Story image

The murky world of Australia & Singapore's workforce monitoring laws

16 Feb 2018

Australia is one of the least complex countries in the world for workforce monitoring - second only to the United States, says a Forcepoint-sponsored study by legal firm Hogan Lovells.

The study examines the fine balance between the need for IP and data protection with employees’ privacy and legal rights, particularly when applied to regulations such as the GDPR.

Forcepoint claims this is the first published review of the international legal landscape that looks specifically at cyber-focused workforce threat program implementation.

The report ranks 14 countries including Australia and Singapore for 10 different monitoring activities.

Those activities include monitoring internet browsing, keylogging, social media monitoring, monitoring employee-owned devices and higher-level IT activities including monitoring temporal metadata (eg logons and session length) and monitoring privileged access use.

Workforce monitoring activities are also governed by a variety of data protection, data privacy, communications secrecy, and employment laws.

“Numerous recent events have shown how cyber incidents can disrupt operations, damage reputation, and expose organisations to regulatory consequences and private litigation,” comments Hogan Lovells partner Harriet Pearson.

Australian organisations need express consent for monitoring social media and employee-owned devices, however does not need higher levels of consent besides required notice for monitoring other areas.

The report mentions that some Australian states such as New South Wales and Victoria have regulations that require employees must obtain express consent to monitor employee activities on non-company devices when the employee is not working or at the workplace.

However, “The Privacy Act generally supports the use and disclosure of information collected via monitoring activities when an employer has reason to suspect that an employee has engaged in unlawful activities or otherwise serious misconduct,” the report says.

In contrast, Singapore put significant levels of effort into capturing on-screen activities, keylogging, monitoring social media and employee-owned devices.

“Employers need not obtain consent for monitoring activities that reasonably support the management or termination of employment relationships, including activities that are necessary to evaluate the suitability, eligibility, or qualifications of an employee for promotion or continued employment or for evaluation purposes,” the report says.

Both countries are described as requiring a ‘basic’ level of compliance to implement comprehensive workforce monitoring, however other countries such as Finland and Italy require far more effort and compliance.

Finland, for example requires significant levels of effort in most categories, however temporal metadata and privileged access monitoring are less complex. Employers are often prohibited from accessing communications contents sent or received by employees.

In the United States, federal law provides that organisations are exempt from liability to the extent that they monitor their information systems for cybersecurity purposes.

“Any workforce monitoring program must be proportionate, respectful and transparently deployed to ensure the continued trust of the workforce,” comments Forcepoint CISO Allan Alford.

Forcepoint believes that traditional tools are failing to provide human risk information with context. As a result, behaviours where data, users and networks intersect, are growing in demand.

 “It’s a careful balancing act: employees and employers must work hand-in-hand to protect each other. We all want better protection for ourselves and our important information and data, but monitoring when, how and why employees interact with various corporate data has some clear and important privacy implications,” Alford concludes.

The Managing Workforce Cyber Risk in a Global Landscape analysed regulations in Australia, Singapore, the United States, Canada, Finland, France, Germany, Italy, the Netherlands, Spain, Sweden, Switzerland, the United Kingdom and Turkey.

Cryptomining apps discovered on Microsoft’s app store
It is believed that the eight apps were likely developed by the same person or group.
WhatsApp users warned to change voicemail PINs
Attackers are allegedly gaining access to users’ WhatsApp accounts by using the default voicemail PIN to access voice authentication codes.
Swiss Post asks public to hack its e-voting system
Switzerland’s postal service Swiss Post is inviting keen-eyed security experts and white hats to hack its e-voting system.
Spoofs, forgeries, and impersonations plague inboxes
It pays to double check any email that lands in your inbox, because phishing attacks are so advanced that they can now literally originate from a genuine sender’s account – but those emails are far from genuine.
Flashpoint signs on emt Distribution as APAC partner
"Key use cases that we see greatly benefiting the region are bolstering cybersecurity, combating insider threats, confronting fraud, and addressing supply chain risk, to name a few."
The attack surface: 2019's biggest security threat
As businesses expand, so does their attack surface – and that may be the biggest cybersecurity risk of them all, according to Aon’s 2019 Cyber Security Risk Report.
Opinion: Cybersecurity as a service answer to urgent change
Alan Calder believes a CSaaS model can enable a company to build a cyber resilience strategy in a coherent and consistent manner.
Why SD-WAN is key for expanding businesses - SonicWall
One cost every organisation cannot compromise on is reliable and quick internet connection.