Employmentbuddy - Your best buddy in human resources

Internet and email policy

This Policy covers the use of electronic communications systems and equipment, including Internet and email systems, by employees for both business and private purposes and the monitoring by the Company

Access request checklist

1.  Is the request in writing? 2. Are you satisfied about the identity of the person making the request? If not, determine what additional information you require and

Covert monitoring

Circumstances when covert monitoring can be carried out Covert monitoring can only be used in exceptional circumstances, as it will be rare for covert monitoring of workers to be justified. You

Letter instructing a private investigator

[TO BE PRINTED ON COMPANY NOTEPAPER] Dear sirs [name of employee] - Letter of Instruction We would like to instruct you to conduct covert surveillance in respect of our current employee, [name of

Bring Your Own Device Policy

This policy covers the use of employees' own devices (e.g. smartphone, tablet, laptop) for company business.

Monitoring Policy

Employees and other members of staff have legitimate expectations of a degree of privacy whilst at work. However, employee monitoring can sometimes be necessary and justified for:

Telephone policy

This Policy covers the use of the Company's telephone systems and mobile phones by employees for both business and some private purposes and the monitoring by the Company of such

Surveillance guidance to managers

Guidance for Managers in Relation to Employee Monitoring & Surveillance



Page 2 of 2