managing productivity – the unseen cost of employees

40
Managing Productivity – The unseen cost of employees. IT HR and Legal considerations of employee privacy and productivity

Upload: raine

Post on 23-Feb-2016

40 views

Category:

Documents


0 download

DESCRIPTION

Managing Productivity – The unseen cost of employees. IT HR and Legal considerations of employee privacy and productivity. Panel Introduction. Seminar Overview. Discussion How is time wasted in an organization Technology, Processes, People Productivity Monitoring – Legal Perspective - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Managing Productivity – The unseen cost of employees

Managing Productivity – The unseen cost of

employees. IT HR and Legal considerations of employee

privacy and productivity

Page 2: Managing Productivity – The unseen cost of employees

Panel Introduction

Page 3: Managing Productivity – The unseen cost of employees

Discussion◦ How is time wasted in an organization

Technology, Processes, People◦ Productivity Monitoring – Legal Perspective◦ Productivity Monitoring – HR Perspective◦ Tools to help monitor activity and maximize productivity

Objective◦ Identify causes of lost productivity◦ Cost of lost productivity◦ Identify effects of monitoring from an HR and Legal

perspective.◦ Identify the need to manage lost productivity

Seminar Overview

Page 4: Managing Productivity – The unseen cost of employees

Why monitor your employees?

Cost

Security

Customer Service

Page 5: Managing Productivity – The unseen cost of employees

Cost

17 hrs. of a 45hr work week are considered non – productive (Microsoft Poll)

Approximately 850 hrs/year per employee.

@20/hr = $17,000

Page 6: Managing Productivity – The unseen cost of employees

SecurityTheft

• Property• Inventory

• Information• Intellectual Property

Data Breeches• Hacks

• Malware/Viruses

Page 7: Managing Productivity – The unseen cost of employees

Customer Service

Page 8: Managing Productivity – The unseen cost of employees

How is time being wasted?

Non-work related activities◦ Social Media, Shopping, Internet, Porn, Fantasy Sports, Socializing,

personal devices Security

◦ Bring Your Own Devices.◦ Theft◦ Technology breeches

Productivity Wasters◦ Out dated Technology - Can waste 20 min per day

Viruses, Malware In adequate Internet Pipe Network Design

◦ Outdated telecom systems◦ Wasted time in meetings◦ Unclear expectations◦ Duplicate processes◦ Document Management

17 hrs. of a 45hr work week are considered non – productive (Microsoft Poll)

Page 9: Managing Productivity – The unseen cost of employees

Non work related activitiesIn 2012 the average time spent on social media sites was 6hrs for males and 8hrs for females per week.

51 % of people ages 25-34 use social networking in the office.

44.7% of 10,000 people polled said that surfing the internet is their biggest distraction.

By 2016 200 million employees will bring their own devise to work.

Page 10: Managing Productivity – The unseen cost of employees

Breakdown of Cyber Monday Spending by LocationCyber Monday 2012 vs. Cyber Monday 2011Total U.S. – Home & Work LocationsSource: comScore, Inc.

Cyber Monday 2011

Cyber Monday 2012

Point Change

Home (incl. University)

43.2% 47.2% +4.0

Work 50.2% 47.1% -3.1 International 6.6% 5.7% -0.9 Total 100.0% 100.0% N/A

Shopping – Cyber Monday

Page 11: Managing Productivity – The unseen cost of employees

BYOD - By 2016 200 million employees will bring their own devise to work.

71% of employers allow personal devices

54% of employees use personal devices for both business and personal activities.• Sales Data, Social Media, Project Management, Office Applications, Calendars, Email

Over half of stolen laptops have resulted in a data breach.

Security Concerns

Page 12: Managing Productivity – The unseen cost of employees
Page 13: Managing Productivity – The unseen cost of employees

Out dated hardware and software.◦ Can waste 20 min per day

Viruses, Malware Network Design In adequate Internet Pipe Outdated telecom systems Wasted time in meetings Unclear expectations Duplicate processes Document Management

Productivity Wasters

Page 14: Managing Productivity – The unseen cost of employees

Legal Concerns re: Workplace Monitoring

Ben Himmelstein, Esq.Shareholder at Wong Fujii Carter, PC

Board of Director – Arizona Small Business Association

Page 15: Managing Productivity – The unseen cost of employees

Computer Monitoring - Generally Very few civil cases where employee sues

employer for breach of privacy – No damages Most employees just quit Comes up more frequently in criminal cases

(child pornography and fourth amendment search and seizure)

Also comes up in cases with public employees working for the State of Federal Government

California’s Constitution provides privacy rights against both private and government entities – most cases from California

Page 16: Managing Productivity – The unseen cost of employees

Some Factors(1) does the corporation maintain a policy banning personal or other

objectionable use of its computers

(2) does the company monitor the use of the employee's computer or e-mail

(3) do third parties have a right of access to the computer or e-mails

(4) did the corporation notify the employee, or was the employee aware, of the use and monitoring policies

In re Reserve Fund Sec. & Derivative Litig., 275 F.R.D. 154, 160 (S.D.N.Y. 2011) (citing In re Asia Global Crossing, Ltd., 322 B.R. 247, 257 (U.S. Bkrptcy Ct. 2005)

Page 17: Managing Productivity – The unseen cost of employees

California Standard(1) Employee must possess a legally protected privacy interest –this

includes conducting personal activities without observation, intrusion, or interference as determined by established social norms derived from such sources as the common law and statutory enactment.

(2) The plaintiff's expectations of privacy must be reasonable. This element rests on an examination of customs, practices, and physical settings surrounding particular activities, as well as the opportunity to be notified in advance and consent to the intrusion.

(3) the plaintiff must show that the intrusion is so serious in nature, scope, and actual or potential impact as to constitute an egregious breach of the social norms.

Hernandez v. Hillsides, Inc., 47 Cal. 4th 272, 287, 211 P.3d 1063, 1073 (2009)

Page 18: Managing Productivity – The unseen cost of employees

What Does All This Mean It is clear that employees have a limited

privacy right depending on certain circumstances (examples to follow)

So, how do you as business owners mitigate any privacy rights they may have in the workplace?

Notice, notice, notice – handbooks, policies, etc.

Page 19: Managing Productivity – The unseen cost of employees

Examples Hernandez v. Hillside (Ca) State v. MA (NJ) Doe v. XYZ Corp (NJ) Stengart v. Loving Care Agency, Inc. (NJ) Peterson v. City of Mesa (AZ)

Page 20: Managing Productivity – The unseen cost of employees

Interesting Questions What about private email over workplace

network? What about personal devices brought to

work and used in the workplace? What about cell phones and cell phone

email? Text messages?

Page 21: Managing Productivity – The unseen cost of employees

Managing Performance

IT HR and Legal considerations of employee privacy and productivity

Page 22: Managing Productivity – The unseen cost of employees

Using the company resourcesUsing company hardware for surfing the netUsing the companies time to engage in social

media?

Growing trend of BYODUsing personal devices for workEmployees prefer their own technologyHousing company information

Where is the line?

Page 23: Managing Productivity – The unseen cost of employees

According to The Society for Human Resource Management , security breaches are huge. Millions of devices are lost or stolen each year. And a locate request is sent every 3.5 seconds.

Companies have no control over an employee’s device (or company data stored on it) if law enforcement officials demand that the person turn over their device as evidence, experts said.

What are the risks

Page 24: Managing Productivity – The unseen cost of employees

The water cooler has movedIt is onlineIt is publicIt is verbalThere are pictures and video

NLRB caseFired for criticizing supervisor on FacebookClaimed that the firing violated an employee's right

to engage in concerted activities.

Monitoring Employee Computer Activities

Page 25: Managing Productivity – The unseen cost of employees

Compliance and ownership when it comes to data.

Businesses that fall under compliance mandates such as PCI DSS, HIPAA, or GLBA have requirements related to information security and safeguarding specific data.

Those rules still must be followed even if the data is on a laptop owned by an employee.

What is HR’s responsibility

Page 26: Managing Productivity – The unseen cost of employees

Make sure you have a clearly defined policy for BYOD.

You should collaborate with IT and Legal and agree to lay out minimum security requirements.

Only then can devices to connect to company data and network resources be used

What is HR’s responsibility?

Page 27: Managing Productivity – The unseen cost of employees

Limit the number of employees who are allowed to use their own devices for work purposes. *Limit the privilege to employees with a “need to know, a need to use, and a need to have” their own devices,

Consider what would happen if an employee left the company with a device with corporate data on it or if their device is lost or stolen.

Consider installing remote wipe software on employees’ devices so sensitive company information can be erased if the device is lost. However, the employee’s consent must be obtained before such software can be installed.

Consider using a “sandbox” on an employee’s device—a separate area where company e-mail, calendar and other functions are stored. The employee would have to enter a separate password to enter this area, and remote wipe software could erase data only in the corporate sandbox.

When determining policy

Page 28: Managing Productivity – The unseen cost of employees

Prohibit nonexempt employees from answering work related e-mails outside working hours when using their own equipment, companies can avoid being liable for wage and hour and expense reimbursement costs.

Consider restricting employees from using devices such as iPhones that sync automatically with other devices in their homes. This prevents company data from being transferred automatically to other devices.

Make it clear to employees that they should not let family and friends use personal devices that are used for company purposes and should not share or store passwords on these devices.

Require employees to report promptly when a smart device they use for work is lost or stolen.

When determining policy

Page 29: Managing Productivity – The unseen cost of employees

Productivity Management

Strategies and tools

Page 30: Managing Productivity – The unseen cost of employees

Do you know how your employees are spending their time?

Do you have duplicate process? Do you have efficient processes?

Information

Knowledge is Power

Page 31: Managing Productivity – The unseen cost of employees

ToolsPolicy

Activity Monitoring

Collaboration Tools Telecom

Page 32: Managing Productivity – The unseen cost of employees

Activity Monitoring - MyPCReports

Page 33: Managing Productivity – The unseen cost of employees
Page 34: Managing Productivity – The unseen cost of employees

Collaboration- SharePoint

Page 35: Managing Productivity – The unseen cost of employees
Page 36: Managing Productivity – The unseen cost of employees
Page 37: Managing Productivity – The unseen cost of employees

WorkFlow

Microsoft Confidential – Presentation under NDA

Page 38: Managing Productivity – The unseen cost of employees

Telecommunications

Page 39: Managing Productivity – The unseen cost of employees
Page 40: Managing Productivity – The unseen cost of employees

Questions?