Can data from an employee monitoring solution be used as evidence?

Implementing an insider threat program raises myriad privacy, regulatory compliance, operational liabilities, criminal and civil enforcement, and employment considerations. Each can have disastrous economic impacts on your business if not properly managed.


As an experienced legal and operational practitioner in the area of compliance, employment, security, and criminal law, Mr. Thompson is uniquely positioned to advise your insider threat stakeholders on the parameters and best practices of implementing an insider threat program.  

Effective insider risk management requires an understanding of the unique legal and regulatory ramifications of administering an insider threat program.  

How can I monitor my employees at work?​​

How can I monitor social media of my employees?

What's the best way to implement an employee monitoring solution?

For expert advice on navigating your insider threat program issues,contact me today.

What are employee monitoring "use restrictions?" 

How do I legally collect, use, store, and disseminate sensitive employee information?

Insider Threat ​Law Consulting

What are the best practices for conducting background checks on my employees?

Can I monitor contractors and partners?

Shawn M. Thompson, Esq.

What are the parameters of a lawful insider threat program?

What are the legal considerations of conducting employee investigations?