Privacy & Data Protection

Workplace Privacy Rights: What Employers Can and Cannot Monitor

By AntiPhishers Published

Workplace Privacy Rights: What Employers Can and Cannot Monitor

Employers have broad rights to monitor company-owned devices, networks, and communications, but these rights have limits that vary by jurisdiction. Understanding the boundaries of workplace monitoring helps you protect your personal privacy while remaining compliant with company policies.

What Employers Typically Monitor

Email. Employers can monitor email on company email systems. Courts have consistently ruled that employees have no reasonable expectation of privacy in work email. This includes both sent and received messages, attachments, and metadata.

Web browsing. Companies routinely log websites visited on company networks and devices. Web filtering tools block restricted categories and log all access. If you browse personal sites on your work computer, your employer can see those visits.

Device activity. Endpoint monitoring software can capture screenshots at intervals, log keystrokes, record application usage, and track file transfers. Products like Teramind, ActivTrak, and Hubstaff provide detailed employee activity monitoring.

Network traffic. Network monitoring tools inspect all traffic on company networks, including content analysis for data loss prevention. If you use a work VPN, traffic routed through it is visible to your employer.

Physical location. Company vehicles often have GPS tracking. Company phones can be tracked through MDM. Badge access systems log building entry and exit.

Federal law (US). The Electronic Communications Privacy Act (ECPA) generally permits employer monitoring of business communications on company-owned systems. The stored communications provision protects personal accounts, but accessing them on company devices creates a gray area.

State laws vary significantly. Connecticut and Delaware require employers to notify employees of electronic monitoring. California has stronger privacy protections. New York requires written notice before monitoring.

European law is stricter. GDPR and the European Convention on Human Rights limit employer monitoring. Monitoring must be proportionate, employees must be informed, and blanket surveillance is generally prohibited.

Union agreements. Collective bargaining agreements may restrict monitoring practices.

Protecting Your Personal Privacy at Work

Assume zero privacy on company devices and networks. Do not access personal banking, health portals, or sensitive personal accounts on work devices. Do not store personal photos, documents, or passwords on work computers.

Use your personal phone and personal data connection for personal activities. Your personal device on your cellular connection is outside the employer’s monitoring scope.

Read the company’s acceptable use policy. This document defines what is monitored and what is permitted. Ignorance of the policy does not protect you.

Use a personal password manager separate from any work password manager. Keep personal and work credentials entirely separate.

For device security on your personal devices, see our mobile device security checklist. To understand monitoring in the context of remote work, explore our remote work security guide.

The Remote Work Privacy Shift

Remote work has complicated workplace privacy significantly. When the office extends into your home, the boundaries between work and personal space blur. Employers may deploy monitoring software on work-issued devices that tracks productivity, screenshots applications at intervals, logs keystrokes, and monitors webcam activity.

Understand what monitoring is active on your work devices. Check your company’s acceptable use policy and any monitoring disclosures. If you use a work-issued phone, be aware that MDM software can see your installed apps, browsing history, and location even outside work hours.

The emerging best practice for employees is strict separation: personal activities on personal devices using personal networks, work activities on work devices using work networks. This separation protects both your personal privacy and your professional standing.

Negotiating Privacy in Employment

During the hiring process, ask about monitoring practices and review the acceptable use policy before accepting a position. While you may have limited negotiating power over monitoring policies, understanding what you are agreeing to allows you to make informed employment decisions and plan your personal digital life accordingly.