Tel: 0161.443.4237  or  Mob: 07720.218846  
Q How does the Act affect monitoring?
• If you monitor your workers by collecting or using information about them, the Data Protection Act will apply. This can happen, for example, when you video workers using CCTV to detect crime, when you check telephone logs to detect excessive private use, and when you monitor e-mails or check Internet use.
• The Act doesn’t generally prevent monitoring.  However, it sets out principles for the gathering and use of personal information.  In short, data protection means that if monitoring has any adverse effect on workers, this must be justified by its benefit to the employer or others.
• The Act requires openness.  Workers should be aware of the nature, extent and reasons for any monitoring unless, exceptionally, covert monitoring is justified.

Q If I want to monitor my workers, what must I do?
• Consider why you want to carry out the monitoring.  This might mean asking what problem you are trying to solve, for example theft in the workplace.
• Once you are clear about the purpose, ask whether the particular monitoring arrangement will truly bring the benefit you are looking for and whether it is justified by this benefit.
• Remember:
1. Monitoring is usually intrusive.
2. Workers legitimately expect to keep their personal lives private.
3. Workers are entitled to some privacy in the work environment.
• Consider whether alternative approaches or different methods of monitoring would deliver the benefits you want while being more acceptable to workers. Can you target the monitoring at an area of risk, for example the part of your premises where you think theft is occurring?
Ensure your workers are aware that they are being monitored and why.
You could tell them this by putting a notice on a notice-board or signs in the areas where monitoring is taking place. If your workers have computers, you could send them an E-mail about the monitoring. If you are open about it, they will know what to expect.
• If monitoring is to be used to enforce your rules and standards, make sure workers know clearly what these are.
• Only use information obtained through monitoring for the purpose for which you carried out the monitoring, unless the monitoring leads to the discovery of an activity that no employer could reasonably be expected to ignore, for example breaches of health and safety rules that put other workers at risk.
• Keep secure the information that you gather through monitoring. This might mean only allowing one or two people to have access to it.  Don’t keep the information for longer than necessary or keep more information than you really need.  This might mean deleting it once disciplinary action against a worker is over.

Q Are there other points to consider for particular types of monitoring?
• Be particularly careful when monitoring communications, such as e-mails, that are clearly personal. Avoid wherever possible opening e-mails, especially those that clearly show they are private or personal. Monitor the message’s address or heading only.
• If it is necessary to check the e-mail accounts or voice-mails of workers in their absence, make sure they are aware this will happen.
• Where video or audio monitoring is justified, target the monitoring, where possible, at areas of particular risk, and only use it where workers wouldn’t expect much privacy.
• Ensure that if you use information for monitoring which is held by third parties, such as credit reference or electoral roll information, you can justify this. Take particular care with any information you hold about workers as a result of non-employment dealings with them, for example where they are also your customers.
• If you are justified in obtaining information about a worker’s criminal convictions for monitoring, only do so through a ‘disclosure’ from the Criminal Records Bureau.

Q Can I ever undertake secret monitoring?
• The covert monitoring of workers can rarely be justified. Do not carry it out unless it has been authorised at the highest level in your business.
You should be satisfied that there are grounds for suspecting criminal activity or equivalent malpractice, and that telling people about the monitoring would make it difficult to prevent or detect such wrongdoing.
• Use covert monitoring only as part of a specific investigation, and stop using it when the investigation has been completed. Do not use covert monitoring in places such as toilets or private offices unless you suspect serious crime and intend to involve the police.
Source: Data Protection Act Registrar


Kruger E.
05/07/2014 4:34am

Then what are we waiting for? Let's buy those hidden cams and cctv's, avail those PI out there! I highly recommend GSL Associates is the best place we can find the good quality and services ever…

05/26/2014 7:38pm

What rules do those hidden camera shows that I see on reality tv have to follow. It seems that they go in with their cameras and follow people around at their job all day without and problems.

shaun wright
05/26/2014 8:50pm

Is it safer to be the ONLY person with access to the monitoring equipment rather than having a trusted employee besides yourself n control of it/ I would think that the liability still falls on the employer even if the other person with access decided to use the content against someone.

08/13/2014 8:51am

I’ve you bookmarked your internet site to look at out the new stuff you post.

03/31/2016 8:28am

Very inspirational to hear about someone pursuing their dream and becoming successful instead of following the traditional path.


Associates and all linked personalities are vey important and tremendous. It is the consumed and applied for the modernity and logic of the reasoning and analytical thinking. It is the arranged and induced with the perfect and excellent methods.


Hello I am so excited I found your site, I really found you by accident, while
I was searching on Bing for something else,

06/05/2016 7:30pm

As well as the murder, Knox has always been charged with faking a burglary at the scene of the murder in Perugia, Italy, an act the prosecution allege was intended to obscure the true perpetrators of the crime whom they say were Knox, her Italian boyfriend Raffaele Sollecito and Rudy Guede.

09/14/2016 10:21pm

Here we'll do an overview of exactly what you need to know to select the best security camera for your needs and to know the best location for installation.

03/10/2017 1:58pm

Are you trying to upgrade your current home security system or trying to purchase a new one? If that is the case, you will have to decide if installing a wireless or wired home security system is best for you. Unfortunately, finding the right plan varies from situation to situation. Below are two different types of situations to help assist you in finding the right plan.

04/03/2017 1:52pm


Nice article, thanks for the information. It's very complete information. I will bookmark for next reference.


I am really glad I have found this info.A good web site with interesting content, that is what I need. You have done a outstanding job!

06/15/2017 7:05pm

thank you great information

06/15/2017 7:05pm

thank you


Leave a Reply