Are Your Employees on the Clock 24×7?

Employers have liability when employees commit crimes using company resources. The liability could also involve personal devices that are used for work. Does your employment policy cover employee owned devices? Employers need to be aware that misuse of company smartphones, computers, networks, and the Internet can leave them at real risk for an employee’s wrongful actions.

Laptop and Smart Phone Security: Employers need to restrict access and storage of customer and employee Non-Public Information on portable devices that leave the office.


Social Media Policy must have: When are they on the clock?

“If your company has employees managing its social media you better have a policy that makes it clear when they are “on the clock” and “off the clock” or you could end up in trouble for violating the Fair Labor Standards Act.”

Employees with Mobile Work Email Can Sue for Overtime, Warn Legal Experts

“Employees who read and send work email after hours – particularly using an employer-provided mobile device such as a Blackberry – may end up suing their employer for overtime hours incurred while performing work-related email tasks on the devices, outside of the course of the normal business day.”

Private Sensitive Information

Do You Know Your Cost of a Lost Laptop?: The average value of a lost laptop is $49,246. This value is based on seven cost components: replacement cost, detection, forensics, data breach, lost intellectual property costs, lost productivity and legal, consulting and regulatory expenses.

Criminal Liability

Mitigate the challenges of supporting employee-owned devices

“Scott Lowe gives tips on how to address various challenges associated with employee-owned devices, including smartphones.”

All employers need to consult an attorney about their policies covering these issues.

About Bruce Demarest

Bruce Demarest is a Identity Theft Protection Specialist. He has designed and taught classes to educate individuals and businesses in identity theft risk management. The individuals have learned how to continuously monitor their financial identities from credit fraud, plus how to monitor their personal identifying information for unauthorized use. His business clients have become compliant with the federal & state privacy laws. He has conducted information security audits to identify their potential problems and has designed security policies, programs, and practices to address those problem areas.
This entry was posted in Business Identity Theft, Business Law, Identity Theft Protection and tagged , , , , , , , , , , , , , , , , . Bookmark the permalink.

1 Response to Are Your Employees on the Clock 24×7?

  1. Pingback: The employee’s dilemma – Keeping Sweet in Seattle

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s