Feeds

Boeing guards its right to tail employees

Perfectly legal

The Essential Guide to IT Transformation

As Americans fret over the Bush Administration's efforts to eavesdrop on their telephone and internet communications, many of us forget how common it is for employers to spy on their workers. The Seattle Post-Intelligencer is here to remind us of that sad fact, with a story reporting on a program within Boeing that tracks employees' movements even after they leave the company's premises.

One team within the aeronautics giant has permission to secretly monitor employees through what amount to backdoors installed on company computers, according to the report. A worker's every keystroke, Gmail message or website visit is fair game for the so-called "enterprise" investigators.

One employee for Boeing, Washington state's largest employer, recent learned he was followed when he left company property for lunch. Private detectives also recorded footage of him as he was "coming and going" and accessed his Gmail account. Boeing notified the unidentified worker of the surveillance activities after suspecting he had been speaking to a member of the media. He has since been fired.

Boeing declined to discuss specifics of its surveillance program but told the paper it has multiple organizations that provide checks and balances to make sure investigations are conducted legally.

Lest readers believe Boeing is unique in its tailing of employees, it's worth remembering the Hewlett-Packard installed a monitoring system that snooped on instant messages sent by a company flack suspected of volunteering sensitive company information. HP also sent spooks to Disney Land to spy on a CNET News.com reporter and intercepted phone records of dozens of people it thought might be on one side or the other of embarrassing leaks.

While many of HP's investigators' activities were illegal, its spying on employees while on company premises or when using company computers and phones is perfectly legal. There generally is nothing prohibiting the trailing and recording of employees while they are in public.

The Post Intelligencer article comes as the Bush Administration is seeking a change to the Foreign Intelligence Surveillance Act (FISA) to permit wiretapping without a warrant when US citizens are not involved. Legislation has been passed by both the US House of Representatives and a Senate subcommittee. The bills come two years after The New York Times reported that government intelligence officers intercepted huge amounts of phone and internet traffic.

Several lawsuits have taken aim at the Bush Administration and telecommunications firms that secretly cooperated in the wiretapping. Meanwhile, employer spying continues with comparatively little fuss.

"Employees should understand that the law generally gives employers broad authority to conduct surveillance, whether through email, video cameras or other forms of tracking, including off the job in many cases," Ed Mierzwinski, a consumer program director at the federation of Public Interest Research Groups, told the Post-Intelligencer. ®

Build a business case: developing custom apps

More from The Register

next story
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.