3: Technology as an enabler for remote working
33
help control accesses to unauthorised information.
Likewise, being clear about where sensitive information
can and cannot be accessed and providing privacy screens
where appropriate can be helpful. Above all, the IT security
policy needs to be well communicated and monitored.
Remote worker surveillance tools
Some businesses choose to use IT surveillance tools to
monitor how employees are spending their day. Typically,
the team member records their task completion and activity
at regular intervals throughout the day so that the manager
can monitor performance. To me, this sounds very ‘Big
Brother’ and takes away the element of trust. However,
managers I have spoken to who have used the syst ...