Corporate surveillance describes the practice of businesses monitoring and extracting information from their users, clients, or staff.[1] This information may consist of online browsing history, email correspondence, phone calls, location data, and other private details. Acts of corporate surveillance frequently look to boost results, detect potential security problems, or adjust advertising strategies. These practices have been criticized for violating ethical standards and invading personal privacy. Critics and privacy activists have called for businesses to incorporate rules and transparency surrounding their monitoring methods to ensure they are not misusing their position of authority or breaching regulatory standards.[2]
Monitoring can feel intrusive and give the impression that the business does not promote ethical behavior among its personnel. Staff satisfaction, productivity, and staff turnover may all suffer as a result of the invasion of privacy.[3]
Employers may be authorized to gather information throughkeystroke logging andmouse tracking, which involves recording the keys individuals interact with and cursor position on computers. In cases where employment contracts permit it, they may also monitor webcam activity on company-provided computers. Employers may be able to view the emails sent from business accounts and may be able to see the websites visited when using a corporate internet connection.[4] The screenshot capability is another tool that enables companies to see what remote workers are doing. This feature, which can be found in tracking software, takes screenshots throughout the day at predetermined or arbitrary intervals.[5] Additionally, people who don't work in offices are observed. For instance, it has been claimed that Amazon has incorporated tracking technology to monitor warehouse staff and delivery drivers.[4]
Information collected by corporations can be used for a variety of uses including marketing research, targeting advertising, fraud detection and prevention, ensuring policy adherence, preventing lawsuits, and safeguarding records and company assets.[6]
Concerns over corporate privacy have become more important due to companies collection and manipulation of personal data.[7] Since these practices have been recognized there has been a rising concern about both the security and the possible mishandling of the data accumulated.
Social Media data collection and monitoring has been one of the most concerned areas regarding corporate surveillance. Recently, many employers onCareerBuilder have checked their potential candidates' social media activities before the hiring process.[8] This approach can be excusable since it is important to be aware of a future employee or applicant's online presence, and how it might affect the company's reputation in the future. This is crucial since employers are often made legally responsible for their worker's digital actions.[9]
These data can also be used to enact political gains. TheFacebook-Cambridge Analytica data scandal in 2018 revealed that its British branch to have surreptitiously sold American psychological data to the Trump campaign.[10] This information was supposed to be private, but Facebook's inability to protect user information had reportedly not been a top priority of the company at the time.[11]


If it isbusiness intelligence, data collected on individuals and groups can be sold to other corporations, so that they can use it for the aforementioned purpose. It can be used fordirect marketing purposes, such as targeted advertisements on Google and Yahoo. These ads are tailored to the individual user of the search engine by analyzing their search history and emails[14] (if they use free webmail services).
For example, the world's most popularweb search engine stores identifying information for each web search.Google stores anIP address and the search phrase used in a database for up to 2 years.[15] Google also scans the content of emails of users of its Gmail webmail service, in order to create targeted advertising based on what people are talking about in their personal email correspondences.[16] Google is, by far, the largest webadvertising agency. Theirrevenue model is based on receiving payments from advertisers for each page-visit resulting from a visitor clicking on a GoogleAdWords ad, hosted either on a Google service or a third-party website. Millions of sites place Google'sadvertising banners andlinks on their websites, in order to share this profit from visitors who click on the ads. Each page containing Google advertisements adds, reads, and modifiescookies on each visitor's computer.[17] These cookiestrack the user across all of these sites, and gather information about their web surfing habits, keeping track of which sites they visit, and what they do when they are on these sites. This information, along with the information from their email accounts, and search engine histories, is stored by Google to use for building a profile of the user to deliver better-targeted advertising.[16]
In 1993, David Steingard and Dale Fitzgibbons argued that modern management, far from empowering workers, had features of neo-Taylorism, whereteamwork perpetuatedsurveillance andcontrol. They argued that employees had become their own "thought police" and the team gaze was the equivalent of Bentham'spanopticon guard tower.[18] A critical evaluation of the Hawthorne Plant experiments has in turn given rise to the notion of aHawthorne effect, where workers increase theirproductivity in response to their awareness of being observed or because they are gratified for being chosen to participate in aproject.[19]
According to theAmerican Management Association and the ePolicy Institute, who undertook a quantitative survey in 2007 about electronic monitoring and surveillance with approximately 300 US companies, "more than one fourth of employers have fired workers for misusingemail and nearly one third have fired employees for misusing the Internet."[20] Furthermore, about 30 percent of the companies had also fired employees for usage of "inappropriate or offensive language" and "viewing, downloading, or uploading inappropriate/offensive content."[20] More than 40 percent of the companies monitor email traffic of their workers, and 66 percent of corporations monitor Internet connections.[20] In addition, most companies use software toblock websites such as sites with games, social networking, entertainment, shopping, and sports. TheAmerican Management Association and the ePolicy Institute also stress that companies track content that is being written about them, for example by monitoringblogs andsocial media, and scanning all files that are stored in afilesystem.[20]
TheUnited States government often gains access to corporatedatabases, either by producing awarrant for it, or by asking. TheDepartment of Homeland Security has openly stated that it uses data collected from consumer credit and direct marketing agencies—such as Google—for augmenting the profiles of individuals that it is monitoring.[21] The US government has gathered information fromgrocery storediscount card programs, which track customers' shopping patterns and store them in databases, in order to look forterrorists by analyzing shoppers' buying patterns.[22]
According to Dennis Broeders, "Big Brother is joined by big business".[23] He argues that corporations are in any event interested in data on their potential customers and that placing some forms ofsurveillance in the hands of companies, results in companies owningvideo surveillance data for stores and public places. The commercial availability of surveillance systems has led to their rapid spread. Therefore it is almost impossible for citizens to maintain theiranonymity.[23]
When businesses can monitor their customers, such customers run the risk of facingprejudice when applying for housing, loans, jobs, and other economic opportunities.[24] The consumer may not even be aware that they are being treated differently if discrimination results in different prices being charged for the same goods. Without their knowledge, their information was being accessed and sold.
In February 2024, concerns over the collection of customer data without their knowledge were raised at theUniversity of Waterloo following a post on Reddit and a published article in the school newspaper mathNEWS, in which vending machines displayed an error suggesting facial recognition software was in use by the machines. Following this error, the university requested for the machines to have their facial recognition software disabled and eventually removed.[25][26] On February 29, the Ontario privacy commissioner announced that it would be beginning an investigation into the installation of the vending machines.[27]