Staff Monitoring

Software Solutions

Category: drug abuse monitoring


Testing testing….page coming soon.


Employee Drug Abuse Monitoring Policy

Most states have mandatory drug testing for government employees. If a new hire fails the urinalysis test , they will not be considered for the job. Current employees will be tested on a random basis. Failing your drug test puts you in the EAP program. Employees will be asked to attend outpatient substance abuse treatment on a daily basis. In the private sector, drug abuse policies can be decision based. Large companies usually have specific substance abuse treatment centers they work with. These can be outpatient programs or inpatient programs depending on the addiction problem. You can find a list of drug treatment programs here.

According to the The Drug-Free Workplace Act employers are mandated to start a drug-free awareness program to educate staff members about the dangers of drug abuse, as well as the specific details of their policy. Companies can choose their own specific addiction awareness program, and there are several programs out there to consider. Some organizations find it economically feasible to implement workplace policy training  to address the particular costs and effects of substance abuse in the job environment. With a wide range of inpatient drug detox centers focused on prevention, education, training and intervention, Drug-Free Workplace policy trainings are offered online and on site. Customized training programs can be established to directly address the specific needs of your organization.

Employees who are having opioid addiction issues, can attend outpatient heroin detox programs or inpatient drug treatment facilities.  Usually employers will require 30 days of residential drug rehab and 90 days of outpatient substance abuse counseling. Depending on the severity of the addiction, employees should attend AA meetings for 90 days. The opioid crisis has hit the workplace very hard. Many private companies and government offices are experiencing a huge problem with heroin and opiate pain medication. You can find heroin detox centers here.

The National Safety Council study found that 65% of employers are likely to fire an employee with an opioid or heroin addiction, even though 71% admitted that addiction is a disease that should be treated by therapy and medicine.

The problem continues to get worse. The National Institute on Drug Abuse estimates more than two million people are abusing prescription pain killers, and are 19 times more likely to move on to abusing an illegal drug like heroin.

“With those numbers, it is not surprising that nearly 70% of employers have been impacted by prescription drug abuse,” Challenger said. “However, it is surprising that only 19% of workplaces feel well prepared to deal with the consequences.”

Many of those employees are hiding being addicted to opioids , and are still working at a variety of jobs. A number of them were terminated because of their drug problem.

“It’s also difficult to calculate the costs to a worker, an employer, or society at large,” he said. “It is obvious that workplaces can have a dramatic impact on what happens to employees who suffer from this issue, for better or worse.”


The Employee Computer Monitoring Law

As an employer, you should read the employee monitoring law below if you want to understand the legalities of employee monitoring. In short, it says that you, the employer, can monitor your employees’ actions on your computers. Employers should have an Acceptable Use Policy (AUP) in place that is made known to all their employees and they should be made aware that their computers and Internet activity are being monitored. Basically the law states that you can do whatever you want because the computers and the work done on them is your property.

The following article appeared in the journal “Computer Law & Security Report”, Vol 19 No 5

Employee Monitoring – Private Rights and Public Policy

The Information Commissioner published the final code of practice for the use of personal data obtained by employers as a result of monitoring at work (the “Code”) on 11 June 2003. This article reviews the Code and compares it to the earlier drafts published by the Data Protection Commissioner in October 2000 (the “DPC Draft Code”) and the Information Commissioner in July 2002 (the “IC Draft Code”). The comparison will examine how in the field of data protection public policy resolves the common tensions between upholding private rights and supporting commercial interests.

The Code

The Code recognizes that employers have a primary obligation to comply with the Data Protection Act 1998 (the “1998 Act”). It is implied in the opening remarks at Section 2 of the Code that the purpose of the 1998 Act is to protect the fundamental rights and freedoms of employees, notably their rights to privacy. Monitoring systems must, therefore, respect these fundamental rights and freedoms as well as contribute to economic and social progress, trade expansion and the well being of individuals.

The Code, given that it is part of a wider code of practice for employment practices, addresses head on the competing interests that lie behind data processing. The Code notes that balancing these interests is made more difficult by the fact that “it is not always easy to draw a distinction between work-place and private information”.

The Code distinguishes between two types of monitoring. “Systematic monitoring” is the routine monitoring of all or a particular group of employees and “occasional monitoring” is monitoring as a short-term measure to respond to a particular need. As systematic monitoring is likely to be the most problematic, this is the type of monitoring which the Code principally addresses. To emphasize the point that the Code is more relevant to larger employers, the new Information Commissioner, Richard Thomas, insisted that a short guidance note addressed to small businesses be published at the same time as the Code.

The key to compliant monitoring under the Code is the implementation of an impact assessments procedure. The procedure outlined in the Code should be familiar to any employer used to assessing risk, for instance to comply with its obligations under the Health and Safety at Work etc. Act 1974. Unlike health and safety law, there is no legal requirement for employers to document formally any assessments that are made. However, as these assessments would indicate that the employer was following the Code, they would be influential should the employer find itself on the receiving end of an Information

Commissioner’s investigation. It should be noted that the first step in the Information Commissioner’s audit procedure when investigating a data controller, after any preparatory meeting or visit, is to review relevant documentation. The Code sets out the requirements for impact assessments. They should identify the purpose of the proposed monitoring and its expected benefits as well as identify the adverse impact of the monitoring, the alternatives considered and other monitoring obligations to enable the employer to set out a conclusive justification for the monitoring.

The proportionality and lawfulness of any monitoring is therefore determined by the employer’s judgment of the benefits of any monitoring against the adverse impact of that monitoring. The Code sets out factors that should be considered when assessing adverse impacts, which include consideration of the level of intrusion into the private lives of the employees via interference with their private e-mails, telephone calls or other correspondence. In considering alternatives to monitoring, the Code recommends use of targeted or automated monitoring to reduce intrusion to employees in the workplace. The Code calls for employers to come to “a conscious decision as to whether the current or proposed method of monitoring is justified”. This can only be achieved after a proper examination of the adverse impact of any monitoring and consideration of all alternatives to it.

The Code includes a number of good practice recommendations, which are set out in section 3 of the Code and are explained in further detail in separate Supporting Guidance (the “Guidance”). These include the Information Commissioner’s “Core Principles” for monitoring, which are”

It will usually be intrusive to monitor your workers.

Workers have legitimate expectations that they can keep their personal lives private and that they are also entitled to a degree of privacy in the work environment.

If employers wish to monitor their workers, they should be clear about the purpose and satisfied that the particular monitoring arrangement is justified by real benefits that will be delivered.

Workers should be aware of the nature, extent and reasons for any monitoring, unless (exceptionally) covert monitoring is justified.

In any event, workers’ awareness will influence their expectations.

The area of most controversy has been the monitoring of electronic communications of employees. The Code recognizes this by setting out a number of data protection issues and points that should be incorporated into employers’ policies on the use of electronic communications. The Information Commissioner also includes under each guidance note in the Guidance a helpful list of key points and possible actions for employers to consider. The Guidance includes an explanation of the regulations made under the Regulation of Investigatory Powers Act 2000 that permit businesses in most cases to be able to intercept electronic communications (the “Lawful Business Practice Regulations”).

Disclaimer: This is the latest law to the best of my knowledge. As an employer, you should talk with your lawyer to get the most recent laws on the subject of employee computer monitoring.


Office Slacker Stats

A company with 1,000 Internet users could lose upwards of $35 million in productivity annually from just an hour of daily Web surfing by employees

Non-work related Internet surfing results in up to a 40% loss in productivity each year at American businesses.

Out of all drug and alcohol abusers in the US, 52% are currently employed. There are many drug and alcohol Addiction treatment programs made for the working American.

How to spot Employees Who require Help

It’s not always as effortless to recognize employees who have a substance use disorder.

Some make it obvious, taking long lunches and coming back under the influence after a “liquid lunch” or the heroin addict who is constantly nodding off at his desk, but there are many workers who are high-performers even while under the influence. Even if an employee may never utilize drugs or alcohol at work, there may be other signs. Employers should pay attention to those who call in sick regularly or display disturbed, violent or unfocused behavior on the job.

Here are some signs to look out for:

  • Changes in behavior or character
  • Poor cleanliness of self and work area.
  • More time is required to do common tasks
  • Increase in poor decisions
  • Failure to meet targets or show up for arrangements
  • unexpected displays of absentmindedness or puzzlement

As previously stated, there are no certain individuals that make fall victim to the disease of alcohol and drug abuse or addiction. By addressing these concerns to each individual upon hire, this will greatly reduce the risk of chronic instances within the company as a whole. Drug and Alcohol Detox Programs can be completed and your employee can return working without anymore substance abuse issues.

If you or someone you know is struggling with their employees or workers when it comes to substance abuse or addiction, call now: (800) 518-5205.

On average, office workers spend 21 hours per week online at the office, as oppose to only 9.5 hours at home.

Out of 800 workers surveyed, 21% – 31% admitted to sending company confidential information, like financial or product data, to recipients outside the company by email.

According to a survey by International Data Corp (IDC), 30 to 40% of internet access is spent on non-work related browsing, and a staggering 60% of all online purchases are made during working hours.

Staff Computer and Internet Abuse Statistics

70% of all web traffic to Internet pornography sites occurs during the work hours of 9am-5pm.

58% of industrial espionage is perpetrated by current or former employees.

48% of large companies blame their worst security breaches on employees.

46% of the one thousand largest companies globally will be utilizing IM as a daily communications tool.

64% of employees say they use the Internet for personal interest during
working hours

70% of all Internet porn traffic occurs during the nine-to-five work day.

37% of workers say they surf the Web constantly at work.

77.7% of major U.S. companies keep tabs on employees by checking their e-mail, Internet, phone calls, computer files, or by videotaping them at work.

63% of companies monitor workers Internet connections and 47% store and review employee e-mail.

27% of companies say that they’ve fired employees for misuse of office e-mail or Internet connections, and 65% report some disciplinary measure for those offenses.

90% of employees feel the Internet can be addictive, and 41 percent admit to personal surfing at work for more than three hours per week.

60% of Security Breaches occur within the Company – behind the Firewall

25% of corporate Internet traffic is considered to be “unrelated to

30-40% of lost productivity is accounted for by cyber-slacking.

32.6% of workers surf the net with no specific objective; men are twice
as likely as women.

27% of Fortune 500 organizations have defended themselves against claims of sexual harassment stemming from inappropriate email.

90% of respondents (primarily large corporations and government agencies) detected computer security breaches within the previous 12 months, 80% acknowledged financial losses due to computer breaches, 44% were willing and/or able to quantify their losses, at more than $455 million.

The Bottom Line

Companies that do not conduct policy training or monitor internal messages can be putting themselves at risk. In 2003, oil company Chevron USA paid $2.2 million to settle a sexual harassment lawsuit over its email content.

Most studies show 70% of companies have had sex sites accessed using their network.

Some estimates reveal that computer crime may cost as much as $50 billion per year.

Around 80% of computer crime is committed by “insiders”. They manage to steal $100 million by some estimates; $1 billion by others.

The average fraud inflicts a loss of about $110,000 per corporate/organization victim, and $15,000 to each individual victim.

Traditionally, employers have been responsible and liable for the actions of their employees in the workplace. However, if an organization can demonstrate a “duty of care” to reduce unacceptable employee activity, then it could minimize it’s potential for liability.

© 2019 Staff Monitoring

Theme by Anders NorenUp ↑