<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Law and Labour &#187; Company policy</title>
	<atom:link href="http://lawandlabour.com/tag/company-policy/feed/" rel="self" type="application/rss+xml" />
	<link>http://lawandlabour.com</link>
	<description>Employment law issues</description>
	<lastBuildDate>Wed, 26 Mar 2025 18:43:42 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.2.38</generator>
	<item>
		<title>Morrisons faces huge bill following data theft</title>
		<link>http://lawandlabour.com/morrisons-faces-huge-bill-following-data-theft/</link>
		<comments>http://lawandlabour.com/morrisons-faces-huge-bill-following-data-theft/#comments</comments>
		<pubDate>Sat, 07 Nov 2015 16:27:41 +0000</pubDate>
		<dc:creator><![CDATA[Law and Labour]]></dc:creator>
				<category><![CDATA[Digital business]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[Energy and Utilities]]></category>
		<category><![CDATA[Financial services]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Hospitality]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Public sector]]></category>
		<category><![CDATA[Retail]]></category>
		<category><![CDATA[Transport]]></category>
		<category><![CDATA[Company policy]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[Information Commissioner's Office]]></category>

		<guid isPermaLink="false">http://lawandlabour.com/?p=2288</guid>
		<description><![CDATA[<p>It’s a scenario designed to spread fear into the hearts of most businesses. A disgruntled employee bent on seeking revenge against his employer. Said employee steals confidential company data and spreads it far and wide over the Internet, much to the horror of his soon-to-be former employer.</p>
<p>In the case of Morrisons, the nightmare scenario became reality when their internal auditor Andrew Skelton stole the banking details of 100,000 Morrisons staff and published this data on a variety of websites. Skelton had been angered by the company’s handling of an internal disciplinary matter. In July he was jailed for eight years after being found guilty of fraud, unauthorised access to computer material and unlawful disclosure of personal data.</p>
<p>The nightmare is not yet over for Morrisons, however. Last month more than 2,000 of the employees affected by Skelton’s actions took Morrisons to court in order to seek financial compensation for their loss. The company have already forked out millions of pounds to repair the damage caused by the data theft and they look to be facing another sizeable bill to defend these claims.</p>
<p>The Morrison saga is a tale of woe that could befall any business. Under the laws governing data protection with which every employer is required to comply, information security is of paramount importance:</p>
<p>“Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.” Data Protection Act 1998, seventh data protection principle</p>
<p>All employers should ensure they have adequate security measures in place to prevent such thefts from occurring in the first place. In the Morrisons case, Skelton had a level of access to confidential and sensitive data beyond that of the ordinary employee. With hindsight Morrisons will probably wish they had monitored his activities more closely following his disciplinary matter.</p>
<p>If, despite the best precautions, the worst should happen and data go missing, then the Information Commissioner’s Office (ICO) recommends a four-part response. Click on the headers below for more information:</p>
Containment and recoveryInvestigate the breach and take steps to prevent any ongoing loss, such as changing security codes.Risk assessmentIdentify the potential adverse consequences of the theft, particularly for employees.NotificationNotify the ICO of any serious breach, for example, where there is potential harm to employees as a result of the theft or a large volume of data has been stolen. Notify employees of the theft and give them advice on how to respond.ResponseReview and update any information security procedures and policies in light of the failings exposed by the breach.
<p>Photo: MacBook Pro backlit keyboard Tom Eversley</p>
]]></description>
		<wfw:commentRss>http://lawandlabour.com/morrisons-faces-huge-bill-following-data-theft/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Monitoring employees&#8217; use of the Internet</title>
		<link>http://lawandlabour.com/monitoring-internet/</link>
		<comments>http://lawandlabour.com/monitoring-internet/#comments</comments>
		<pubDate>Sun, 29 Mar 2015 11:13:46 +0000</pubDate>
		<dc:creator><![CDATA[Law and Labour]]></dc:creator>
				<category><![CDATA[Articles]]></category>
		<category><![CDATA[Company policy]]></category>
		<category><![CDATA[Data protection]]></category>
		<category><![CDATA[Human rights]]></category>
		<category><![CDATA[Misconduct]]></category>
		<category><![CDATA[Monitoring employees]]></category>
		<category><![CDATA[Unfair dismissal]]></category>

		<guid isPermaLink="false">http://lawandlabour.com/?p=1907</guid>
		<description><![CDATA[<p>The recent news that three judges have lost their jobs after being caught viewing obscene material on workplace computers has brought the issue of monitoring employees’ Internet usage into the fore. The judges’ illicit activities presumably came to light as a result of their employer reviewing their Internet usage.</p>
<p>Most employers have systems that maintain daily records of Internet activity, which are logged at various times during the day. These can be searched to identify unusual or illicit activity. However, an employer is not free to undertake any monitoring of an employee’s computer usage it wishes merely because such usage is taking place at work. Monitoring must be done in a way that is consistent with a myriad of legislation, including laws relating to data protection, human rights and telecommunications. There is also a duty of trust and confidence implied into each employee’s contract of employment which may be breached by an employer’s monitoring activities.</p>
<p>A general principle is that any monitoring must be proportionate so that the adverse impact of monitoring an individual is justified by the benefit of such monitoring to the business. The usual purpose of monitoring is to uncover any activities that might expose the company to risk of suit, such as the transmission of confidential information, infringement of copyright, or inappropriate use of company computers.</p>
<p>First, employees must have notice that monitoring will be carried out. The company should have a policy on the use of electronic communications which describes the sort of Internet material that employees are prohibited from viewing. An effective electronic communications policy would contain an express prohibition on visiting sites that contain obscence content (in case any employees are under the misguided notion that it is appropriate to do so while at work). The policy should also warn employees that any inappropriate use of the Internet will be dealt with under the disciplinary procedure.</p>
<p>If any suspicious activity is uncovered during monitoring, it should be investigated. Employers should avoid a knee-jerk reaction when taking disciplinary action. The employee should be given an opportunity to explain their behaviour or challenge the disciplinary findings. This is an important step as there are rare cases of employees successfully justifying their behaviour on the grounds of disability or ignorance of company rules. Finally, any punishment for breach of the electronic communications policy should be applied consistently and fairly.</p>
]]></description>
		<wfw:commentRss>http://lawandlabour.com/monitoring-internet/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
