Employers have the right to monitor employee computer use.

You must balance the employee’s right to privacy with the employer’s right to monitor workplace computer systems.

Bill Hiltz

Digital monitoring software can reveal who is doing what on a computer.

Generally speaking digital monitoring looks at “what is happening”, while digital forensics looks at “what has happened”.

Digital monitoring is usually performed to ensure employees are in compliance with your office policies and applicable laws (eg.: HIPAA)

Digital forensics is performed when auditing a practice to look for theft, or to support a civil or criminal case.

I use monitoring and forensics tools when helping dentists and practice owners resolve their concerns.

Employee Monitoring Software

There are many products that employers can use to monitor employee computer use. PC Magazine has published their top “employee monitoring” software picks for 2020. View them here: https://www.pcmag.com/roundup/357211/the-best-employee-monitoring-software

To viewer a live demo of an employee monitoring software, click here (no sign up, this launches the demo): https://democompany.teramind.co/#/report/Focus+Dashboard

The post lists the basic requirements for an employer to have in place before monitoring computer use.

Three things you must do when monitoring employee computer use.

  1. Have a policy notifying your employees that their use of your company’s computers may be monitored and that employees should not have any expectation of privacy on employer’s computers. Download our sample policy here.
  2. Each employee acknowledges receipt of the above policy.
  3. Do not attempt to, or access any employee password protected sites (such as personal email/social media) without explicit written approval and authorization from the employee.
Using digital monitoring and forensic tools, here are some of the things that I have uncovered employees doing on practice computers.    

Employees were found:

  1. stealing (fraud/embezzlement)
  2. spending too much time on Instagram, Pinterest, etc.
  3. looking for another job while working
  4. downloading music or software from pirate websites. (can open the door to ransomware)
  5. reading the owner’s private emails (yes, it happens)
  6. accessing private owner information (more often than you may think)
  7. copying and stealing confidential information (patient lists, bank login information, etc.)
  8. sharing confidential practice information with outsiders
  9. criticizing the practice owner to patients, friends
  10. soliciting patients, vendors, third parties (making “deals”)
  11. inappropriate posting of information on social media
  12. accessing computers remotely without owner’s knowledge or consent
  13. allowing outsiders to access office computers with owner’s knowledge
  14. selling your dental supplies online
  15. regular participation in online gambling
  16. accessing porn at work
  17. spying on other employees
  18. plotting against the owner’s spouse and family
  19. making fun of patients by name (insults, jokes)

Here’s how to get in touch.