Improper use of the Internet at work can lead to dismissal for just cause

Improper use of the Internet at work can lead to dismissal for just cause

Social networks, chats, private emails and entertainment websites are frequently accessed during working hours for personal activities, which has led companies to adopt digital monitoring measures. Although this practice can generate discontent among employees, it is a legitimate and necessary initiative to ensure the good use of corporate resources. It is important that professionals understand that accessing inappropriate or non-work-related content represents a considerable risk, as the company has the legal right to monitor browsing on its equipment. If misuse of company resources is found, the organization may even apply sanctions, such as dismissal for just cause. Responsible use of the Internet in the workplace not only protects the integrity of professionals, but also contributes to an environment of trust and productivity.

With access control clearly stated in the employment contract or company regulations, access to prohibited content can lead to dismissal justified by “incontinence of conduct or bad behavior”. According to Article 482, 'b', of the CLT “An employee may be fired as a result of violating the company's code of conduct, due to improper use of professional equipment.”

The citizen is protected by the constitutional provision of the inviolability of correspondence, but, if a company rule is not complied with, a professional cannot take advantage of this point in the legislation. If the company takes the necessary precautions, informing the employee at the time of signing the employment contract of the rules and control of Internet access, the employee will not be able to justify a lack of information and guidance, claiming that he was unaware of the company rules limiting access to content to be accessed on the Internet, based on the inviolability of your right to privacy.

Company responsibility

When an illegal act is committed using a company's equipment or corporate email, the company may be held legally responsible for the consequences. In this way, managers seek to protect themselves by adopting monitoring and control policies. Regarding the use of corporate e-mail, if electronic messages sent by employees cause damage to third parties, the employer will be responsible for the losses, as stipulated by article 932, item III, of the Civil Code. This legal provision underpins the company's right to monitor and control the use of corporate email, ensuring that its resources are not used for acts that could compromise its integrity and reputation. Therefore, monitoring is a prudent and necessary measure to protect the organization against possible legal risks.

When the employee is right

Some computer monitoring services used in companies can even capture bank passwords, for example, if they are typed into company equipment. Therefore, employees need to be clearly informed that they are being monitored. Otherwise, the company could be in trouble.

The best alternative to staying focused in the work environment is to block access to social networks, chats, personal emails, entertainment websites and any other inappropriate resources during working hours. Lumiun DNS is a highly effective solution for implementing this access control, offering the ability to filter content and block specific categories of websites, ensuring that employees do not access unwanted or potentially harmful resources. With Lumiun DNS , it is possible to configure personalized browsing policies, aligned to the needs of each team and department, without violating the professional's right to privacy. This policy contributes to a safe and productive work environment, preventing activities that could pose risks to the company's safety and reputation.

It is important to highlight that simply blocking some activities does not prevent the practice of illicit actions through the company's equipment. Therefore, training and guidance for employees is necessary for the conscious use of technology resources.

1 comment

Comments closed

Related Posts