collecting, using, or disclosing the personal information of an identifiable individual that is a present, future, or former employee of [COMPANY].
This Workplace Monitoring Policy constitutes a notification in accordance with [PRIVACY LEGISLATION]. By acknowledging this policy, employees of [COMPANY] consent to the workplace monitoring and surveillance practices outlined herein.
“Video Surveillance” refers to surveillance by means of a camera that monitors or records visual images of activities on company-owned property. Video surveillance does not include the capture of audio.
“Computer Monitoring” refers to the practice of collecting user activity data on company-owned computers, networks, and other IT infrastructure. This data includes, but is not limited to, web browsing history, files downloaded, data input, network traffic, logons to corporate systems, interactions with data, peripheral device usage, and information about the employee’s computer.
“Employee” collectively refers to any directors, officers, managers, employees, other representatives, and agents including consultants and independent contractors of [COMPANY].
“Data Collection” refers to the automated or manual processing of employee data. This includes the collection, use, and storage of employee data such as computer activity data and other forms of personal information.
“Personal Use” refers to an employee using company-owned devices, networks, and other assets for personal tasks such as non-work web browsing and sending personal emails.
“Personal Information” refers to any data collected about an identifiable individual. This includes obfuscated data that, when combined with other information, could identify the individual.
This policy applies to any directors, officers, managers, employees, other representatives, and agents including consultants and independent contractors of [COMPANY], where applicable by law.
Corrective actions with regards to violations of this policy are subject to [COMPANY]’s disciplinary policies. Depending on the severity of the violation, corrective actions may include placement on an employee Performance Improvement Plan (“PIP”), legal action, or employee termination. For more information, please refer to [OTHER POLICY]
This section will outline the privacy rights and expectations that employees of [COMPANY] will have during their employment.
Monitoring employee computer usage is an essential part of enforcing company policies, maintaining a respectful work environment, and ensuring that IT assets that are owned and managed by [COMPANY] are used safely and appropriately.
For that reason, outside of the rights granted by [PRIVACY LEGISLATION], employees must not expect privacy when using [COMPANY] systems. While all personal information collected by [COMPANY] will be used fairly and appropriately as per this policy, all activities that take place via company IT assets should be considered monitored.
[COMPANY] recognizes that its employees may occasionally desire to use company systems for personal tasks during their normal course of business. This may include non-work web browsing, making personal phone calls, or sending emails from personal accounts.
Occasional personal use is permitted, however, to the fullest extent of the law [COMPANY] reserves the right to monitor personal use of company assets to the same extent that it monitors business use. Employees must operate under the assumption that all traffic over company networks is monitored and conduct themselves accordingly.
All personal use of company equipment and systems must abide by [COMPANY]’s Acceptable Use Policies.
For employees who are permitted to use personal electronic equipment for work purposes (“Bring Your Own Device” or “BYOD”), [COMPANY] will make every reasonable effort to not monitor the activities that take place on that device.
Employees participating in the BYOD program will be monitored when accessing the company’s IT infrastructure, cloud-based applications, and other resources. For example, data collection will occur when personal electronic equipment is used on company-owned wireless networks, virtual private networks (“VPN”), and any other interaction from personal electronic equipment with company-owned IT systems.
[COMPANY] reserves the right to inspect personal devices that are used by employees for work purposes if doing so is deemed necessary to maintain the security, confidentiality, and integrity of the company, its systems, and the data that is in our custody.
[COMPANY] reserves the right to remotely wipe all company-owned data from personal electronic equipment. This will most commonly occur when a BYOD-eligible employee is no longer employed by [COMPANY] or personal electronic equipment is lost or stolen.
For more information, please refer to [BYOD POLICY OR OTHER RELATED POLICY].
Video surveillance equipment is used on company premises to ensure that employees, patrons, and company-owned assets are kept secure from theft, vandalism, and other forms of misconduct. Should unlawful activity be discovered, the recordings captured by video surveillance equipment will be used to the fullest extent of the law—including the possibility of disclosure to authorized third parties.
Video surveillance equipment will not be used in areas where employees have a reasonable expectation of privacy, such as bathrooms, changing rooms, and other private areas. Where video surveillance equipment is used the equipment will be made clearly visible and there will be notices indicating the presence of the equipment.
[COMPANY] monitors the network and computer activity of employees to ensure that company-owned IT resources are used in accordance with our acceptable use policy (AUP), information security policy, and other company policies where relevant.
Computer activity data may also be used to evaluate employee performance, detect malicious or high-risk activities, monitor network performance, and prevent security incidents from occurring.
[COMPANY] computer systems are monitored and managed with security and computer monitoring software provided by CurrentWare Inc. As per CurrentWare’s Terms of Service they will not have access to employee computer activity data unless it is explicitly provided by [COMPANY] for the purpose of troubleshooting the software.
All company-owned mobile and landline phones may be monitored to ensure appropriate usage and compliance with [COMPANY]’s policies surrounding the use of telephony in the workplace. If a personal mobile device is used for work purposes, phone calls will not be monitored unless they are made through company-provided mobile applications that are provided for the purpose of making work-related calls.
All email communications that are sent through company-owned networks, equipment, or user accounts are subject to monitoring. This may include personal email accounts when those accounts are accessed through company-owned IT assets.
When sending personal emails on company systems employees must tag personal messages accordingly to indicate to authorized personnel that they must not be reviewed under the normal course of business.
To provide [COMPANY] employees with a reasonable degree of privacy on company-owned assets, the following forms of surveillance are strictly prohibited unless there are exceptional circumstances and a legitimate business reason to do so.
Should dire circumstances require that any of the aforementioned prohibited forms of surveillance be conducted, the surveillance will be done in accordance with the privacy requirements of [PRIVACY LEGISLATION].
The following measures have been put in place by [COMPANY] to ensure that workplace monitoring data, personal information, and other forms of sensitive data are adequately protected and explicitly used for their intended purpose.
To ensure that all personal information is only kept for as long as it is necessary to do so, all data that is captured as a result of workplace monitoring will be stored digitally on [DATA STORAGE LOCATIONS] up to a period of no greater than [RETENTION PERIOD]. Personal information will only be stored for a greater period of time under exceptional circumstances or as required by law.
The employee monitoring measures put in place capture the following data:
The personal information that is collected through workplace monitoring shall only be used for the purpose for which it was collected. The purpose of data collection is outlined in this policy as well as [OTHER RELEVANT POLICIES].
[COMPANY] will only use personal data for a new purpose if the new purpose is either compatible with the original purpose, an employee provides informed consent, or the company has a clear obligation or function set out in law.
[COMPANY] recognizes that employee computer activity data and other data collected through workplace monitoring may be sensitive in nature. For this reason, any personal information that is collected through workplace monitoring will be treated as personally identifiable information (PII) and secured according to the standards set out in [INFORMATION SECURITY POLICY] and [PRIVACY/SECURITY LEGISLATION].
In the event that personal information is disclosed or made available to an unauthorized third party [COMPANY] will follow the incident response plan dictated by [INFORMATION SECURITY POLICY] and [PRIVACY/SECURITY LEGISLATION].
Employee data is made available to a limited number of authorized representatives or third parties associated with [COMPANY]. All persons with access to employee information are required to comply with the confidentiality and security requirements dictated by [INFORMATION SECURITY POLICY] and [PRIVACY/SECURITY LEGISLATION].
In addition, all access to workplace monitoring data is restricted to an as-needed basis. Employee data will not be made available to managers unless the employee is their direct report and the data is required for a legitimate business reason.
Workplace monitoring data is only disclosed to third parties as is required by law or as needed to troubleshoot the workplace monitoring systems used by [COMPANY] to monitor employees in the workplace. All third parties that are provided with access to workplace monitoring data are subject to equivalent confidentiality and security requirements to ensure that employee data is not misused or disclosed without authorization.
To ensure that workplace monitoring is done fairly and transparently, the company has appointed internal representatives for our employees. If an employee does not feel comfortable disclosing their concerns internally they may also contact an external privacy officer or another third party representative.
If you have any questions about this Workplace Monitoring Policy or concerns about how your personal information is managed, please contact one of the below entities.
Please read the workplace monitoring policy carefully to ensure that you understand the policy and your responsibilities before signing this document.
By signing this workplace monitoring policy I indicate that I have read and been informed about the content, requirements, and expectations of the policy. I acknowledge that I have received a copy of the workplace monitoring policy for my records and I agree to abide by the policy guidelines as a condition of my employment and my continuing employment at [COMPANY].
I understand that if I have questions, at any time, regarding the workplace monitoring policy, I will consult the contacts that I have been provided.
_______________ | _______________ | _______________ |
Employee Signature | Employee Printed Name | Date |
_______________ | _______________ | _______________ |
Witness Signature | Witness Printed Name | Date |
END OF TEMPLATE
Get started today—Download the FREE template and customize it to fit the needs of your organization.
At CurrentWare, our mission is to help businesses stay productive and secure. We achieve this through our commitment to providing user-friendly computer monitoring software solutions with high-quality customer service.
When you use CurrentWare products the data you collect remains solely in your control. CurrentWare’s solutions are installed and managed by your company. Your employee’s data cannot be accessed by CurrentWare. For more information please refer to our Terms of Service.
This section outlines the categories of data that CurrentWare’s computer monitoring software is capable of collecting when monitoring employees in the workplace. The data that is specifically captured by each solution depends on what tracking methods are enabled during deployment.
The CurrentWare Suite also includes an Auto Delete Scheduler to periodically cull URL, bandwidth, application, and peripheral device usage data. In addition to reducing storage requirements for the CurrentWare database that is managed by your company, this is a valuable feature for automatically maintaining compliance with the data retention requirements of your organization.
The information contained here is for reference purposes only and is current as of June 2021. For the most up-to-date information on CurrentWare products, please refer to our Release Notes or contact your CurrentWare Account Executive.
Web Filtering Software
Employee Computer Monitoring Software
Device Control & Data Loss Prevention Software
Remote PC Power Management Software
Get started today—Download the FREE template and customize it to fit the needs of your organization.
Cookie | Duration | Description |
---|---|---|
__cfruid | session | Cloudflare sets this cookie to identify trusted web traffic. |
cookielawinfo-checkbox-advertisement | 1 year | Set by the GDPR Cookie Consent plugin, this cookie is used to record the user consent for the cookies in the "Advertisement" category . |
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
JSESSIONID | session | The JSESSIONID cookie is used by New Relic to store a session identifier so that New Relic can monitor session counts for an application. |
LS_CSRF_TOKEN | session | Cloudflare sets this cookie to track users’ activities across multiple websites. It expires once the browser is closed. |
OptanonConsent | 1 year | OneTrust sets this cookie to store details about the site's cookie category and check whether visitors have given or withdrawn consent from the use of each category. |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |
Cookie | Duration | Description |
---|---|---|
__cf_bm | 30 minutes | This cookie, set by Cloudflare, is used to support Cloudflare Bot Management. |
_zcsr_tmp | session | Zoho sets this cookie for the login function on the website. |
Cookie | Duration | Description |
---|---|---|
_calendly_session | 21 days | Calendly, a Meeting Schedulers, sets this cookie to allow the meeting scheduler to function within the website and to add events into the visitor’s calendar. |
_gaexp | 2 months 11 days 7 hours 3 minutes | Google Analytics installs this cookie to determine a user's inclusion in an experiment and the expiry of experiments a user has been included in. |
Cookie | Duration | Description |
---|---|---|
_ga | 2 years | The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors. |
_ga_GY6RPLBZG0 | 2 years | This cookie is installed by Google Analytics. |
_gcl_au | 3 months | Provided by Google Tag Manager to experiment advertisement efficiency of websites using their services. |
_gid | 1 day | Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously. |
CONSENT | 2 years | YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data. |
Cookie | Duration | Description |
---|---|---|
_opt_expid | past | Set by Google Analytics, this cookie is created when running a redirect experiment. It stores the experiment ID, the variant ID and the referrer to the page that is being redirected. |
IDE | 1 year 24 days | Google DoubleClick IDE cookies are used to store information about how the user uses the website to present them with relevant ads and according to the user profile. |
NID | 6 months | NID cookie, set by Google, is used for advertising purposes; to limit the number of times the user sees an ad, to mute unwanted ads, and to measure the effectiveness of ads. |
test_cookie | 15 minutes | The test_cookie is set by doubleclick.net and is used to determine if the user's browser supports cookies. |
VISITOR_INFO1_LIVE | 5 months 27 days | A cookie set by YouTube to measure bandwidth that determines whether the user gets the new or old player interface. |
YSC | session | YSC cookie is set by Youtube and is used to track the views of embedded videos on Youtube pages. |
yt-remote-connected-devices | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt-remote-device-id | never | YouTube sets this cookie to store the video preferences of the user using embedded YouTube video. |
yt.innertube::nextId | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
yt.innertube::requests | never | This cookie, set by YouTube, registers a unique ID to store data on what videos from YouTube the user has seen. |
Cookie | Duration | Description |
---|---|---|
_dc_gtm_UA-6494714-6 | 1 minute | No description |
_gaexp_rc | past | No description available. |
34f6831605 | session | No description |
383aeadb58 | session | No description available. |
663a60c55d | session | No description available. |
6e4b8efee4 | session | No description available. |
c72887300d | session | No description available. |
cookielawinfo-checkbox-tracking | 1 year | No description |
crmcsr | session | No description available. |
currentware-_zldp | 2 years | No description |
currentware-_zldt | 1 day | No description |
et_pb_ab_view_page_26104 | session | No description |
gaclientid | 1 month | No description |
gclid | 1 month | No description |
handl_ip | 1 month | No description available. |
handl_landing_page | 1 month | No description available. |
handl_original_ref | 1 month | No description available. |
handl_ref | 1 month | No description available. |
handl_ref_domain | 1 month | No description |
handl_url | 1 month | No description available. |
handl_url_base | 1 month | No description |
handlID | 1 month | No description |
HandLtestDomainName | session | No description |
HandLtestDomainNameServer | 1 day | No description |
isiframeenabled | 1 day | No description available. |
m | 2 years | No description available. |
nitroCachedPage | session | No description |
organic_source | 1 month | No description |
organic_source_str | 1 month | No description |
traffic_source | 1 month | No description available. |
uesign | 1 month | No description |
user_agent | 1 month | No description available. |
ZCAMPAIGN_CSRF_TOKEN | session | No description available. |
zld685336000000002056state | 5 minutes | No description |