IAG insurer uses keystroke logging to terminate underperforming employee who worked remotely

Employee was found to have consistently failed to meet their designated working hours for almost all of the monitored working days.
10 August 2023
Image by CyberBeat

Insurer IAG recently utilised keystroke logging to determine that a remote employee, who had a flawless 18-year tenure with the company, was not meeting productivity standards and should be terminated. 

This case sheds light on the uncommon practice of monitoring employee productivity through application and VPN logs,  a concern that has been raised but remained unknown until now. 

The employee was fired after it was discovered that they had zero keystrokes recorded on their device for a significant number of hours, accounting for up to 85% of their work hours in a month.

The review also revealed that the employee consistently failed to meet their designated working hours for almost all of the monitored working days.

The use of keystroke logging was part of a "cyber review" conducted on the employee's IAG-owned laptop.

 A ruling by the Fair Work Commission revealed that this review examined three categories of logs: daily activity, hourly activity, and VPN activity. The effectiveness of VPN usage data remains unclear, as it is mentioned that many employees at IAG only use VPN when necessary. 

Unfortunately, detailed information about the system logs and tools used for tracking daily and hourly activity was not provided in the ruling, and further clarification from an IAG spokesperson was not possible. 

According to the ruling, a manager outlined the expected minimum productivity level for an employee in that department, which entails a minimum of 500 keystrokes per hour.

- CyberBeat

 

About CyberBeat

CyberBeat is a grassroots initiative from a team of producers and subject matter experts, driven out of frustration at the lack of media coverage, responding to an urgent need to provide a clear, concise, informative and educational approach to the growing fields of Cybersecurity and Digital Privacy.

Contact CyberBeat

If you have a story of interest, a comment, a concern or if you'd just like to say Hi, please contact us

Terms & Policies >>

Sponsors

We couldn't do this without the support of our sponsors and contributors.