Monitor Employees Legally

In order to keep electronic data safe corporations are using technology to monitor their employees.  Below are some helpful links that describe the various monitoring technologies and resources that are currently being used in the work place.

Legal Monitoring Tools

What the government uses to monitor cyber space

The Wall Street Journal obtained documents that detail the different technologies that the government uses to monitor what goes around on the internet.  The article discusses the various applications of hacking, intercepting data, analysis of the data, web scraping, and anonymity.  Included are links to various other documents about these tools and applications.

Contract with Industrial Security Firm

A model contract that outlines the most important considerations when making a contract with an Industrial Security Firm regarding data security.  These include services provided, reporting procedures and confidentiality, licensing, bonding, indemnification, billing statements and payments, contract dispute or termination, and signatures of the parties.  It also provides an example of a hypothetical report created by the Industrial Security Firm. 

About Industrial Security Firms

There is a need for a Industrial Security Firm to protect companies from employee theft and help punish offenders. They operate on the private sector and offer both preventative and investigative services to help small companies prevent/limit employee theft. There are several legal implications of tracking/monitoring employees that companies and ISFs must follow in order for employees to maintain their reasonable expectation of privacy.

PRISM and Privacy, What Could They Know About Me?

Most people are aware that there is a lot of data and information about them floating around, but most people do not realize exactly how much exists.  Companies being aware of your interests based on web searches, online shopping, and social media is a very common and fairly accepted form of tracking.  Companies can obtain this data, or other similar data, through traditional means or by means of cell phones, transportation systems, and mobile applications, which are some less widely known sources of information gathering utilized.  To learn more about information privacy read the full text below.

Page last modified February 1, 2014