Feeds

NSW bans workplace cyber-snooping

Criminal offence

  • alert
  • submit to reddit

Using blade systems to cut costs and sharpen efficiencies

Unauthorised snooping on workers by their employers is to be banned in Australia's New South Wales.

Regulations in the Exposure Bill, due out next month, will make it a criminal offence for an employer to carry out covert surveillance on its staff unless a company can show a "reasonable suspicion of wrongdoing by an employee", AAP reports.

The rules will prohibit the use of technologies including video cameras, email monitoring software and tracking devices in illicit spying. NSW employers will be obliged to be more up-front about monitoring, for example by writing rules into employment contracts.

"The law to date has not provided any guidance when legitimate employer concern crosses the line into unauthorised cyber snooping," Attorney-General Bob Debus told NSW's parliament.

"While some employers argue that this is necessary to protect their legitimate interests, employees expect that their private correspondence, like their private telephone calls or private conversations, should never be the subject of secret monitoring."

Trade unions, which have campaigned on the issue for four years, are delighted.

"This is truly a historic development and a recognition that workers using computers at work have privacy rights," NSW Labor Council secretary John Robertson told AAP. Robertson added the rules would help endure privacy when workers contact their trade union for advice or during disputes.

Employers are likely to be far from pleased. A recent study found that four in five Australian bosses use technology to monitor worker's emails, phone calls and Internet usage.

The UK Information Commissioner announced a code of practice on surveillance in the workplace last year. This requires companies to inform employees if they are monitoring phone calls, emails and Internet use. The Commissioner, Richard Thomas, said the guidelines tried to balance the needs of employers with the rights of employees.

But critics say the Employment Practices Data Protection Code, more than two years in development, is still too vague and does little to safeguard privacy in the workplace. ®

Related stories

Privacy in the workplace is a 'myth'
Anti-email snooping proposals 'stupid'
IT workers expect Big Brother-style snooping at work

Boost IT visibility and business value

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.