The IT Certification Resource Center

Featured Deal

Get CompTIA, Cisco, or Microsoft training courses free for a week.
Learn More ❯

Do Employers Monitor Your Computer Usage at Work?

Monitoring employees woman with tabletMeasuring productivity is actually the least common reason given for monitoring. Because many employers do like to know the productivity and performance of each employee, managers and HR are the main consumers for this type of data.


They need to track how much time employees spend doing non-work-related activities such as using social networking websites or applications, downloading and playing games, sending personal e-mail messages, online shopping, and reading news.


These activities, while they may provide a quick break, can become major time-wasters. While most employers do understand — and accept — that a reasonable degree of “non-work” activities will take place, over-use can quickly land an employee in hot water.


Policy compliance is a more common reason to monitor employees. Companies track employees’ activities to ensure their compliance with existing policies. Company policies may restrict access to specific websites such as social networking ones while at workplace.


The restriction of downloading specific files such as gaming files on company’s computers is important to prevent malware infiltration. In all cases, a company’s internet and computer usage policy should be clearly defined and effectively communicated to all employees when they are hired, and then again on a regular basis as a “gentle” reminder.


Statistics are essential data for network engineers. They love to collect statistics about network traffic and they continuously monitor to gather data for analysis. A common practice is to give priority to mission critical traffic over other non-important traffic.


Accurate monitoring of internet traffic enables employers to efficiently utilize and optimize the impact of internet connections. For example, e-mail traffic in a production factory is more important than social networking traffic. In the case of a marketing agency, social networking interaction is more vital.


Security, or the protection of sensitive data, is the Number One reason companies give for monitoring employees. Keeping an eye on internet activities enables a company to detect activates that may expose the network to malware.


It also ensures employees don’t visit inappropriate and potentially unsafe websites such as those specializing in adult entertainment, gaming, and social networking. These sites often can enable bad actors to track users and profiles to gain access to the network.


Companies increasingly use active monitoring systems rather than passive ones for security. These systems can prevent unauthorized activities and information leak.


One example of such active monitoring is blocking an e-mail message from being received from outside the company if the monitoring system detects that it contains sensitive data. Another example is blocking access to a gaming website that has been classified as containing malicious software.


In addition to protecting company systems from security threats and information leaks, employers also monitor employee activities to investigate fraud cases and better understand how they occurred. For example, a review of e-mail activities could reveal how a company marketing campaign was leaked to a competitor.


What Should You Do Next?


Employee monitoring is ever more common. In most cases, it’s an overall statistical monitoring rather than personal monitoring. Specific user monitoring is usually done only when a major misuse is identified, to ensure employee compliance with company policy.


Knowing that you are being monitored at work shouldn’t overly scare you. Rather, it should encourage you to follow best practices to ensure your personal privacy and protect company assets. You should know and comply with your company’s usage policies always.


Also, keep your personal life separate from the workplace to ensure your own individual data privacy. Use your business e-mail for business-related messages only. Employers are monitoring employees for efficient and effective management of company’s resources. As an employee, it is your responsibility to help ensure that efficiency and effectiveness.




Ahmed Badr is a network consultant with more than 10 years of experience designing, implementing and operating large scale network infrastructures. He holds a BSc in Communications and one in Electronics Engineering, and a Master of Business Administration. He also holds a CCIE certificate in Routing and Switching since 2008. Ahmed can be contacted at: This email address is being protected from spambots. You need JavaScript enabled to view it..




Privacy Policy Update

We have updated our Privacy Policy to comply with the California Consumer Privacy Act (CCPA)