In America, the abuse of email and the web in the company leads to dismissal
Using company assets as if they were their own: this, in essence, is the fault of many employees. Which for this reason in the USA are often fired on the spot. L'American Management Association (AMA) and the ePolicy Institute carried out a survey of a sample of 304 companies in the United States with the aim of identifying what were the primary causes of layoffs.
The discovery is that the most frequent cause of dismissal in the trunk, even one out of two cases, is the use of IT tools for personal purposes not related to work.
In the first place is the use of the Internet to visit pornographic sites, an activity apparently extremely common among male employees of American companies.
Following sending and receiving personal emails, many employees spend much of their time at their desk writing to friends or relatives, introducing non-corporate content into their blog or commenting on posts on those of other users.
These behaviors produce two different types of damage to the company. The first is to expose computer systems to the risk of contracting viral infections, compromising the functioning of the network and software. The second damage done to the company is the loss of working time. The bottom line is that i workers know that they are being controlled and also that they are risking their jobs.
It is no coincidence that this type of dismissal is unlikely to be challenged in court. In fact, in the United States, it is easier to get hired by another company. The regulatory dynamics that govern the use of corporate resources are very similar all over the world: the mistake that employees often fall into is that of considering a corporate asset as personal, when this is not the case.
There is no doubt that it is illegitimate to carry out checks beyond the limits of mere reasonableness: there will be no 'authority', except in special cases, which allows the use of invasive personal control systems. But the work tools, as a material asset, are subjected to the normal control of the yield, and the IT and telematic tools are no exception.
Controlling them does not mean violating privacy, but simply circumventing it by declining control over the devices and not the people who use them.