[{"data":1,"prerenderedAt":498},["ShallowReactive",2],{"document-policy-on-privacy-and-employee-monitoring-D724":3},{"document":4,"label":23,"preview":11,"thumb":24,"description":5,"descriptionCustom":6,"apiDescription":5,"pages":8,"extension":10,"parents":25,"breadcrumb":29,"related":35,"customDescModule":174,"customdescription":6,"mdFm":175,"mdProseHtml":497},{"description":5,"descriptionCustom":6,"label":7,"pages":8,"size":9,"extension":10,"preview":11,"thumb":12,"svgFrame":13,"seoMetadata":14,"parents":15,"keywords":22},"[Company NAME]'S Privacy in the Workplace Policy Polygraph Testing Some jobs at [YOUR COMPANY NAME] fall within the exception to the prohibition against using polygraph tests for employment screening. If the employee is applying for, transferring to or being considered for promotion to a job for which polygraph testing is required, the employee will be notified in advance that polygraph testing is a requirement of the job. Before any test is administered the employee will receive notice of the date, time and place, as well as a list of questions to be asked. In addition, if the employee is under suspicion in connection with an ongoing investigation of economic loss (theft or embezzlement, for example) at [YOUR COMPANY NAME], the employee will be notified that a polygraph test is required and what the employee's rights are with respect to the test. Refusal to submit to a legitimately requested polygraph test may be used as grounds for discharge. Monitoring",null,"Policy on Privacy and Employee Monitoring","1",24,"doc","https://templates.business-in-a-box.com/imgs/1000px/policy-on-privacy-and-employee-monitoring-D724.png","https://templates.business-in-a-box.com/imgs/250px/724.png","https://templates.business-in-a-box.com/svgs/docviewerWebApp1.html?v6#724.xml",{"title":6,"description":6},[16,19],{"label":17,"url":18},"Human Resources","/templates/human-resources/",{"label":20,"url":21},"Company Policies","/templates/company-policies/","policy privacy employee monitoring","Policy on Privacy and Employee Monitoring Template","https://templates.business-in-a-box.com/imgs/400px/724.png",[26,16,19],{"label":27,"url":28},"Templates","/templates/",[30,31,32],{"label":27,"url":28},{"label":17,"url":18},{"label":33,"url":34},"Workplace Policies","/templates/workplace-policies/",[36,40,44,48,52,56,60,64,68,72,76,80,84,101,115,129,146,162],{"label":37,"url":38,"thumb":39,"extension":10},"Data Privacy Policy","/template/data-privacy-policy-D13465","https://templates.business-in-a-box.com/imgs/250px/13465.png",{"label":41,"url":42,"thumb":43,"extension":10},"GDPR Privacy Policy","/template/gdpr-privacy-policy-D12541","https://templates.business-in-a-box.com/imgs/250px/12541.png",{"label":45,"url":46,"thumb":47,"extension":10},"Online Privacy Policy","/template/online-privacy-policy-D13026","https://templates.business-in-a-box.com/imgs/250px/13026.png",{"label":49,"url":50,"thumb":51,"extension":10},"Website Privacy Policy","/template/website-privacy-policy-D839","https://templates.business-in-a-box.com/imgs/250px/839.png",{"label":53,"url":54,"thumb":55,"extension":10},"Data Protection and Privacy Policy","/template/data-protection-and-privacy-policy-D13653","https://templates.business-in-a-box.com/imgs/250px/13653.png",{"label":57,"url":58,"thumb":59,"extension":10},"Employee Meal Policy","/template/employee-meal-policy-D13670","https://templates.business-in-a-box.com/imgs/250px/13670.png",{"label":61,"url":62,"thumb":63,"extension":10},"Employee Rewards Policy","/template/employee-rewards-policy-D13677","https://templates.business-in-a-box.com/imgs/250px/13677.png",{"label":65,"url":66,"thumb":67,"extension":10},"Employee Termination Policy","/template/employee-termination-policy-D13489","https://templates.business-in-a-box.com/imgs/250px/13489.png",{"label":69,"url":70,"thumb":71,"extension":10},"Employee Sickness Policy","/template/employee-sickness-policy-D13488","https://templates.business-in-a-box.com/imgs/250px/13488.png",{"label":73,"url":74,"thumb":75,"extension":10},"Privacy Policy and Code Of Conduct","/template/privacy-policy-and-code-of-conduct-D14035","https://templates.business-in-a-box.com/imgs/250px/14035.png",{"label":77,"url":78,"thumb":79,"extension":10},"Employee Assistance Program Policy","/template/employee-assistance-program-policy-D13665","https://templates.business-in-a-box.com/imgs/250px/13665.png",{"label":81,"url":82,"thumb":83,"extension":10},"Employee Disciplinary Action Policy","/template/employee-disciplinary-action-policy-D13487","https://templates.business-in-a-box.com/imgs/250px/13487.png",{"description":85,"descriptionCustom":6,"label":86,"pages":87,"size":88,"extension":10,"preview":89,"thumb":90,"svgFrame":91,"seoMetadata":92,"parents":94,"keywords":99,"url":100},"IT EQUIPMENT, EMAIL & INTERNET USAGE POLICY OVERVIEW The internet is to be used to further the Company's mission of providing the highest quality service to the Company's customers and employees, and to support other direct job-related purposes. Supervisors should work with employees to determine the appropriateness of using the Company's internet/intranet access. Limited personal use of internet resources is a special exception to the general prohibition against the personal use of computer equipment and software. Employees are individually liable for any and all damages incurred as a result of violating company security policy, copyright and licensing agreements. For these reasons, internet access will be granted only to users to support business activities and only according to their needs in the exercise of their professional functions and roles. PURPOSE The purpose of this policy is to define the appropriate uses of the internet by [COMPANY NAME] employees and affiliates. APPLICABILITY This policy applies to all employees and the use of the term \"employees\" should be read broadly to include permanent full-time and part-time employees, contract workers, temporary workers, business partners and suppliers who have access to the internet through computer or networking resources. In addition, this policy also covers and applies to employees using social media for work purposes and to the personal use of social media when away from work when the employee's employment is identified, known, or presumed. The company's internet users are required to familiarize themselves with and comply with this policy, as well as to use common sense and judgment in the use of internet services. POLICY Access to the internet Internet access will only be granted if reasonable operational needs are identified. In addition, internet services will only be provided in accordance with the employee's current responsibilities. If an employee changes business unit or job, a new internet access request must be submitted within [SPECIFY] business days. Finally, user internet access requirements will be reviewed periodically by the company's departments to ensure that needs are ongoing. Allowed Usage The use of the internet is granted only to support commercial activities necessary for the performance of professional duties. All users must follow the company's principles concerning the use of resources and exercise good judgment in the use of the internet. If you have any questions, please contact the IT department. Acceptable use of the internet to perform the duties of a position includes: Communication between employees and non-employees for commercial purposes; IT technical support downloading software updates and patches; Review of potential suppliers' websites for product information; Reference regulatory or technical information. Research Personal Usage The use of the company's IT resources to access the internet for personal use, without the approval of the user's manager and IT department, may result in disciplinary action up to and including termination. All internet users should be aware that the company's network creates an audit log that reflects service requests, both for incoming and outgoing addresses and that it is constantly reviewed. Users who choose to store or transmit personal information such as private keys, credit card numbers or certificates or who use internet \"wallets\" do so at their own risk. [COMPANY NAME] is not responsible for any loss of information, such as information stored in the portfolio, or any resulting loss of personal property. Prohibited Usage The acquisition, storage and dissemination of illegal, pornographic or racially, gender- or belief-denigrating data is expressly prohibited. The company also prohibits the conduct of a commercial enterprise, political activities, any form of information gathering at its facilities, and fraudulent activities or the knowing dissemination of false and defamatory material. Other activities that are strictly prohibited include, but are not limited to: Using the facilities and equipment in conflict with our objectives, such as to operate a personal business or to seek alternate employment; Broadcasting personal points of view such as commentaries on social or political issues; Participating in internet chat groups, online contest or promotion; Using the facilities and equipment to buy or sell items; Using the facilities and equipment to participate in any kind of on-line games, including gambling; Access company information that is not part of their work. This includes unauthorized reading of client account information, unauthorized access to personnel file information and access to information that is not necessary for the appropriate performance of the duties of the employee's position; Misuse, unauthorized disclosure or modification of customer or staff information. This includes unauthorized modification of a personal file or sharing of electronic data on clients or staff with unauthorized personnel; Any conduct that would constitute or encourage a criminal offense, lead to civil liability, or otherwise violate any regulations, local, state, national or international law; The use, transmission, duplication or voluntary receipt of material that violates the copyrights, trademarks, trade secrets or patent rights of any person or organization. Assume that all material on the internet is protected by copyright or patents, unless specifically stated otherwise;","It Equipment Email And Internet Usage Policy","4",513,"https://templates.business-in-a-box.com/imgs/1000px/it-equipment,-email-and-internet-usage-policy-D12640.png","https://templates.business-in-a-box.com/imgs/250px/12640.png","https://templates.business-in-a-box.com/svgs/docviewerWebApp1.html?v6#12640.xml",{"title":93,"description":6},"it equipment email and internet usage policy",[95,97],{"label":17,"url":96},"human-resources",{"label":20,"url":98},"company-policies","it equipment email internet usage policy","/template/it-equipment-email-and-internet-usage-policy-D12640",{"description":102,"descriptionCustom":6,"label":103,"pages":104,"size":105,"extension":10,"preview":106,"thumb":107,"svgFrame":108,"seoMetadata":109,"parents":110,"keywords":113,"url":114},"Employee Handbook Understanding employment at [YOUR COMPANY NAME] Revised on [DATE] Prepared By: [YOUR NAME] [YOUR JOB TITLE] Phone 555.555.5555 Email info@yourbusiness.com www.yourbusiness.com Table of Content Table of Content 2 Welcome to [YOUR COMPANY NAME]! 5 1. Organization Description 6 1.1 Introductory Statement 6 1.2 Customer Relations 6 1.3 Products and Services Provided 7 1.4 Facilities and Location(s) 7 1.5 The History of [YOUR COMPANY NAME] 7 1.6 Management Philosophy 7 1.7 Goals 8 2. The Employment 9 2.1 Nature of Employment 9 2.2 Employee Relations 9 2.3 Equal Employment Opportunity 10 2.4 Diversity 10 2.5 Business Ethics and Conduct 12 2.6 Personal Relationships in the Workplace 13 2.7 Conflicts of Interest 13 2.8 Outside Employment 14 2.9 Non-Disclosure 15 2.10 Disability Accommodation 16 2.11 Job Posting and Employee Referrals 17 2.12 Whistleblower Policy 18 2.13 Accident and First Aid 20 3. Employment Status and Records 21 3.1 Employment Categories 21 3.2 Access to Personnel Files 22 3.3 Personnel Data Changes 23 3.4 Probation Period 23 3.5 Employment Applications 24 3.6 Performance Evaluation 24 3.7 Job Descriptions 25 3.8 Salary Administration 25 3.9 Professional Development 26 4. Employee Benefit Programs 27 4.1 Employee Benefits 27 4.2 Vacation Benefits 27 4.3 Military Service Leave 29 4.4 Religious Observance 29 4.5 Holidays 29 4.6 Workers Insurance 30 4.7 Sick Leave Benefits 31 4.8 Bereavement Leave 32 4.9 Relocation Benefits 33 4.10 Educational Assistance 33 4.11 Health Insurance 34 4.12 Life Insurance 35 4.13 Long Term Disability 35 4.14 Marriage, Maternity and Parental Leave 36 5. Timekeeping / Payroll 40 5.1 Timekeeping 40 5.2 Paydays 40 5.3 Employment Termination 41 5.4 Administrative Pay Corrections 42 6. Work Conditions and Hours 43 6.1 Work Schedules 43 6.2 Absences 43 6.3 Jury Duty 45 6.4 Use of Phone and Mail Systems 45 6.5 Smoking 46 6.6 Meal Periods 46 6.7 Overtime 46 6.8 Use of Equipment 47 6.9 Telecommuting 47 6.10 Emergency Closing 48 6.11 Business Travel Expenses 49 6.12 Visitors in the Workplace 51 6.13 Computer and Email Usage 51 6.14 Internet Usage 52 6.15 Workplace Monitoring 54 6.16 Workplace Violence Prevention 55 7. Employee Conduct & Disciplinary Action 57 7.1 Employee Conduct and Work Rules 57 7.2 Sexual and Other Unlawful Harassment 58 7.3 Attendance and Punctuality 60 7.4 Personal Appearance 60 7.5 Return of Property 61 7.6 Resignation and Retirement 61 7.7 Security Inspections 62 7.8 Progressive Discipline 62 7.9 Problem Resolution 64 7.10 Workplace Etiquette 65 7.11 Suggestion Program 67 Acknowledgement of Receipt 68 Welcome to [YOUR COMPANY NAME]! On behalf of your colleagues, we welcome you to [YOUR COMPANY NAME] and wish you every success here. At [YOUR COMPANY NAME], we believe that each employee contributes directly to the growth and success of the company, and we hope you will take pride in being a member of our team. This handbook was developed to describe some of the expectations of our employees and to outline the policies, programs, and benefits available to eligible employees. Employees should become familiar with the contents of the employee handbook as soon as possible, for it will answer many questions about employment with [YOUR COMPANY NAME]. We believe that professional relationships are easier when all employees are aware of the culture and values of the organization. This guide will help you to better understand our vision for the future of our business and the challenges that are ahead. We hope that your experience here will be challenging, enjoyable, and rewarding. Again, welcome! [PRESIDENT NAME] President & CEO 1. Organization Description 1.1 Introductory Statement This handbook is designed to acquaint you with [YOUR COMPANY NAME] and provide you with information about working conditions, employee benefits, and some of the policies affecting your employment. You should read, understand, and comply with all provisions of the handbook. It describes many of your responsibilities as an employee and outlines the programs developed by [YOUR COMPANY NAME] to benefit employees. One of our objectives is to provide a work environment that is conducive to both personal and professional growth. No employee handbook can anticipate every circumstance or question about policy. As [YOUR COMPANY NAME] continues to grow, the need may arise and [YOUR COMPANY NAME] reserves the right to revise, supplement, or rescind any policies or portion of the handbook from time to time as it deems appropriate, in its sole and absolute discretion. Employees will be notified of such changes to the handbook as they occur. 1.2 Customer Relations Customers are among our organization's most valuable assets. Every employee represents [YOUR COMPANY NAME] to our customers and the public. The way we do our jobs presents an image of our entire organization. Customers judge all of us by how they are treated with each employee contact. Therefore, one of our first business priorities is to assist any customer or potential customer. Nothing is more important than being courteous, friendly, helpful, and prompt in the attention you give to customers. [YOUR COMPANY NAME] will provide customer relations and services training to all employees with extensive customer contact. Customers who wish to lodge specific comments or complaints should be directed to the [TITLE AND NAME OF THE PERSON RESPONSIBLE] for appropriate action. Our personal contact with the public, our manners on the telephone, and the communications we send to customers are a reflection not only of ourselves, but also of the professionalism of [YOUR COMPANY NAME]. Positive customer relations not only enhance the public's perception or image of [YOUR COMPANY NAME], but also pay off in greater customer loyalty and increased sales and profit. 1.3 Products and Services Provided You will find more information about our products and services by reading the [YOUR COMPANY NAME] Corporate Brochures. 1.4 Facilities and Location(s) Head Office: [ADDRESS] [CITY], [STATE] [ZIP/POSTAL CODE] [COUNTRY] 1.5 The History of [YOUR COMPANY NAME] [DESCRIBE THE HISTORY OF YOUR COMPANY HERE] 1.6 Management Philosophy [YOUR COMPANY NAME] management philosophy is based on responsibility and mutual respect. Our wishes are to maintain a work environment that fosters on personal and professional growth for all employees. Maintaining such an environment is the responsibility of every staff person. Because of their role, managers and supervisors have the additional responsibility to lead in a manner which fosters an environment of respect for each person. People who come to [YOUR COMPANY NAME] want to work here because we have created an environment that encourages creativity and achievement. [YOUR COMPANY NAME] aims to become a leader in [DESCRIBE YOUR COMPANY'S FIELD OF EXPERTISE]. The mainstay of our strategy will be to offer a level of client focus that is superior to that offered by our competitors. To help achieve this objective, [YOUR COMPANY NAME] seeks to attract highly motivated individuals that want to work as a team and share in the commitment, responsibility, risk taking, and discipline required to achieve our vision. Part of attracting these special individuals will be to build a culture that promotes both uniqueness and a bias for action. While we will be realistic in setting goals and expectations, [YOUR COMPANY NAME] will also be aggressive in reaching its objectives. This success will in turn enable [YOUR COMPANY NAME] to give its employees above average compensation and innovative benefits or rewards, key elements in helping us maintain our leadership position in the worldwide marketplace. 1.7 Goals [DESCRIBE YOUR COMPANY'S GOALS HERE] 2. The Employment 2","Employee Handbook","34",280,"https://templates.business-in-a-box.com/imgs/1000px/employee-handbook-D712.png","https://templates.business-in-a-box.com/imgs/250px/712.png","https://templates.business-in-a-box.com/svgs/docviewerWebApp1.html?v6#712.xml",{"title":6,"description":6},[111,112],{"label":17,"url":96},{"label":20,"url":98},"employee handbook","/template/employee-handbook-D712",{"description":116,"descriptionCustom":6,"label":117,"pages":118,"size":88,"extension":10,"preview":119,"thumb":120,"svgFrame":121,"seoMetadata":122,"parents":124,"keywords":127,"url":128},"REMOTE WORK AGREEMENT This Remote Work Agreement (the \"Agreement\") is effective [DATE], BETWEEN: [NAME OF THE EMPLOYER], (the \"Employer\" or \"Company\"), a Company organized and existing under the laws of the [State/Province] of [STATE/PROVINCE], with its head office located at: [COMPLETE ADDRESS] AND: [NAME OF THE EMPLOYEE], (the \"Employee\"), an individual with their main address located at: [COMPLETE ADDRESS] Collectively, the Employer and the Employee shall be referred to as the \"Parties.\" WHEREAS, the Company has made an offer to the Employee to work remotely in the capacity of [JOB TITLE] at the Company; NOW THEREFORE in consideration and as a condition of the Parties entering into this Agreement and other valuable considerations, the receipt and sufficiency of which consideration is acknowledged, the Parties agree as follows: APPOINTMENT The Company hereby offers the Employee appointment, and the Employee agrees to serve the Company to work remotely in the capacity of [JOB TITLE] as of [DATE] (the \"Effective Date\"). PROBATION PERIOD The Employee will be on a Probation Period for a period of [MONTHS/DAYS]. The Employee's confirmation as a permanent employee is subject to the Employee making a positive contribution to the Company and is further subject to meeting certain standards and qualifying criteria during the Probation Period. PLACE OF WORK The Employee shall perform their duties at the location of their choice. The Employee will report to the [SPECIFY THE DESIGNATION] on a needs basis in the following manner: [SPECIFY THE MANNER OF COMMUNICATION]. REMOTE WORK While working remotely, the Employee will remain accessible during the remote work. The Employee will check in with the supervisor to discuss status and open issues and be available for video/teleconferences, scheduled on an as-needed basis. The Employee will take rest and meal breaks while working remotely in full compliance with all applicable policies or collective bargaining agreements, and request supervisor approval to use vacation or sick leave. To ensure that the Employee's performance will not suffer in a remote work arrangement, the Employee is advised to choose a quiet and distraction-free working space, have an internet connection that is adequate for their job and dedicate their full attention to their job duties during working hours. Equipment. The Company will provide the Employee with equipment that is essential to their job duties, like laptops and headsets. The Employee will install VPN and company-required software when the Employee receives their equipment. The Employee must keep their equipment password protected, follow all data encryption, protection standards and settings, and refrain from downloading suspicious, unauthorized or illegal software. NOTICE PERIOD During the Probation Period, if the Employee's performance is found to be unsatisfactory or if it does not meet the prescribed criteria, the Employee's employment can be terminated by the Company with [NUMBER OF DAYS] day's notice or salary thereof. The Employee will be required to give [NUMBER OF MONTHS] months' notice or salary thereof in case the Employee decides to leave the Company. DUTIES The Employee shall perform all such duties as may be delegated by the Company and comply with all such directions as the Managing Director and/or his/her nominated deputies may from time to time assign or give to the Employee. [SPECIFY DUTIES] WORKING HOURS The total working hours will be [SPECIFY HOURS] hours on Mondays to Saturdays. It is expected that the Employee will be flexible with the working hours and work such additional hours as might be necessary to efficiently perform duties under this Agreement. The Company reserves the right to change the working days and the working hours. The Employee shall be entitled to leave and holidays as per the Leave Policy of the Company. In the event the Employee is absent from work and unable to perform duties satisfactorily by reason of any injury, illness or other reason acceptable to the Company, the Employee will be entitled to receive salary and other benefits for up to [NUMBER OF DAYS] consecutive working days during any such absence, within a period of 12 consecutive months. REMUNERATION The Employee's starting total monthly gross salary and during the Probation Period will be as per details in the annexure, hereinafter known as Exhibit A. Any bonus is subject to review in accordance with the Company's practice and policies from time to time, however, there shall be no obligation on the Company to increase the salary or award bonuses at any point of time, save and except at its sole discretion. The Company shall pay or refund or procure to be paid or refunded all reasonable travelling and other similar out of pocket expenses necessarily and incurred by the Employee wholly in the proper performance of duties, subject to production by the Employee of such evidence of the expenses as the Company may reasonably require. The Employee will be required to fill in the claims forms in which the Employee shall provide the correct information of the expenses incurred. CONFIDENTIALITY AND INTELLECTUAL PROPERTY If at any time during the Employee's employment under this Agreement, the Employee participates in the making or discovery of any Intellectual Property directly or indirectly relating to or capable of being used by the Company, full details of the Intellectual Property shall immediately be disclosed in writing by the Employee to the Company and the Intellectual Property shall be the absolute property of the Company. At the request and expense of the Company, the Employee shall give and supply all such information, data, drawings, and assistance as may be necessary or in the opinion of the Company desirable to enable the Company to exploit the Intellectual Property to the best advantage as decided by the Company. The Employee shall execute all documents and do all things which may, in the opinion of the Company, be necessary or desirable for obtaining copyright, design or other protection for the Intellectual Property and for vesting the same in the Company, as the Company may direct. As Confidential Information will from time to time become known to the Employee, the Company considers and the Employee agrees that the restraints set forth in this Agreement are necessary for the reasonable protection by the Company of its business or the business of the Group, the clients thereof or their respective affairs. The Employee shall not at any time, either during the continuance of or after the termination of Employment with the Company, use, disclose or communicate to any person whatsoever any Confidential Information which the Employee has or of which he may have become possessed during employment with the Company nor shall he supply the names or addresses of any clients, customers, vendors or agents of the Company or any company of the Group to any person except as authorised by the Company or as ordered by a court of competent jurisdiction. The Employee consents to the Company holding and processing, both electronically and manually, the data it collects relating to the Employee in the course of employment, for the purpose of the Company's administration and management of its employees, its business and to comply with applicable procedures, laws and regulations. ","Remote Work Agreement","8","https://templates.business-in-a-box.com/imgs/1000px/remote-work-agreement-D13282.png","https://templates.business-in-a-box.com/imgs/250px/13282.png","https://templates.business-in-a-box.com/svgs/docviewerWebApp1.html?v6#13282.xml",{"title":123,"description":6},"remote work agreement",[125,126],{"label":17,"url":96},{"label":20,"url":98},"remote work policy","/template/remote-work-policy-D13282",{"description":130,"descriptionCustom":6,"label":131,"pages":132,"size":88,"extension":10,"preview":133,"thumb":134,"svgFrame":135,"seoMetadata":136,"parents":138,"keywords":137,"url":145},"NON-DISCLOSURE AGREEMENT (NDA) This Non-Disclosure Agreement (the \"Agreement\") is made and effective [DATE], BETWEEN: [YOUR COMPANY NAME] (the \"Disclosing Party\"), a corporation organized and existing under the laws of the [State/Province] of [STATE/PROVINCE], with its head office located at: [YOUR COMPLETE ADDRESS] AND: [RECEIVING PARTY NAME] (the \"Receiving Party\"), an individual with his main address located at OR a corporation organized and existing under the laws of the [State/Province] of [STATE/PROVINCE], with its head office located at: [COMPLETE ADDRESS] WHEREAS, Receiving Party has been or will be engaged in the performance of work on [DESCRIBE]; and in connection therewith will be given access to certain confidential and proprietary information; and WHEREAS, Receiving Party and Disclosing Party wish to evidence by this Agreement the manner in which said confidential and proprietary material will be treated. NOW, THEREFORE, it is agreed as follows: NON-DISCLOSURE OF CONFIDENTIAL INFORMATION Both Parties understand and agree that each Party may have access to the confidential information of the other party. For the purposes of this Agreement, \"Confidential Information\" means proprietary and confidential information about the Disclosing Party's (or it's suppliers') business or activities. Such information includes all business, financial, technical, and other information marked or designated by such Party as \"confidential\" or \"proprietary.\" Confidential Information also includes information which, by the nature of the circumstances surrounding the disclosure, ought in good faith to be treated as confidential. For the purposes of this Agreement, Confidential Information does not include: Information that is currently in the public domain or that enters the public domain after the signing of this Agreement. Information a Party lawfully receives from a third Party without restriction on disclosure and without breach of a non-disclosure obligation. Information that the Receiving Party knew prior to receiving any Confidential Information from the Disclosing Party. Information that the Receiving Party independently develops without reliance on any Confidential Information from the Disclosing Party. Each Party agrees that it will not disclose to any third Party or use any Confidential Information disclosed to it by the other Party except when expressly permitted in writing by the other Party. Each Party also agrees that it will take all reasonable measures to maintain the confidentiality of all Confidential Information of the other Party in its possession or control. TERM The term of this Agreement is [number] of [years/months] from the date of execution by both Parties. TITLE The Receiving Party agrees that all Confidential Information furnished by the Disclosing Party shall remain the sole property of the Disclosing Party. DISCLAIMER","Non Disclosure Agreement Nda","3","https://templates.business-in-a-box.com/imgs/1000px/non-disclosure-agreement-nda-D12692.png","https://templates.business-in-a-box.com/imgs/250px/12692.png","https://templates.business-in-a-box.com/svgs/docviewerWebApp1.html?v6#12692.xml",{"title":137,"description":6},"non disclosure agreement nda",[139,142],{"label":140,"url":141},"Legal Agreements","business-legal-agreements",{"label":143,"url":144},"Confidentiality Agreements","confidentiality-agreement","/template/non-disclosure-agreement-nda-D12692",{"description":147,"descriptionCustom":6,"label":148,"pages":149,"size":88,"extension":10,"preview":150,"thumb":151,"svgFrame":152,"seoMetadata":153,"parents":155,"keywords":154,"url":161},"EMPLOYMENT AGREEMENT - AT WILL EMPLOYEE This Employment Agreement for \"At Will\" Employee (the \"Agreement\") is made and effective this [DATE], BETWEEN: [EMPLOYEE NAME] (the \"Employee\"), an individual with his main address at: [COMPLETE ADDRESS] AND: [YOUR COMPANY NAME] (the \"Corporation\"), an entity organized and existing under the laws of the [State/Province] of [STATE/PROVINCE], with its head office located at: [YOUR COMPLETE ADDRESS] RECITALS In consideration of the covenants and agreements herein contained and the moneys to be paid hereunder, the Corporation hereby employs the Employee and the Employee hereby agrees to perform services as an employee of the Corporation, on an \"at will\" basis, upon the following terms and conditions: APPOINTMENT The Employee is hereby employed by the Corporation to render such services and to perform such tasks as may be assigned by the Corporation. The Corporation may, in its sole discretion, increase or reduce the duties, or modify the title and job description, of the Employee from time to time, and any such increase, reduction or modification shall not be deemed a termination of this Agreement. ACCEPTANCE OF EMPLOYMENT Employee accepts employment with the Corporation upon the terms set forth above and agrees to devote all Employee's time, energy and ability to the interests of the Corporation, and to perform Employee's duties in an efficient, trustworthy and business-like manner. DEVOTION OF TIME TO EMPLOYMENT The Employee shall devote the Employee's best efforts and substantially all of the Employee's working time to performing the duties on behalf of the Corporation. The Employee shall provide services during the hours that are scheduled by the Corporation management. The Employee shall be prompt in reporting to work at the assigned time. NO CONFLICT OF INTEREST Employee shall not engage in any other business while employed by the Corporation. Employee shall not engage in any activity that conflicts with the Employees duties to the Corporation. Employee shall not provide any service or lend any aid or assistance to any party that competes with the services offered by the Corporation. Employee shall not provide any services to clients or prospective clients of the Corporation outside of the provision of services for the Corporation, whether such services are provided with or without compensation or remuneration. CORPORATION PROPERTY Employee acknowledges and agrees that while employed by the Corporation the Employee may be provided with use of computer equipment and other property of the Corporation. The use and possession of the such items shall be subject to any policies, requirements or restrictions established by the Corporation. Such items may only be used in performance of the Employee's duties for the corporation. On request of the Corporation, the Employee shall immediately deliver any such items to the Corporation. Upon termination of employment, Employee shall have the affirmative duty to return any such item to the Corporation whether a request is made or not. The obligation to return Corporation property shall extend and include any and all work product, client property, proprietary rights, intangible property, and all other property of the corporation regardless of the form or medium. COMPENSATION The Corporation shall pay the Employee such hourly compensation as determined by the Corporation. Payment shall be at the same time as the Corporations usual payroll to other employees. BONUS & BENEFITS Payment of any bonuses shall be at the complete discretion of the Corporation. No guarantee or representation that any bonuses will be paid has been made to the Employee. Standard benefits that are provided to other non-management employees shall be offered to the Employee, subject to the Corporation's policies and the terms and conditions of such benefits. WITHHOLDING All sums payable to Employee under this Agreement will be reduced by all federal, state, local, and other withholdings and similar taxes and payments required by applicable law. QUALIFICATIONS OF EMPLOYEE The employee shall satisfy all of the qualification that are established by the Corporation. TERM OF AGREEMENT There shall be no guaranteed term of employment. Employer acknowledges and agrees that Employee shall be an \"At Will\" Employee and that Employee's employment may be terminated at any time by the Corporation, with or without cause. FEES FROM EMPLOYEE'S WORK The Corporation shall have exclusive authority to determine the fees, or a procedure for establishing the fees, to be charged to clients by the Corporation for services that are provided by the Employee. All sums paid to the Employee or the Corporation in the way of fees, in cash or in kind, or otherwise for services of the Employee, shall, except as otherwise specifically agreed by the Corporation, be and remain the property of the Corporation and shall be included in the Corporation's name in such checking account or accounts as the Corporation may from time to time designate. CLIENTS AND CLIENT RECORDS The Corporation shall have the authority to determine who will be accepted as clients of the Corporation, and the Employee recognizes that such clients accepted are clients of the Corporation and not the Employee. All client records and files of any type concerning clients of the Corporation shall belong to and remain the property of the Corporation, notwithstanding the subsequent termination of the employment. POLICIES AND PROCEDURES The Corporation shall have the authority to establish from time to time the policies and procedures to be followed by the Employee in performing services for the Corporation. This may include, but is not necessarily limited to, employment policies, computer use policies, Internet access policies, email policies, and all other policies, procedures, directives, and mandates established by the Corporation, whether or not in written form or formally adopted. Employee shall abide by the provisions of any contract entered into by the Corporation under which the Employee provides services. Employee shall comply with the terms and conditions of any and all contracts entered by the Corporation. TERMINATION Employee acknowledges and agrees that Employee is an \"at will\" employee of the Corporation. As such, no term of employment is created hereby and employee may be terminated at any time in the sole discretion of the Corporation, whether there exists any cause for termination or not. CREATIONS AND INVENTIONS Employee acknowledges and agrees that any and all work product of the Employee that is conceived or created during the Employee's employment with the Corporation is the exclusive property of the Corporation. This shall include any and all copyrights, trade secrets, confidential information, patents, trademarks, trade dress, ideas, concepts, plans, business plans, business concepts, techniques, inventions, drawings, artwork, logos, graphics, web pages, databases, software, programs, CGI's, plug ins, applications, brochures, inventions, marketing plans and concepts, and all other ideas and work product of the Employee. The Employee acknowledges and agrees that all creations shall be \"works made for hire\" as defined in the [ACT OR CODE]. Notwithstanding the fact that this material may be considered to be a work made for hire, Employee agrees, during Employee's employment and thereafter, which covenant shall survive any termination of the employment relationship, to execute any and all documents requested by the Corporation to confirm the Corporation's ownership and control of all such material, including but not limited to assignments of copyright, confirmations of work for hire status, waivers of proprietary rights, copyright application, and any other documents requested by Corporation. RESTRICTIVE COVENANTS","Employment Agreement_At Will Employee","7","https://templates.business-in-a-box.com/imgs/1000px/employment-agreement_at-will-employee-D541.png","https://templates.business-in-a-box.com/imgs/250px/541.png","https://templates.business-in-a-box.com/svgs/docviewerWebApp1.html?v6#541.xml",{"title":154,"description":6},"employment agreement_at will employee",[156,157,160],{"label":17,"url":96},{"label":158,"url":159},"Hire an Employee","hire-employee",{"label":140,"url":141},"/template/employment-agreement_at-will-employee-D541",{"description":163,"descriptionCustom":6,"label":164,"pages":132,"size":88,"extension":10,"preview":165,"thumb":166,"svgFrame":167,"seoMetadata":168,"parents":170,"keywords":169,"url":173},"CUSTOMER DATA PROTECTION POLICY PURPOSE The purpose of this Customer Data Protection Policy is to articulate [COMPANY NAME]'s commitment to safeguarding the privacy and security of customer data. This Policy outlines the principles and procedures that [COMPANY NAME] follows to protect the personal and confidential information of its customers and clients. SCOPE This Policy applies to all employees, contractors, vendors, and authorized users who have access to customer data or are involved in any aspect of customer data processing within [COMPANY NAME]. It encompasses all forms of customer data, including personal information, financial data, and any other data provided by customers. POLICY STATEMENTS Data Privacy Compliance [COMPANY NAME] is committed to complying with all applicable data protection laws, regulations, and industry standards that govern the collection, processing, and storage of customer data. Data Collection and Consent Customer data will only be collected when necessary for legitimate business purposes, and consent will be obtained when required by law. Customers will be informed about the purpose of data collection and their rights regarding their data. Data Security [COMPANY NAME] will implement robust security measures to protect customer data from unauthorized access, disclosure, alteration, or destruction. These measures include encryption, access controls, and regular security assessments. Data Use and Retention Customer data will only be used for the purposes for which it was collected or as required by law. Data will be retained only as long as necessary for the fulfillment of those purposes. Third-Party Data Processors","Customer Data Protection Policy","https://templates.business-in-a-box.com/imgs/1000px/customer-data-protection-policy-D13645.png","https://templates.business-in-a-box.com/imgs/250px/13645.png","https://templates.business-in-a-box.com/svgs/docviewerWebApp1.html?v6#13645.xml",{"title":169,"description":6},"customer data protection policy",[171,172],{"label":17,"url":96},{"label":20,"url":98},"/template/customer-data-protection-policy-D13645",false,{"seo":176,"reviewer":188,"quick_facts":192,"at_a_glance":194,"personas":198,"variants":223,"glossary":251,"sections":285,"how_to_fill":336,"common_mistakes":377,"faqs":402,"industries":430,"comparisons":447,"diy_vs_pro":459,"educational_modules":472,"related_template_ids_curated":475,"schema":484,"classification":486},{"meta_title":177,"meta_description":178,"primary_keyword":179,"secondary_keywords":180},"Policy On Privacy And Employee Monitoring Template | BIB","Free employee monitoring policy template covering surveillance, data collection, consent, and acceptable use.","employee monitoring policy template",[181,182,183,184,185,186,187],"employee privacy policy template","workplace monitoring policy","employee surveillance policy","employee monitoring policy word","privacy and monitoring policy template free","workplace privacy policy template","employee data collection policy",{"name":189,"credential":190,"reviewed_date":191},"Bruno Goulet","CEO, Business in a Box","2026-05-02",{"difficulty":193,"legal_review_recommended":174,"signature_required":174},"medium",{"what_it_is":195,"when_you_need_it":196,"whats_inside":197},"A Policy on Privacy and Employee Monitoring is a written operational document that tells employees exactly what the company monitors, how that data is collected and stored, who can access it, and what the consequences are for policy violations. This free Word download gives you a structured, editable starting point you can tailor to your organization and distribute to staff during onboarding or policy updates.\n","Use it when deploying any monitoring technology — email scanning, internet filtering, keystroke logging, video surveillance, GPS tracking on company vehicles, or remote-work screen capture — or when updating your employee handbook to reflect new tools. Any employer that issues company devices or provides network access needs this document in place before monitoring begins.\n","The policy covers the purpose and legal basis for monitoring, a precise description of every monitoring method in use, employee consent procedures, data retention and access rules, acceptable-use guidelines for company systems, employee privacy rights and complaint procedures, and the disciplinary consequences for misuse or circumvention.\n",[199,203,207,211,215,219],{"title":200,"use_case":201,"icon_asset_id":202},"HR managers","Formalizing monitoring practices and communicating them to employees at onboarding","persona-hr-manager",{"title":204,"use_case":205,"icon_asset_id":206},"IT directors","Documenting the technical scope of network and device monitoring for compliance","persona-it-director",{"title":208,"use_case":209,"icon_asset_id":210},"Small business owners","Establishing a written monitoring policy before deploying tracking software on company laptops","persona-small-business-owner",{"title":212,"use_case":213,"icon_asset_id":214},"Operations directors","Standardizing monitoring practices across multiple sites or remote teams","persona-operations-director",{"title":216,"use_case":217,"icon_asset_id":218},"Compliance officers","Ensuring monitoring practices align with applicable data-protection and employment law","persona-compliance-officer",{"title":220,"use_case":221,"icon_asset_id":222},"Legal counsel","Reviewing and updating an existing policy to reflect new monitoring technologies or regulatory changes","persona-legal-counsel",[224,228,232,236,240,244,247],{"situation":225,"recommended_template":226,"slug":227},"Policy covering remote workers using personal devices on company networks","Remote Work Policy","remote-work-policy-D13282",{"situation":229,"recommended_template":230,"slug":231},"Policy governing acceptable use of company computers and internet","Computer And Internet Usage Policy","it-equipment-email-and-internet-usage-policy-D12640",{"situation":233,"recommended_template":234,"slug":235},"Policy addressing personal data collected from employees under GDPR or CCPA","Employee Data Privacy Policy","data-privacy-policy-D13465",{"situation":237,"recommended_template":238,"slug":239},"Policy covering company-issued mobile phones and GPS tracking","Mobile Device Usage Policy","office-space-allocation-and-usage-policy-D13739",{"situation":241,"recommended_template":242,"slug":243},"Policy for monitoring field employees via vehicle GPS systems","Vehicle Use And GPS Tracking Policy","vehicle-use-agreement-D13798",{"situation":245,"recommended_template":103,"slug":246},"Comprehensive employee handbook incorporating all workplace policies","employee-handbook-D712",{"situation":248,"recommended_template":249,"slug":250},"Policy specifically addressing email and communications monitoring","Email And Communications Monitoring Policy","policy-on-privacy-and-employee-monitoring-D724",[252,255,258,261,264,267,270,273,276,279,282],{"term":253,"definition":254},"Monitoring","Any systematic observation, recording, or review of employee activity on company systems, premises, or devices.",{"term":256,"definition":257},"Acceptable Use Policy (AUP)","Rules governing how employees may use company-provided technology, networks, and communications tools.",{"term":259,"definition":260},"Consent","An employee's documented acknowledgment that they have been informed of monitoring practices and agree to them as a condition of employment.",{"term":262,"definition":263},"Data Retention","The defined period for which monitoring records — logs, footage, screenshots — are stored before being deleted or anonymized.",{"term":265,"definition":266},"Reasonable Expectation of Privacy","The legal standard for whether an individual in a given context can expect their communications or activities to remain private.",{"term":268,"definition":269},"Keystroke Logging","Software that records every keystroke made on a device, often used for security audits or productivity monitoring.",{"term":271,"definition":272},"CCTV / Video Surveillance","Closed-circuit camera systems installed on company premises to record employee activity in common areas or workspaces.",{"term":274,"definition":275},"Network Traffic Monitoring","Inspection of data packets transmitted over a company network, used to detect unauthorized access, data exfiltration, or policy violations.",{"term":277,"definition":278},"GPS Tracking","Location-monitoring technology installed in company vehicles or on company-issued mobile devices to track movement in real time.",{"term":280,"definition":281},"Data Subject","The identified or identifiable individual — in this context, the employee — whose personal data is being collected or processed.",{"term":283,"definition":284},"Proportionality","The principle that monitoring should be limited to what is necessary and appropriate given the legitimate business purpose it serves.",[286,291,296,301,306,311,316,321,326,331],{"name":287,"plain_english":288,"sample_language":289,"common_mistake":290},"Purpose and scope","Explains why the policy exists, which employees and contractors it applies to, and which systems and locations are covered.","This Policy applies to all employees, contractors, and third parties accessing [COMPANY NAME] systems, networks, or premises. Its purpose is to protect company assets, ensure productivity, and comply with [APPLICABLE LAWS] while respecting employee privacy to the extent permitted by law.","Scoping the policy only to full-time employees and forgetting contractors, temps, and consultants who use the same systems — leaving a monitoring gap that creates both security and legal exposure.",{"name":292,"plain_english":293,"sample_language":294,"common_mistake":295},"Legal basis for monitoring","Identifies the statutory or regulatory authority that permits the monitoring described in the policy, such as legitimate business interest, security requirements, or applicable employment law.","Monitoring is conducted on the basis of [COMPANY NAME]'s legitimate interest in protecting its IT infrastructure, confidential data, and business operations, and in compliance with [APPLICABLE LAW / REGULATION]. Employees are informed of this basis at the time of hire.","Omitting the legal basis entirely and framing monitoring solely as an employer right. Without an articulated legal basis, the policy may be unenforceable in jurisdictions that require one.",{"name":297,"plain_english":298,"sample_language":299,"common_mistake":300},"Types of monitoring in use","Lists every specific monitoring method currently deployed — email scanning, internet filtering, screen capture, video surveillance, GPS, phone recording — so employees have complete disclosure.","The Company currently employs the following monitoring methods: (a) email content scanning for malware and policy violations; (b) internet traffic logging on company networks; (c) CCTV surveillance in [LOCATIONS]; (d) GPS tracking on company vehicles; (e) screen activity recording on company-issued laptops during business hours.","Using a vague catch-all phrase like 'all electronic communications may be monitored' instead of listing specific methods. Courts and regulators have found catch-all disclosures insufficient for informed consent.",{"name":302,"plain_english":303,"sample_language":304,"common_mistake":305},"Employee consent and acknowledgment","Describes how employees are informed of monitoring, how they acknowledge the policy, and the fact that continued use of company systems constitutes ongoing consent.","Each employee must sign the Acknowledgment Form attached as Exhibit A before being granted access to company systems. Use of any company-provided device or network after receipt of this Policy constitutes acknowledgment and acceptance of its terms.","Collecting a one-time signature at hire and never re-obtaining acknowledgment when monitoring methods change significantly. New technologies — screen capture, AI-based activity scoring — require updated disclosure.",{"name":307,"plain_english":308,"sample_language":309,"common_mistake":310},"Data collection, storage, and access","Specifies what data is collected, where it is stored, how long it is retained, and who within the organization is authorized to access monitoring records.","Monitoring data is stored on [COMPANY SERVER / CLOUD PLATFORM] with access restricted to [IT SECURITY TEAM / HR DIRECTOR / DESIGNATED MANAGER]. Data is retained for [X] days / months and then permanently deleted unless required for an active investigation or legal proceeding.","No defined retention period. Storing monitoring data indefinitely creates regulatory liability under GDPR, CCPA, and similar frameworks, and increases litigation risk if records are later used out of context.",{"name":312,"plain_english":313,"sample_language":314,"common_mistake":315},"Acceptable use of company systems","Defines permitted and prohibited uses of company devices, email, internet, and software so employees understand the boundaries the monitoring is designed to enforce.","Company systems are provided for business use. Incidental personal use is permitted provided it does not interfere with job performance, involve prohibited content, or consume excessive bandwidth. Prohibited uses include: [LIST SPECIFIC PROHIBITED ACTIVITIES].","Banning all personal use categorically when the company has never enforced that standard. Inconsistent enforcement of an absolute prohibition undermines the policy's credibility and creates selective-enforcement claims.",{"name":317,"plain_english":318,"sample_language":319,"common_mistake":320},"Employee privacy rights and limitations","Acknowledges the privacy rights employees retain — typically in personal devices, personal accounts accessed on personal data, and physical spaces like changing rooms — and confirms monitoring will not extend to those areas.","The Company does not monitor personal devices, personal email accounts, or content stored solely on personal cloud services. CCTV cameras are not installed in restrooms, changing rooms, or medical rooms. Employees retain the right to access their own monitoring records upon written request.","Making no acknowledgment of any employee privacy right. Policies that read as unlimited surveillance authority generate hostility, reduce policy acceptance, and often fail legal scrutiny.",{"name":322,"plain_english":323,"sample_language":324,"common_mistake":325},"Complaint and review procedure","Gives employees a documented channel to raise concerns about monitoring practices, request access to records collected about them, or report suspected misuse of monitoring data.","Employees who believe monitoring data has been misused or who wish to access records held about them should submit a written request to [HR DIRECTOR / COMPLIANCE OFFICER] at [EMAIL]. The Company will respond within [X] business days.","No complaint procedure at all. Without one, employees who feel their privacy has been violated have no internal remedy — making external regulatory complaints or litigation the first recourse.",{"name":327,"plain_english":328,"sample_language":329,"common_mistake":330},"Disciplinary consequences","States the range of disciplinary actions — verbal warning through termination — that apply to employees who violate acceptable-use rules or attempt to circumvent monitoring.","Violations of this Policy may result in disciplinary action up to and including termination of employment, consistent with the Company's Progressive Discipline Policy. Violations involving criminal activity will be referred to law enforcement.","Listing only termination as the consequence. An all-or-nothing disciplinary structure makes managers reluctant to enforce minor violations, and courts may find termination disproportionate for first-time or low-severity breaches.",{"name":332,"plain_english":333,"sample_language":334,"common_mistake":335},"Policy review and updates","Commits the company to reviewing the policy on a defined schedule and updating it when new monitoring technologies are deployed or applicable law changes.","This Policy will be reviewed annually by [HR / LEGAL / IT SECURITY] and updated as necessary to reflect changes in technology, business practice, or applicable law. Employees will be notified of material changes and required to re-acknowledge updated versions.","No review cycle at all. Monitoring technology evolves rapidly; a policy that doesn't account for AI-based tools, biometric access systems, or new remote-work platforms deployed after it was written quickly becomes both incomplete and non-compliant.",[337,342,347,352,357,362,367,372],{"step":338,"title":339,"description":340,"tip":341},1,"Audit every monitoring tool currently in use","Before filling in any section, compile a complete list of every technology that observes, records, or analyzes employee activity. Include email filters, web proxies, CCTV systems, GPS units, screen-capture software, and badge-access logs.","Ask IT, facilities, and HR independently — each team typically manages a different category of monitoring and no single person has the full picture.",{"step":343,"title":344,"description":345,"tip":346},2,"Identify the applicable legal framework","Determine which data-protection and employment laws govern your employees' locations. US employers face a patchwork of state laws (California, Connecticut, Delaware have specific notice requirements); EU and UK employers must meet GDPR and UK GDPR standards.","If employees work in more than two jurisdictions, note jurisdiction-specific requirements in an appendix rather than trying to fold them into the main policy body.",{"step":348,"title":349,"description":350,"tip":351},3,"Define scope and covered individuals","List every category of person who accesses company systems or premises: full-time employees, part-time staff, contractors, consultants, interns, and on-site vendors. Each group should be explicitly included or excluded.","Contractors and consultants are often overlooked. If they use your network or VPN, they should be covered — and their contracts should reference the policy.",{"step":353,"title":354,"description":355,"tip":356},4,"Describe each monitoring method with specificity","For each tool identified in your audit, write a one- to two-sentence description of what is collected, when, and how it is triggered. Avoid vague language like 'may monitor' — state what you actually do.","Specificity protects you: a court is more likely to uphold a consent obtained against a precise disclosure than one obtained against a vague catch-all.",{"step":358,"title":359,"description":360,"tip":361},5,"Set data retention periods for each monitoring type","Assign a specific retention period — in days or months — to each category of monitoring data. Security logs, CCTV footage, and email archives each warrant different retention windows based on business need and regulatory minimums.","30–90 days covers most routine monitoring needs. Extending retention beyond 90 days requires a documented business justification to withstand regulatory scrutiny.",{"step":363,"title":364,"description":365,"tip":366},6,"Draft the complaint and access procedure","Name the specific role (not just a department) responsible for handling monitoring-related complaints and data-access requests. Set a response time commitment of no more than 30 business days.","Align this procedure with any existing subject-access-request process in your data-protection policy to avoid conflicting timelines.",{"step":368,"title":369,"description":370,"tip":371},7,"Obtain signed acknowledgments before rolling out","Attach an acknowledgment form as an exhibit and collect signatures from all covered individuals before the policy takes effect. Store executed acknowledgments in each employee's personnel file.","For existing employees, allow a 5–10 business day window to read and ask questions before the acknowledgment deadline — rushed sign-offs attract more grievances.",{"step":373,"title":374,"description":375,"tip":376},8,"Schedule an annual review date","Set a calendar reminder for 12 months after the policy's effective date. Assign a named owner — typically IT Security or HR — to lead the review and confirm whether new monitoring tools have been deployed since the last version.","Even if nothing has changed, a dated annual review notation in the document header signals good governance to auditors and regulators.",[378,382,386,390,394,398],{"mistake":379,"why_it_matters":380,"fix":381},"Vague catch-all monitoring disclosure","Phrases like 'all activity on company systems may be monitored' have been found insufficient for informed consent in multiple jurisdictions, rendering the policy unenforceable at the moment it matters most.","Replace catch-all language with a numbered list of every specific monitoring method in use, updated each time a new tool is deployed.",{"mistake":383,"why_it_matters":384,"fix":385},"No defined data retention period","Storing monitoring records indefinitely creates liability under GDPR, CCPA, and equivalent frameworks, and gives plaintiffs in employment disputes access to years of surveillance data that was never meant to be preserved.","Assign a specific retention window — for example, 60 days for screen-capture logs, 30 days for CCTV footage — and automate deletion at that interval.",{"mistake":387,"why_it_matters":388,"fix":389},"Applying the policy only to full-time employees","Contractors, consultants, and temporary workers who use company systems are equally capable of data exfiltration or policy violations, and equally entitled to disclosure of monitoring practices.","Expand the scope clause to cover all individuals accessing company systems or premises, regardless of employment classification, and reference the policy in contractor agreements.",{"mistake":391,"why_it_matters":392,"fix":393},"No acknowledgment re-obtained when monitoring methods change","A consent obtained in 2021 for email monitoring does not cover AI-based productivity scoring introduced in 2024. Deploying new monitoring tools without updated disclosure exposes the employer to employee grievances and regulatory complaints.","Treat any material change to monitoring methods as a policy update trigger, notify affected employees in writing, and collect fresh acknowledgments before activating the new tool.",{"mistake":395,"why_it_matters":396,"fix":397},"Omitting employee privacy rights entirely","A policy that reads as unlimited employer surveillance authority is more likely to generate employee resistance, union grievances, and regulatory scrutiny than one that acknowledges the boundaries of monitoring.","Add an explicit section confirming that personal devices, personal accounts, and restricted physical areas are not monitored, and that employees may request access to records held about them.",{"mistake":399,"why_it_matters":400,"fix":401},"No named complaint handler or response timeline","Without a designated contact and a committed response window, employee complaints about monitoring misuse default to external channels — labor authorities or employment tribunals — before any internal resolution is attempted.","Name the specific role responsible for complaints (e.g., HR Director or Data Protection Officer) and commit to a written response within 20 business days.",[403,406,409,412,415,418,421,424,427],{"question":404,"answer":405},"What is an employee monitoring policy?","An employee monitoring policy is a written document that discloses to employees what the employer monitors, how monitoring data is collected and stored, who can access it, and what the consequences are for violations. It provides the legal and operational framework for any surveillance or tracking the employer conducts on company systems, devices, or premises.\n",{"question":407,"answer":408},"Is employee monitoring legal?","In most jurisdictions, employers may monitor employees on company-owned devices and networks, provided employees receive clear prior notice. The specifics vary significantly: the US has a patchwork of federal and state laws, while the EU and UK require a documented legal basis, proportionality assessment, and GDPR-compliant consent under most circumstances. A written policy with signed acknowledgment is the baseline requirement in virtually every jurisdiction.\n",{"question":410,"answer":411},"Do employees have privacy rights at work?","Yes. Employees generally retain a reasonable expectation of privacy in personal devices, personal email accounts accessed on personal data plans, physical spaces such as changing rooms and medical areas, and — in some jurisdictions — personal messages sent on company devices during breaks. A well-drafted monitoring policy acknowledges these boundaries explicitly rather than asserting unlimited surveillance authority.\n",{"question":413,"answer":414},"What monitoring methods should the policy cover?","The policy should list every method currently in use: email content scanning, web traffic logging, CCTV surveillance, GPS tracking on company vehicles, screen-capture or keystroke-logging software, badge-access logs, phone call recording, and any AI-based productivity or behavior analytics tools. Each method should be described specifically — vague catch-all language is insufficient in most jurisdictions.\n",{"question":416,"answer":417},"How long should monitoring data be retained?","Retention periods should be set per data type and documented in the policy. Common benchmarks are 30 days for CCTV footage, 60–90 days for screen-capture logs, and 12 months for email security scans. Retaining data longer than necessary increases regulatory liability under GDPR, CCPA, and equivalent frameworks. Automated deletion at the stated interval is best practice.\n",{"question":419,"answer":420},"Does the policy need to cover contractors and remote workers?","Yes. Any individual accessing company systems, networks, or premises should be covered regardless of employment classification. Contractors and remote workers are particularly high-risk from a data-security standpoint and are equally entitled to disclosure of monitoring practices. Reference the policy in contractor agreements and remote-work addenda.\n",{"question":422,"answer":423},"What happens when new monitoring tools are deployed after the policy is signed?","Deploying new monitoring technology without updating the policy and re-obtaining employee acknowledgment is a common compliance failure. Any material change to monitoring methods — adding screen-capture software, deploying AI productivity scoring, or expanding GPS tracking — should trigger a policy update, written notification to employees, and fresh signed acknowledgments before activation.\n",{"question":425,"answer":426},"Should employees sign an acknowledgment form?","Yes. A signed acknowledgment form attached as an exhibit to the policy is the standard mechanism for documenting informed consent. Collect signatures during onboarding for new hires and within a defined window for existing employees when the policy is first introduced or materially updated. Store executed forms in each employee's personnel file.\n",{"question":428,"answer":429},"How often should the monitoring policy be reviewed?","An annual review is the minimum standard. In practice, the policy should also be reviewed whenever a new monitoring tool is deployed, applicable law changes, or the workforce structure changes significantly — for example, moving to a primarily remote model. Assign a named owner to each review cycle and record the review date and outcome in the document header.\n",[431,435,439,443],{"industry":432,"icon_asset_id":433,"specifics":434},"Technology / SaaS","industry-saas","Source code access logs, screen capture on developer workstations, and network traffic monitoring for data-exfiltration prevention are standard; remote-work screen monitoring requires explicit GDPR-compliant disclosure for EU-based employees.",{"industry":436,"icon_asset_id":437,"specifics":438},"Financial Services","industry-fintech","Regulatory requirements under FINRA, FCA, and MiFID II mandate electronic communications archiving for registered employees; the monitoring policy must align with these retention and access obligations.",{"industry":440,"icon_asset_id":441,"specifics":442},"Healthcare","industry-healthtech","HIPAA audit-log requirements mean monitoring of EHR access is legally mandated rather than discretionary; the policy should distinguish between compliance-driven monitoring and productivity monitoring.",{"industry":444,"icon_asset_id":445,"specifics":446},"Retail / Logistics","industry-retail","CCTV surveillance for loss prevention and GPS tracking on delivery vehicles are the primary methods; the policy must address both in-store employees and field drivers with distinct disclosure language.",[448,451,453,455],{"vs":230,"vs_template_id":449,"summary":450},"computer-and-internet-usage-policy-D700","A computer and internet usage policy defines what employees may and may not do on company systems — the rules. A privacy and monitoring policy discloses what the company watches and records to enforce those rules. Both documents are needed: the usage policy sets standards; the monitoring policy provides the legally required notice that those standards are actively enforced.",{"vs":103,"vs_template_id":246,"summary":452},"An employee handbook is an omnibus policy document covering the full employment relationship — compensation, leave, conduct, and more. A standalone monitoring policy provides the depth of disclosure — specific methods, retention periods, legal basis — that a handbook entry cannot accommodate without becoming unwieldy. The handbook should reference the standalone policy rather than replicate it.",{"vs":226,"vs_template_id":227,"summary":454},"A remote work policy governs where, when, and how employees may work outside the office. A monitoring policy governs what the company observes regardless of location. Remote work arrangements typically require more monitoring disclosure, not less — screen capture and activity tracking that would be visible in an office become covert when an employee is at home, making the monitoring policy more critical, not optional.",{"vs":456,"vs_template_id":457,"summary":458},"Non-Disclosure Agreement","non-disclosure-agreement-nda-D12692","An NDA is a binding legal contract obligating employees to keep company information confidential. A monitoring policy is an operational disclosure that informs employees how the company detects potential breaches. They serve complementary roles: the NDA creates the confidentiality obligation; the monitoring policy describes how compliance is observed and enforced.",{"use_template":460,"template_plus_review":464,"custom_drafted":468},{"best_for":461,"cost":462,"time":463},"Small and mid-size employers deploying standard monitoring tools with a domestic workforce","Free","2–3 hours to customize and distribute",{"best_for":465,"cost":466,"time":467},"Employers with employees in multiple states or provinces, or those deploying AI-based monitoring tools","$300–$800 for an HR consultant or employment attorney review","3–5 business days",{"best_for":469,"cost":470,"time":471},"Multinational employers, heavily regulated industries (financial services, healthcare), or organizations subject to GDPR with EU-based employees","$1,500–$5,000+","2–4 weeks",[473,474],"employee-monitoring-legal-basics","data-retention-best-practices",[231,246,227,457,476,477,478,479,480,481,482,483],"employment-agreement_at-will-employee-D541","customer-data-protection-policy-D13645","disciplinary-action-policy-D13486","confidentiality-agreement-D950","bring-your-own-device-policy-byod-D12626","social-media-policy-D12688","acceptable-use-policy-D12622","checklist-when-should-you-fire-an-employee-D507",{"emit_how_to":485,"emit_defined_term":485},true,{"primary_folder":96,"secondary_folder":487,"document_type":488,"industry":489,"business_stage":490,"tags":491,"confidence":496},"workplace-policies","policy","general","all-stages",[492,493,494,495,487],"privacy","compliance","hr","employee-monitoring",0.95,"\u003Ch2>What is a Policy on Privacy and Employee Monitoring?\u003C/h2>\n\u003Cp>A \u003Cstrong>Policy on Privacy and Employee Monitoring\u003C/strong> is a formal operational document that tells employees, contractors, and other covered individuals exactly what a company observes, records, and analyzes about their activity on company systems, devices, and premises. It identifies every monitoring method in use — from email scanning and network traffic logging to CCTV surveillance and GPS tracking — and explains the legal basis for that monitoring, how long data is retained, who can access it, and what rights employees have in relation to records held about them. By putting all of this in writing and obtaining signed acknowledgment, the policy transforms informal surveillance practices into a transparent, legally defensible program.\u003C/p>\n\u003Ch2>Why You Need This Document\u003C/h2>\n\u003Cp>Operating without a written monitoring policy exposes your organization on multiple fronts simultaneously. Employees who discover they are being monitored without prior notice can file regulatory complaints with data-protection authorities, bring employment claims for invasion of privacy, or challenge the admissibility of monitoring evidence in disciplinary proceedings — all of which become substantially harder to defend without documented disclosure. In the US, several states including Connecticut, Delaware, and New York require employers to provide written notice before monitoring electronic communications; in the EU and UK, GDPR demands a documented legal basis, proportionality assessment, and clear employee notice before any monitoring begins. Beyond compliance, a clear policy reduces workplace tension by setting transparent expectations: employees know what is watched, what is not, and why. This template gives you a structured, editable starting point that covers every standard section — purpose, scope, specific methods, consent, retention, rights, and disciplinary consequences — so you can deploy monitoring tools confidently without legal gaps.\u003C/p>\n",1778773592207]