Over 50% of companies have fired workers for e-mail, Net abuse
Most employees knew they were being monitored
IDG News Service - Think you can get away with using e-mail and the Internet in violation of company policy? Think again.
A new survey found that more than a quarter of employers have fired workers for misusing e-mail and one third have fired workers for misusing the Internet on the job. The study, conducted by the American Management Association (AMA) and The ePolicy Institute, surveyed 304 U.S. companies of all sizes.
The vast majority of bosses who fired workers for Internet misuse -- 84 percent -- said the employee was accessing porn or other inappropriate content. While looking at inappropriate content is an obvious no-no on company time, simply surfing the Web led to a surprising number of firings. As many as 34 percent of managers in the study said they let go of workers for excessive personal use of the Internet, according to the survey.
Among managers who fired workers for e-mail misuse, 64 percent did so because the employee violated company policy and 62 percent said the workers' e-mail contained inappropriate or offensive language. More than a quarter of bosses said they fired workers for excessive personal use of e-mail and 22 percent said their workers were fired for breaching confidentiality rules in e-mail.
Companies are worried about the inappropriate use of the Internet, and so 66 percent of those in the study said they monitor Internet connections. As many as 65 percent of them use software to block inappropriate Web sites. Eighteen percent of the companies block URLs to prevent workers from visiting external blogs.
Companies use different methods to monitor workers' computers, with 45 percent of those participating in the survey tracking content, keystrokes and time spent at the keyboard. An additional 43 percent store and review computer files. Twelve percent monitor blogs to track content about the company and 10 percent monitor social-networking sites.
Companies are keen to track employee e-mail and Internet behavior in part due to legal fears. According to research done by the AMA and ePolicy in 2006, 24 percent of companies in the study had e-mail subpoenaed by courts and another 15 percent have faced lawsuits based on employee e-mails.
The researchers found that even though only two states require companies to notify their workers that they're monitoring them, most tell employees of their monitoring activities. Of the companies that monitor workers in the survey, 83 percent said they tell employees that they are monitoring content, keystrokes and time spent at the keyboard. As many as 84 percent tell employees that they review computer activity and 71 percent alert workers that they monitor their e-mails.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts