NSW bans workplace cyber-snooping

Criminal offence

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

Unauthorised snooping on workers by their employers is to be banned in Australia's New South Wales.

Regulations in the Exposure Bill, due out next month, will make it a criminal offence for an employer to carry out covert surveillance on its staff unless a company can show a "reasonable suspicion of wrongdoing by an employee", AAP reports.

The rules will prohibit the use of technologies including video cameras, email monitoring software and tracking devices in illicit spying. NSW employers will be obliged to be more up-front about monitoring, for example by writing rules into employment contracts.

"The law to date has not provided any guidance when legitimate employer concern crosses the line into unauthorised cyber snooping," Attorney-General Bob Debus told NSW's parliament.

"While some employers argue that this is necessary to protect their legitimate interests, employees expect that their private correspondence, like their private telephone calls or private conversations, should never be the subject of secret monitoring."

Trade unions, which have campaigned on the issue for four years, are delighted.

"This is truly a historic development and a recognition that workers using computers at work have privacy rights," NSW Labor Council secretary John Robertson told AAP. Robertson added the rules would help endure privacy when workers contact their trade union for advice or during disputes.

Employers are likely to be far from pleased. A recent study found that four in five Australian bosses use technology to monitor worker's emails, phone calls and Internet usage.

The UK Information Commissioner announced a code of practice on surveillance in the workplace last year. This requires companies to inform employees if they are monitoring phone calls, emails and Internet use. The Commissioner, Richard Thomas, said the guidelines tried to balance the needs of employers with the rights of employees.

But critics say the Employment Practices Data Protection Code, more than two years in development, is still too vague and does little to safeguard privacy in the workplace. ®

Related stories

Privacy in the workplace is a 'myth'
Anti-email snooping proposals 'stupid'
IT workers expect Big Brother-style snooping at work

Protecting users from Firesheep and other Sidejacking attacks with SSL

More from The Register

next story
Spies would need SUPER POWERS to tap undersea cables
Why mess with armoured 10kV cables when land-based, and legal, snoop tools are easier?
Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM
Anyone claiming to know before tomorrow is telling porkies
Jihadi terrorists DIDN'T encrypt their comms 'cos of Snowden leaks
Intel bods' analysis concludes 'no significant change' after whistle was blown
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
TOR users become FBI's No.1 hacking target after legal power grab
Be afeared, me hearties, these scoundrels be spying our signals
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
China hacked US Army transport orgs TWENTY TIMES in ONE YEAR
FBI et al knew of nine hacks - but didn't tell TRANSCOM
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story


Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.