Using Big Brother, Big Sister to increase productivity

Share this: Email | Facebook | X

The Internet can be a big employee time waster. About once or twice a month I get a call from a business owner asking how they can either monitor their employees' computer usage or prevent them from wasting time on various Web sites.

Monitoring and content filtering software are available to do this, but using these solutions should be weighed against your corporate culture. The costs and benefits of monitoring and managing Internet access can be huge, but the problem can also be managed using a human approach, by doing a combination of coaching and leading.

I call content management software the "Big Brother" approach after the quote "Big brother is watching you" from George Orwell's book, "1984." Many small business owners like the idea of being able to view their employee's desktop, but it can lead to employee resentment and lost productivity when implemented without their buy-in.

An alternative is the "Big Sister" approach, which means creating a culture of trust by sitting down with employees and educating them about the conditions or timeframes they're free to use the internet for personal things. The "Big Sister" approach can work well for small groups of professionals. Either way, you should also have a written "acceptable use policy" to cover inappropriate computer use for things like porn and sending jokes that are sexist, racist or could be misinterpreted.

The "Big Brother" approach is often needed for schools, large organizations, workplaces subject to regulatory restrictions like HIPAA or any company with a serious need to protect corporate assets.

One of the employee-monitoring solutions we use is Spector 360, a software package that is purchased for about $115 per seat. Multiply this by the number of employees, and figure about an hour of labor per workstation to set up the software and you'll have a good idea of the cost. The software can be installed in stealth mode, providing complete monitoring of the computer user, who will be unaware that the software is on his machine. This is legal because the machines are owned by the business, but we recommend having employees sign an acceptable use document that states that monitoring may be done. This investment will pay for itself by allowing the manager to centrally monitor and even manage computer use from his desk. Regular or periodic screen shots can be taken of the employee's screens, allowing for a security camera Digital Video Recorder type of playback. Logs can be created and reports produced to answer questions like which employees spend the most time surfing Web sites, which is spending time on what sites, who uses chat or anonymous email, and much more. Other, less expensive packages are also available to install on "problem" machines on a case-by-case basis. Tools like this can significantly increase productivity, allow investigation into violations of acceptable use policies, and protect against data theft (studies show one in five employees will print or copy company data in the days leading up to their resignation). In one high school the software was configured to create and email reports automatically any time inappropriate words were used. This included, for example, swear words inside document files or in any software on 700 desktops across the school. Administrators were able to discipline students and once word got around. The software greatly reduced problems.

Content filtering is another class of productivity tool. Filters will limit online access to websites needed for business. We often implement this using a SonicWall router but many other products are available depending on the needs of the client. The content filter allows us to either create a whitelist of sites that are OK to use, or blacklist specific sites that should be blocked.

While effective, this technique sometimes produces employee frustration when they have previously had free online access. In some cases a new site is needed for legitimate business use, but can't be accessed until someone with the password has added it to the whitelist. The difficulties associated with aggressive filtering came to light when I implemented it in my own house to protect our children. My teenage daughter came to me complaining that she couldn't access her favorite swimsuit shopping site. This shopping site was lumped into one of the unacceptable use categories, probably because of the pictures of scantily clad swimsuit models. I found myself slowly whitelisting sites, and then unblocking whole categories (shopping, photography etc). After six months of frustration (for both me and the children) we ended up taking the "Big Sister" approach with our children. We basically said "OK if you go to bad places then we're shutting the whole thing down." At least with the content filtering I was able to automatically shut down Internet usage at 10 p.m. each night. This helped reduce late nights of online gaming.

A third and incredibly important business productivity tool we use is the spam filter. I'm constantly amazed at the number of small business owners who suffer silently with hundreds of spam messages each day. Multiply the number of minutes you spend reading and deleting spam by how many employees you have and you realize that attempting to use the free spam filters (that don't work or integrate with Outlook well) are not cost effective. Like anti-virus software, no spam filter is perfect, but along with regularly unsubscribing to unwanted newsletters, it can help control most of the volume. Spam filters run about $2-$5 per person per month, but pay for themselves quickly. The goal is to receive as little email as possible without false positives (which means rejecting customer email that you want to receive).

Each of these three productivity enhancement techniques (monitoring, Web site blocking, and spam filtering) can help control wasted employee time. To the list we should probably add workstation backup, anti-virus, and anti-spyware tools. The average virus slows a machine down for weeks, causes eight to 14 hours of actual down time, and costs another four hours for IT staff to fix. The hard cost of these tools is arguably less than the soft costs associated with lost productivity. Just make sure employees understand the reason for any changes in their access.

Darren McBride is chief executive officer of Sierra Computer Group, a Reno based IT and network consulting firm and a member of the Reno Tahoe Entrepreneurs Organization.