Workplace surveillance

Authors Avatar

Workplace surveillance has become increasingly popular over the past few years, and there are now numerous methods that can be used to monitor employees, these include:

  • Hidden Cameras;
  • Keyboard Monitoring (counting keystrokes, eg. data-entry);
  • Undercover Workers (similar to spies);
  • Telephone and Email Monitoring;
  • Monitored Web Use; and
  • Monitoring Staff Locations (electronic locators).

Over seventy five per cent of employees in the USA are being monitored in some form as they go about their daily routines (Serwer, 2003), many of who are unaware that the surveillance is even in place. This highlights the magnitude of workplace surveillance, yet its application is expected to grow significantly more in the near future.

There are numerous reasons as to why workplace surveillance has become such common practice in the everyday workforce, mainly relating to employees being less productive, and in some cases behaving in an inappropriate or even illegal manner.

Instead of monitoring only those employees who exhibit suspicious behaviour, many employers are instituting “continuous, systematic surveillance” (Schulman, 2003) in the workplace in order to identify any wrongdoing by all employees. This involves continually observing each employee’s every move using techniques such as computer monitoring; which entails examining a workers use of a computer both during and after it is used. This can be achieved with the aid of numerous technologies including:

  • Packet Sniffers:

A packet sniffer is a program that can see all of the information passing over the network it is connected to. As data streams back and forth on the network, the program looks at it, or “sniffs,” each packet. The packet is the part of the message that has been broken up.

  • Log Files:

Computers are full of log files that provide evidence of what you have been doing (eg. Internet History). Through these log files, a system administrator can determine what web sites you have accessed, who you are sending emails to and receiving emails from, and what applications are being used.

  • Desktop Monitoring Programs:

Every time you provide some form of input for your computer, whether it is typing a letter or number, or opening a new application, a signal is transmitted (Bosnor, 2003). These signals can be intercepted by a ‘desktop monitoring program’, which can be installed on a computer at the operating system level or the assembly level. The person receiving the intercepted signals can see each character being typed and can replicate what the user is seeing on their screen.

Join now!
  • Phones and Closed Circuit Cameras:

Traditional “eavesdropping” methods such as listening in on an employee’s phone call are still common practice in many organisations. Storing and reviewing voice mail and video-recording employees actions on the job is still a very effective way of monitoring employee behaviour (American Management Association, 2003).

Companies generally engage in monitoring practices for a number of different reasons such as: performance review, legal compliance, legal liability, and productivity measures (Greenberg, 2000).

In terms of the availability of workplace surveillance software all one needs to do is make a simple web query (“workplace surveillance software”/ ...

This is a preview of the whole essay