By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Barnard | Law Firm
  • Latest News
  • About Barnard
    • About US
    • Our Services
    • Our Team
  • Calculators
    • Transfer Costs
    • Bond Costs
    • Bond Repayments
  • Contact
Reading: Does an Employee have a Right to Privacy in a Work Environment
Aa
Barnard | Law Firm
  • Latest Articles
  • About Us
  • Our Services
  • Our Team
  • Contact Us
Follow US
© Barnard Incorporated. All Rights Reserved.
Commercial LawNews and Insights

Does an Employee have a Right to Privacy in a Work Environment

By Douw Breed 6 Min Read
Share

Does an Employee have a Right to Privacy in a Work Environment

Computers and networking equipment usually belong to the employer and the employer is generally entitled to monitor the work computer. This will include the searching for files saved on the computer hardware, as well as monitoring of an employee’s activities while using the computer (e.g. browsing the internet). In Moonsamy v The Mailhouse (1999) 20 ILJ 464 (CCMA) at 471G it was held that:

Contents
Does an Employee have a Right to Privacy in a Work EnvironmentSection 2 of the Act states that no person may:Conclusion

The rights that a citizen is entitled to in his or her personal life cannot simply disappear in his or her professional life as a result of the employer’s business necessity. At the same time the employer’s business necessity might legitimately impact on the employee’s personal rights in a manner not possible outside the workplace. Therefore there is a clear balancing of interests.

The employer has a right to control the working life of the employee and also has a right to protect the business interests and information relating thereto whilst balancing the interests of the business and the employee. The employer has the right to check emails or intercept communications utilizing the employer’s equipment. This will be limited to information relating to the work environment and not the employee’s personal information.

The employer protecting its business environment by monitoring emails and phone calls will fall in the category of limiting the rights of employees (in terms of section 36 of the Constitution) as long as the employer can prove that there is a business interest and that the equipment that is monitored, belongs to the employer.

The Regulation of Interception of Communications and Provision of Communication-Related Information Ac, No 70 of 2002 (the Act) is applicable when considering the right to interception of information and came into operation at the end of September 2005.

Section 2 of the Act states that no person may:

… intentionally intercept or attempt to intercept, or authorise or procure any other person to intercept or attempt to intercept at any place in the Republic, any communication in the course of its occurrence or transmission.

The Act makes an important exception as to when the interception of communications are allowed. These exception include circumstances where prior written consent was obtained and for business purposes. Section 6(1) of the Act states that:

Any person, may, in the course of the carrying on of any business, intercept any indirect communication (a) by means of which a transaction is entered into in the course of that business; or (b) which otherwise relates to that business; or (c) which otherwise takes place in the course of the carrying on of that business in the course of its transmission over a telecommunications line.

Section 6(2) then sets certain requirements that must be met before the interception of indirect communications in terms of section 6(1) will be permitted namely:

  • The interception must be with the express or implied consent of the chief executive officer or equivalent officer of the juristic person, or any person duly authorised by such person and the latter;
  • Must either have made all reasonable efforts to inform in advance all persons who intend to use the telecommunication system concerned of the fact that interceptions may take place, or the interception must take place with the express or implied consent of the person who uses the telecommunication system;
  • This telecommunications system must be provided for use in connection with that business;
  • Such interceptions must be carried out for specific purposes, namely, to monitor or keep a record of indirect communications where this is done to establish the existence of certain facts or to investigate the unauthorised use of the telecommunication system concerned or to secure the effective operation of the system.

Conclusion

Employers are generally allowed to check the emails and communications that are made from business equipment by the employees if there is good reason to do so that may generally include:

  • Responding to a colleague’s harassment complaint;
  • Investigating a data leak;
  • Checking the quality of the computer system; or
  • Responding to a government request for documents.

Employees should be aware that they don’t have a legitimate expectation of privacy when using the employer’s email system to communicate with friends and family or even their own alternative email accounts, and should be continuously notified of this fact. If the employment agreement is salient on the point of privacy of information it would be worthwhile for employers to establish a firm internet policy containing a written employee consent allowing interception of information.

Douw Breed 11th June 2018
Share this Article
Facebook LinkedIn Email Copy Link Print
By Douw Breed
Follow:
Managing Director, Douw, heads up a dynamic team of directors, associates, and support staff at Barnard Inc in the firm’s quest to be the go-to legal services provider in South Africa.

Discuss this article with me:

Ad image

You Might Also Like

Moratorium:Impossible – High Court Keeps the Business-Rescue Shield Intact

5 Min Read

Fast-Tracking Rescue: How AFSA-SARIPA Arbitration Keeps Business-Rescue Plans from Stalling

5 Min Read

Don’t let your Business get caught in the Crossfire

5 Min Read

Brand Passport: Trade Mark Protection as Your Ticket to Africa’s Fast-Growing Markets

4 Min Read
Tree White

© Barnard Inc. All Rights Reserved.

  • Barnard is a Level 2 BEE contributor
  • Privacy Policy
  • Careers
  • Law Students
  • Fidelity Fund Certificates
  • Testimonials
Welcome Back!

Sign in to your account

Lost your password?