{"id":3809,"date":"2018-10-11T11:30:42","date_gmt":"2018-10-11T09:30:42","guid":{"rendered":"https:\/\/beebole.com\/blog\/?p=3809"},"modified":"2025-07-07T17:17:39","modified_gmt":"2025-07-07T15:17:39","slug":"employee-monitoring","status":"publish","type":"post","link":"https:\/\/beebole.com\/blog\/employee-monitoring","title":{"rendered":"What are the US employee monitoring laws? The 101 FAQ [Up to date]"},"content":{"rendered":"\n<div  class=\"montserrat-font my-5 mx-auto bbl_definition_snippet\">\n  <div class=\"mb-4\">\n    <div class=\"bbl-ds-item question mb-3\">\n      <h2 class=\"h4 mb-0 mt-0\">What is employee monitoring?<\/h2>\n    <\/div>\n    <div class=\"bbl-ds-item answer\">\n      <p>Companies use employee monitoring to gain insights into employee behavior and performance. This could include monitoring of internet use, keystrokes, screenshots, phone calls, emails, and GPS tracking. Monitoring allows employers to track employee engagement, measure productivity and attendance, ensure security, and even collect proof in employee disputes.<\/p>\n    <\/div>\n  <\/div>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"legal\">Is employee monitoring legal?<\/h2>\n\n\n\n<p>Broadly, in the US, <strong>employee monitoring is legal and mostly unregulated<\/strong>. As an employer-provided computer system is property of the employer, they may listen to, watch, and read employees&#8217; workplace communication and, in some cases, personal messages. What&#8217;s more, an employer&#8217;s stated policy on workplace monitoring might not be legally binding.<\/p>\n\n\n\n<p>Digital privacy is covered by the <a href=\"https:\/\/it.ojp.gov\/PrivacyLiberty\/authorities\/statutes\/1285\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\">Electronic Communications Privacy Act (ECPA)<\/a>, which protects against the interception (in transit) of digital and electronic communications. It also includes the <a href=\"http:\/\/uscode.house.gov\/view.xhtml?path=\/prelim@title18\/part1\/chapter121&amp;edition=prelim\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\">Stored Communications Act (SCA)<\/a>, which, as the name suggests, covers the disclosure of stored communications and records. The ECPA includes a business exception that allows employers to intercept communications on systems provided by the employer, and when it is done in the &#8220;ordinary course of business&#8221;. The SCA has a broader exception, allowing employers to access stored information outside of the ordinary course of business.<\/p>\n\n\n\n<p>On a state level, only <a href=\"https:\/\/www.ctdol.state.ct.us\/wgwkstnd\/laws-regs\/statute31-48d.htm\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\">Connecticut<\/a> and <a href=\"http:\/\/delcode.delaware.gov\/title19\/c007\/sc01\/index.shtml\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\">Delaware<\/a> require that employers notify employees about monitoring of email or internet beforehand. These laws apply to the specific cases covered below.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"track-employee-phone\">Can you track an employee&#8217;s phone?<\/h2>\n\n\n\n<p>In most cases, employers may track the use of a company provided phone, including mobile phones. The <a href=\"https:\/\/it.ojp.gov\/PrivacyLiberty\/authorities\/statutes\/1285\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\">Electronic Communications Privacy Act<\/a> stipulates that employers can intercept calls in the ordinary course of business, and when equipment furnished by a communication services provider is used.<\/p>\n\n\n\n<p>Under the ECPA, an employer must stop monitoring a call once they&#8217;ve determined it&#8217;s personal. Employers can protect themselves by prohibiting personal phone calls and\/or clearly identifying lines where calls will be monitored (as seen in&nbsp;<a href=\"https:\/\/scholar.google.com\/scholar_case?case=17684616399503853969&amp;hl=en&amp;as_sdt=6&amp;as_vis=1&amp;oi=scholarr\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\"><em>James v. Newspaper Agency Corp.<\/em><\/a> and&nbsp;<a href=\"https:\/\/scholar.google.com\/scholar_case?case=18009979693561959347&amp;hl=en&amp;as_sdt=6&amp;as_vis=1&amp;oi=scholarr\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\"><em>Simmons v. Southwestern Bell Telephone Co.<\/em><\/a>). However, the court ruled against the employer in&nbsp;<a href=\"https:\/\/scholar.google.com\/scholar_case?case=11212446034094840663&amp;hl=en&amp;as_sdt=6&amp;as_vis=1&amp;oi=scholarr\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\"><em>Watkins v. L.M. Berry &amp; Co.<\/em><\/a> because employees had been told personal calls would only be monitored up to the point necessary to determine if they were personal. Other rulings against employers include cases where monitoring equipment was not furnished by a communication services provider, but was privately purchased or homemade.<\/p>\n\n\n\n<p>Regardless, most Americans use their personal mobile phone for work. It&#8217;s therefore important for employers to create <strong>a clear &#8220;Bring Your Own Device&#8221; policy<\/strong>. This will help protect employers not only with monitoring, but also in cases of data breaches, legal discovery, and liability for employee actions.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"employee-computers\">Can you monitor employees&#8217; computers?<\/h2>\n\n\n\n<p>Generally, an employer can monitor any activity on a company owned computer or network. This includes laptops or other devices outside the workplace, but provided by an employer. Monitoring software can take <strong>screenshots<\/strong>, access hard disks, and monitor keystrokes and internet usage of employees.<\/p>\n\n\n\n<p>Case law on computer monitoring is well established and certainly favors the employer. However, some union contracts may include exceptions, and there are small differences in certain state laws. The 4th amendment protection against unlawful search and seizure may cover certain public employees. Therefore, it&#8217;s best to establish a clear company policy and get <strong>employee consent<\/strong>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"employee-email\">Can you monitor employee email?<\/h2>\n\n\n\n<p>An employer can review the contents of a company owned email system. This is true even if an employee has marked emails as &#8220;private&#8221;. If employees are notified that computers are monitored, or are not for personal use, it&#8217;s understood that personal email used at work may be checked.<\/p>\n\n\n\n<p>With regards to work email, case law stipulates that neither password protected personal folders, nor at home computers are protected if they are company owned (<a href=\"http:\/\/www.internetlibrary.com\/cases\/lib_case127.cfm\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\"><em>McLauren v. Microsoft<\/em><\/a> and&nbsp;<a href=\"https:\/\/law.justia.com\/cases\/california\/court-of-appeal\/4th\/96\/443.html\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\"><em>TBG Insurance v. Superior Ct.<\/em><\/a>, respectively). Case law for personal email is more ambiguous.<\/p>\n\n\n\n<p>The case&nbsp;<a href=\"https:\/\/caselaw.findlaw.com\/nj-supreme-court\/1522648.html\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\"><em>Stengart v. Loving Care<\/em><\/a> showed a &#8220;<strong>reasonable expectation of privacy<\/strong>&#8221; because company policy on personal email use was ambiguous. Moreover, the emails in question were between the plaintiff and her attorney. The court ruled that a company cannot enact a policy that forces employees to give up rights like attorney-client privilege.<\/p>\n\n\n\n<p>The court also found a reasonable expectation of privacy in&nbsp;<a href=\"https:\/\/law.justia.com\/cases\/federal\/district-courts\/new-york\/nysdce\/1:2008cv04810\/326754\/165\/\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\"><em>Pure Power Boot Camp, Inc. v. Warrior Fitness Boot Camp, LLC<\/em><\/a> because of ambiguous policy. Furthermore, it couldn&#8217;t be proven that emails sent via a third party provider (e.g. Hotmail or Gmail) were in fact sent from or read on company equipment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"employee-gps\">Is it legal for an employer to track an employee using GPS?<\/h2>\n\n\n\n<p>GPS tracking of an employer owned vehicle is legal in all states, and tracking using company owned property (like a smartphone) is legal in most. Tracking employees using their own property is a <strong>legal grey area<\/strong>. In all cases, employers must be cautious about tracking employees outside work hours.<\/p>\n\n\n\n<p>In the most notable case,&nbsp;<a href=\"https:\/\/www.govinfo.gov\/app\/details\/USCOURTS-caed-1_15-cv-01101\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\"><em>Arias v. Intermex Wire Transfer<\/em><\/a>, the plaintiff claimed she was fired after uninstalling a GPS tracking app on a company-issued smartphone. She was told the phone needed to be left on 24\/7 to receive client calls, and that it would continue to track her during off-work hours. While the case settled out of court, it&#8217;s a tale of caution for employers.<\/p>\n\n\n\n<p>In most cases, location tracking is allowed whenever the employee is aware of it. Sufficient notice, or awareness, indicates implied consent. In other words, an employee usually doesn&#8217;t need to give signed consent. Nevertheless, employers should err on the side of caution and communicate clear company policies.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"social-media\">Can an employer monitor employee social media?<\/h2>\n\n\n\n<p>Employer &#8220;monitoring&#8221; of social media use is <strong>difficult to define<\/strong>, as content shared on social media is willingly made public by the poster. California, Illinois, Maryland, Michigan, Nebraska, New Mexico, New Jersey, Utah, Washington, and Wisconsin do have laws prohibiting employers from requiring employees to supply social media login information.<\/p>\n\n\n\n<p>Regardless, the <a href=\"https:\/\/www.nlrb.gov\/guidance\/key-reference-materials\/national-labor-relations-act\" target=\"_blank\" rel=\"noopener\">National Labor Relations Act<\/a> (section 7) gives employees the right to discuss the terms and conditions of their employment with their co-workers or anyone outside the company. In other words, an employee generally cannot be fired for complaining about work conditions via social media. Nearly 30 states also have laws protecting employees from termination based on legal activities outside the workplace. This could include use of alcohol and tobacco, or political activism.<\/p>\n\n\n\n<p>Companies should consult state law when creating <strong>policies<\/strong> on social media use.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"gdpr\">How does GDPR impact employee monitoring in the US?<\/h2>\n\n\n\n<p>The <a href=\"https:\/\/www.eugdpr.org\/\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\">General Data Protection Regulation (GDPR)<\/a> applies to United States companies with employees in the European Union. GDPR strengthens existing laws on employee monitoring in the European Union, which require necessity, awareness, and agreement.<\/p>\n\n\n\n<p>In other words, all of the above mentioned cases change if you are dealing with employees in the EU. Companies must inform these employees in clear, concise language about data collected. This includes the means of collection, how data will be used, what will be stored, for how long, and who will have access to it. If a company can legally monitor employees, they must ensure that only necessary data is collected, that it is used for the purpose for which it was collected, and that it is properly secured.<\/p>\n\n\n\n<p><strong>Stay tuned for a future post<\/strong> that will cover employee monitoring in the European Union in more detail.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"time-tracking\">Is &#8220;time tracking&#8221; employee monitoring?<\/h2>\n\n\n\n<p>Employee <a class=\"highlighted-link bbl-link-hs bbl-link-hs-v-1\" href=\"https:\/\/beebole.com\" target=\"_blank\" rel=\"noopener\" data-abc=\"true\"><span>time tracking<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M11.25 0.875H15.625C15.7908 0.875 15.9497 0.940848 16.0669 1.05806C16.1842 1.17527 16.25 1.33424 16.25 1.5V5.875C16.25 6.04076 16.1842 6.19973 16.0669 6.31694C15.9497 6.43415 15.7908 6.5 15.625 6.5C15.4592 6.5 15.3003 6.43415 15.1831 6.31694C15.0658 6.19973 15 6.04076 15 5.875V3.00833L4.81667 13.1917C4.69819 13.3021 4.54148 13.3622 4.37956 13.3593C4.21765 13.3565 4.06316 13.2909 3.94865 13.1764C3.83414 13.0618 3.76854 12.9074 3.76569 12.7454C3.76283 12.5835 3.82293 12.4268 3.93333 12.3083L14.1167 2.125H11.25C11.0842 2.125 10.9253 2.05915 10.8081 1.94194C10.6908 1.82473 10.625 1.66576 10.625 1.5C10.625 1.33424 10.6908 1.17527 10.8081 1.05806C10.9253 0.940848 11.0842 0.875 11.25 0.875ZM2.5 4.625C2.16848 4.625 1.85054 4.7567 1.61612 4.99112C1.3817 5.22554 1.25 5.54348 1.25 5.875V14.625C1.25 14.9565 1.3817 15.2745 1.61612 15.5089C1.85054 15.7433 2.16848 15.875 2.5 15.875H11.25C11.5815 15.875 11.8995 15.7433 12.1339 15.5089C12.3683 15.2745 12.5 14.9565 12.5 14.625V7.75C12.5 7.58424 12.5658 7.42527 12.6831 7.30806C12.8003 7.19085 12.9592 7.125 13.125 7.125C13.2908 7.125 13.4497 7.19085 13.5669 7.30806C13.6842 7.42527 13.75 7.58424 13.75 7.75V14.625C13.75 15.288 13.4866 15.9239 13.0178 16.3928C12.5489 16.8616 11.913 17.125 11.25 17.125H2.5C1.83696 17.125 1.20107 16.8616 0.732233 16.3928C0.263392 15.9239 0 15.288 0 14.625V5.875C0 5.21196 0.263392 4.57607 0.732233 4.10723C1.20107 3.63839 1.83696 3.375 2.5 3.375H9.375C9.54076 3.375 9.69973 3.44085 9.81694 3.55806C9.93415 3.67527 10 3.83424 10 4C10 4.16576 9.93415 4.32473 9.81694 4.44194C9.69973 4.55915 9.54076 4.625 9.375 4.625H2.5Z\"\/><\/svg><\/span><\/a> could certainly fall under the umbrella of &#8220;monitoring&#8221;, but with <strong>some important differences<\/strong>. For one, usually employees themselves perform time tracking, with full transparency. Employees clock themselves in and out and record their own time. They are in control. Collected information is limited to the amount of time and\/or money spent on a task or client. No personal information, conversations, or correspondence are monitored.<\/p>\n\n\n\n<p>Another key distinction is in the ultimate objective of time tracking versus monitoring. Targeted monitoring of employees is usually meant to clamp down on theft, fraud, harassment, or some other unprofessional or even illegal behavior. The main goal of task and time tracking is to <strong>collect business intelligence<\/strong>. Effective <a class=\"highlighted-link bbl-link-hs bbl-link-hs-v-1\" href=\"https:\/\/beebole.com\/employee-timesheet-reports\/\" data-abc=\"true\"><span>time tracking can not only save companies time and administrative costs, but also offer valuable data and insights<svg width=\"17\" height=\"18\" viewBox=\"0 0 17 18\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M11.25 0.875H15.625C15.7908 0.875 15.9497 0.940848 16.0669 1.05806C16.1842 1.17527 16.25 1.33424 16.25 1.5V5.875C16.25 6.04076 16.1842 6.19973 16.0669 6.31694C15.9497 6.43415 15.7908 6.5 15.625 6.5C15.4592 6.5 15.3003 6.43415 15.1831 6.31694C15.0658 6.19973 15 6.04076 15 5.875V3.00833L4.81667 13.1917C4.69819 13.3021 4.54148 13.3622 4.37956 13.3593C4.21765 13.3565 4.06316 13.2909 3.94865 13.1764C3.83414 13.0618 3.76854 12.9074 3.76569 12.7454C3.76283 12.5835 3.82293 12.4268 3.93333 12.3083L14.1167 2.125H11.25C11.0842 2.125 10.9253 2.05915 10.8081 1.94194C10.6908 1.82473 10.625 1.66576 10.625 1.5C10.625 1.33424 10.6908 1.17527 10.8081 1.05806C10.9253 0.940848 11.0842 0.875 11.25 0.875ZM2.5 4.625C2.16848 4.625 1.85054 4.7567 1.61612 4.99112C1.3817 5.22554 1.25 5.54348 1.25 5.875V14.625C1.25 14.9565 1.3817 15.2745 1.61612 15.5089C1.85054 15.7433 2.16848 15.875 2.5 15.875H11.25C11.5815 15.875 11.8995 15.7433 12.1339 15.5089C12.3683 15.2745 12.5 14.9565 12.5 14.625V7.75C12.5 7.58424 12.5658 7.42527 12.6831 7.30806C12.8003 7.19085 12.9592 7.125 13.125 7.125C13.2908 7.125 13.4497 7.19085 13.5669 7.30806C13.6842 7.42527 13.75 7.58424 13.75 7.75V14.625C13.75 15.288 13.4866 15.9239 13.0178 16.3928C12.5489 16.8616 11.913 17.125 11.25 17.125H2.5C1.83696 17.125 1.20107 16.8616 0.732233 16.3928C0.263392 15.9239 0 15.288 0 14.625V5.875C0 5.21196 0.263392 4.57607 0.732233 4.10723C1.20107 3.63839 1.83696 3.375 2.5 3.375H9.375C9.54076 3.375 9.69973 3.44085 9.81694 3.55806C9.93415 3.67527 10 3.83424 10 4C10 4.16576 9.93415 4.32473 9.81694 4.44194C9.69973 4.55915 9.54076 4.625 9.375 4.625H2.5Z\"\/><\/svg><\/span><\/a>. Companies can better allocate resources, more accurately forecast budgets, analyze trends, and identify opportunities and challenges.<\/p>\n\n\n\n<p>Employees will be far more receptive to time tracking if they understand the value of it, so companies should strive to clearly communicate the means and objectives.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">So what does it all mean?<\/h2>\n\n\n\n<p>Employee privacy laws can be vague, which means that all parties should err on the side of caution. Companies are understandably eager to control costs and employee performance. However, they should be aware of the <strong>legal consequences<\/strong>, as well as the <a href=\"https:\/\/beebole.com\/blog\/employee-monitoring-good-bad-ugly\/\" data-abc=\"true\">impact on employee morale and workplace culture<\/a>.<\/p>\n\n\n\n<p>To fully understand your rights and obligations, refer to state and federal laws, like the <a href=\"https:\/\/it.ojp.gov\/PrivacyLiberty\/authorities\/statutes\/1285\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\">Electronic Communications Privacy Act<\/a>, the <a href=\"http:\/\/uscode.house.gov\/view.xhtml?path=\/prelim@title18\/part1\/chapter121&amp;edition=prelim\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\">Stored Communications Act<\/a>, and the <a href=\"https:\/\/www.eugdpr.org\/\" data-abc=\"true\" target=\"_blank\" rel=\"noopener\">General Data Protection Regulation<\/a>. Companies should also consider implementing or reviewing the following policies: an Electronic Communication Policy, Social Media Policy, Bring Your Own Device (BYOD) Policy, Sexual Harassment Policy, Confidentiality and Non-Disclosure Policy, and a Written Information Security Program (WISP).<\/p>\n\n\n\n<p>And last but not least, if you found this post helpful, you won&#8217;t want to miss our <a href=\"https:\/\/beebole.com\/blog\/employee-break-laws-usa\/\">FAQs on U.S. employee breaks<\/a>.<\/p>\n\n\n\n<div  class=\"mx-auto bbl_cta_block bk-light\">\n\t<a class=\"bbl_cta_block-blockcontent bbl_cta_block-link d-block overflow-hidden position-relative rounded-4 text-decoration-none\" href=\"https:\/\/beebole.com\/blog\/employee-monitoring-how-to-implement-avoid-common-pitfalls\" title=\"Employee monitoring: How to avoid the most common pitfalls [and the alternative]\">\n\t\t\t\t\t<div class=\"bbl-blue-dot object-fit-cover position-absolute start-0 top-0\" style=\"background-image: url(https:\/\/beebole.com\/blog\/wp-content\/themes\/sage\/public\/images\/blue-dot.a385a5.svg)\"><\/div>\n\t\t\t\t<div class=\"bottom-0 end-0 object-fit-cover position-absolute bbl-orange-dot\" style=\"background-image: url(https:\/\/beebole.com\/blog\/wp-content\/themes\/sage\/public\/images\/orange-dot.47ecad.svg)\"><\/div>\n\n\t\t<div class=\"bbl_cta_block-row align-items-center d-flex flex-md-row justify-content-center mx-0 no-gutters position-relative row\">\n\t\t\t<div class=\"bbl_cta_block-img-col col d-flex justify-content-start pe-md-2 pe-lg-4 px-0\">\n\t\t\t\t<img\n\t\t\t\t\talt=\"Employee monitoring: How to avoid the most common pitfalls [and the alternative]\"\n\t\t\t\t\tclass=\"d-block h-auto mw-lg-100\"\n\t\t\t\t\tloading=\"lazy\"\n\t\t\t\t\theight=\"240\"\n\t\t\t\t\tsrc=\"https:\/\/beebole.com\/blog\/wp-content\/themes\/sage\/public\/images\/promotion-post.9422b6.png\"\n\t\t\t\t\twidth=\"360\"\n\t\t\t\t\/>\n\t\t\t<\/div>\n\t\t\t<div class=\"bbl_cta_block-text-col col mt-md-0 ps-0\">\n\t\t\t\t\t\t\t\t\t<div class=\"mb-1\"><div class=\"bbl_cta_block-label lh-base mb-2 mb-md-4\">RELATED POST<\/div><\/div>\n\t\t\t\t\t\t\t\t<div class=\"bbl_cta_block-title lh-base\">Employee monitoring: How to avoid the most common pitfalls [and the alternative]<\/div>\n\t\t\t\t\t\t\t\t\t<div>\n\t\t\t\t\t\t<div class=\"bbl_cta_block-button h6 lh-1 mb-0 mt-3\">\n\t\t\t\t\t\t\tRead more\t\t\t\t\t\t\t<svg class=\"ms-2\" width=\"15\" height=\"14\" viewBox=\"0 0 15 14\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n\t\t\t\t\t\t\t\t<path d=\"M5.9375 1.09375L6.625 0.40625C6.9375 0.125 7.40625 0.125 7.6875 0.40625L13.7812 6.46875C14.0625 6.78125 14.0625 7.25 13.7812 7.53125L7.6875 13.625C7.40625 13.9062 6.9375 13.9062 6.625 13.625L5.9375 12.9375C5.65625 12.625 5.65625 12.1562 5.9375 11.8438L9.71875 8.25H0.75C0.3125 8.25 0 7.9375 0 7.5V6.5C0 6.09375 0.3125 5.75 0.75 5.75H9.71875L5.9375 2.1875C5.65625 1.875 5.625 1.40625 5.9375 1.09375Z\" fill=\"#313358\" \/>\n\t\t\t\t\t\t\t<\/svg>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t<\/a>\n<\/div>\n\n\n<p>&#8212;<\/p>\n\n\n\n<p>Photo by Rishabh Varshney on Unsplash<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is employee monitoring legal? Broadly, in the US, employee monitoring is legal and mostly unregulated. As an employer-provided computer system is property of the employer, they may listen to, watch, and read employees&#8217; workplace communication and, in some cases, personal messages. What&#8217;s more, an employer&#8217;s stated policy on workplace monitoring might not be legally binding. [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":3813,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[123],"tags":[1295,2714],"class_list":["post-3809","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-productivity-time-management","tag-workforce-management","tag-law"],"acf":[],"_links":{"self":[{"href":"https:\/\/beebole.com\/blog\/wp-json\/wp\/v2\/posts\/3809","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beebole.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beebole.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beebole.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/beebole.com\/blog\/wp-json\/wp\/v2\/comments?post=3809"}],"version-history":[{"count":12,"href":"https:\/\/beebole.com\/blog\/wp-json\/wp\/v2\/posts\/3809\/revisions"}],"predecessor-version":[{"id":14011,"href":"https:\/\/beebole.com\/blog\/wp-json\/wp\/v2\/posts\/3809\/revisions\/14011"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beebole.com\/blog\/wp-json\/wp\/v2\/media\/3813"}],"wp:attachment":[{"href":"https:\/\/beebole.com\/blog\/wp-json\/wp\/v2\/media?parent=3809"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beebole.com\/blog\/wp-json\/wp\/v2\/categories?post=3809"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beebole.com\/blog\/wp-json\/wp\/v2\/tags?post=3809"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}