Thursday 16 July 2009

Legal advice report for a business

Section 01: Introduction

This is a legal advice report that contains legal issues and also advices on setting up a company that selling soap. This business investor wants to sell different kinds of soap that produced by different soap manufacturers. It includes baby soap, natural products and soap according to the skins. Customers who are in UK can buy things online by place orders via the website.

1.1 Business Name, Trade mark and Domain Name

1.1.1 Business Name
There are very important points of selecting a name of a business. It should meet all the legal requirements in order to run the business without any trouble. Major aspects that consider when we select a company name

1. Simplicity
2. Customer Attractiveness
3. Availability

Simplicity means that it should not be a very long name that everyone can remember by first look. Even though it is a long name it can be displayed as short forms. For an example: KFC, M&S
If the name it self describe about the product it could be more Customer attractive. Because by name the will come to know what kind of business going on.
Considering all the information that has been mentioned above the name “Ayurvedic Soap” was selected. The name it self says that what the business is and what you are going to sell.

1.1.2 Domain Name
It is very important to have simple domain name to online business that customer can find out and remember without much difficulty. www.ayurvedicsoap.co.uk is suggested as the domain name for two reasons.

• It is same as the business name.
• Since it is the business name easy to remember.
In order to select a domain name without claim on domain name disputes there is a procedure to be followed. First you should check whether www.ayurvedicsoap.co.uk is available in www.whois.net website. Then you should be registered domain name with ISP or a domain name seller.
1.1.2 Trademark
Trademark is a more legally important thing in a business. You should check whether Trademark is available or not in the market because if you use any others Trademarks you may consider as infringement the Trademark. It can be a name, sign or a symbol that is used to distinguish the product from other available products of industry.


Trade mark has forty five different classes according to the products. This soap product belongs to the class 3. If trademark is available for use that file a application for registration as soon as possible. (Details in section 1.3).

1.2. Company Profile
Ayurvedic Soap Company is a private limited company that sells different products of soap. It is more consider about the natural products which people have more demand on it.
Aims: Our current target is only consider about liquid hand soap and bar soap. Especially herbal soap and also soap for the children skin that could be really important in market and ladies have more demand of soap. Our first aim is to be in the soap market and identity the competitiveness and survive in the business, ultimately make a profit. In future I propose you to add some more items other than soap. For an example: shaving cream, deodorant and shampoo. It will be increase your product range and can earn more. It is better to design advertisement targeting women and children. Aim is sell soap each and every where in UK via online.



Objectives: First launch the business on proposed date. It is always recommend that you to have deadlines for every certain goal. Observe the fist month sales and predict how it will be in next six months. Then you should have a good plan to go towards the target. If it needs to be expanded recently, decide what are the items should add and does that essential to open another branch. Since this is an online base business many branches may cost you more other that have a profit. It will be need an additional storage when business is being developed and also more delivery options.

Location: No 130, Twyford Road, Hendon, Middlesex.
Contact Details: 02044857289, 07843334343

1.3 Legal issues
When setting up and running an online business in UK have legal issues to be considered before launch the business. Some discuss as follows.
• Legally most important thing is business registration. Business can be a private limited. The relevant documents should be provided which is the memorandum, articles, form10 and form12. (Crown, 2008). In private limited company liability of its members is limited by constitution. The private company is a very flexible format that can be adapted to fit numerous different requirements. Private company cannot offer its shares to the public. Any private company that wants to issue shares to the public must first become a plc or public limited company. (Companies act 2006, out-law)
• Private limited companies can start with a one person from 1st of October 2008. It has fewer shareholders than a public company, because of that it is difficult in transfer shares among them and there will often be restrictions on the transfer of their shares. Those with a very small number of shareholders, including those that are subsidiaries, might ban all transfers of shares that are not first approved by the board of directors. This allows the board to control who becomes a shareholder and, ultimately, who controls the company. Any way it is better to have limited shareholders from the beginning of your company. The name should end with the word “limited” or “Ltd” for a limited company and also any sensitive words should avoid since there are no special permission for any sensitive words (Outlaw 2008)
• In an online business Domain name is a very important thing. You should register domain name which is not available at the moment. In nominet domain name is registered first come first serve basis. Since you have UK business I recommend nominet because they are reputed internet registry for .uk domain names and also you should be aware of the registration fee because some ISP’s or domain name sellers might be charge you more assume that you do not have any idea about the online business. This registration is only valid for only two years it is highly advised that should be re-new the registration before it expires. Another important thing about the web site is that keep web site ownership to you. Before you sign contract with your web site developer it should be mentioned in the contract.
• The trademark infringement has a higher potential when it comes to an online system. Do not choose a trademark which is available in the market. For an example if two counties have tow companies that run as local, having the same trademark won’t be a conflict. The main thing is in online business it does not have geographical barriers. Because of that it may course problems for you. So the trademark should not be conflicted with other trademark. (Startupavenues, 2004). You should file an application for registration and it is mode by filling the relevant forms at the patent office and paying the appropriate fee. The application should have name and address of the applicant, statement of the goods relation to which it is sought to register the trademark, a representation of trademark as we represent above and statement that the trademark is being used by the applicant. Once you submit the application there is a three months of period for oppose for your application if there is no arguments or if overcome from those it will be in process. However it will take one to two years to register application in UK.
Some important provisions were commenced on 1 October 2008 as follows.
• The general duties of directors in respect of conflicts of interest.
• At least can have one natural person as a director.
• Minimum age of 16 for directors.

Section 03: Security and Privacy
When you are doing online business it is very important to consider about the security and privacy. Because the Internet is a public system where any one can easily access, monitor or track, save data from anywhere of the world, it is really important that in an online business you should be identity the possible security threats. This section discuss about the security and privacy and consequences, measures to take for better transaction and security of data and legal implications for security breach. First of all we consider about security threats.
3.2 Privacy
Privacy is a fundamental right in any human. In UK privacy has a good interest about privacy. Customer personal data is something a business always deals. For a given time millions of private data are transmitting over internet. This section discusses and advice on the importance of Privacy and data protection related with legal requirements which accord to data protection. (Data Protection, Out Laws)

3.2.1 Privacy Data
Personal data such as name, telephone numbers, and email address, political and religious views, physical and metal conditions are called sensitive data. You should register under Information Commissioner’s Office (ICO) before collecting personal information of others. Should be mentioned what data you collect and how you save the data. Today personal data is been used for various good or bad reasons by companies. One of the pre conditions in running an online business is for an individual to be confident and trustworthy about the online website. So the business has the responsibility and also is legally bound to protect each and every customer’s data. In the UK the Data Protection Act 1998 complies with privacy and data protection issues. Privacy of data is not always about keep the information as secrete. It is about trust and the law provide the individual the control, awareness and the right to insist about the correctness and use of data (Dempsey, 2004). According to the Data Protection Act section 1(1) the law applies when ever a “Data controller” process data which is in most cases personal data (Crown, 1998)
• The data should be processed fairly and lawfully.
• Should process for limited purposes.
• Data should be adequate and relevant.
• Should be accurate and up to date.
• Data should not keep for longer than necessary it should be destroy.
• Processed according to the rights of the individual.
• Should keep secure from unauthorised access.
• Should not transferred to the counties outside EEA unless with adequate level of data protection.(Todd,P 2005)
3.2.2 – Privacy Policy
It is very crucial to have a clear and understanding “Privacy Policy” to an online organisation. Notification is a legal requirement if you processes personal data, information must notify the Information Commissioner’s Office (ICO) else it should be a criminal offence.
• What type of personal data collected – It should be essential to collect only required information for the business any unnecessary information that you keep may cause you problems. For an example: if you do not want to know sex it is better to leave rather collecting regardless information and wasting your storage.

• How the information is use – The collected information is used for specific purpose such as place an online order of a customer. Then you should know the name of the customer credit card information and also address.
• Who the information will share with – There may be a situation that company have to share your secret information. For an example when deliver goods, (assume that we are going to use third party for delivery) then we must give your name and address details in order to deliver goods. But it should be mentioned to the customer, without knowing, can not share information.
• Whether the information will be exported outside the EU – This section in not an interesting for this business since we are targeting UK itself.
• What choices are available to website visitors regarding how collected information is used – what Security measures that use to protect data and all the security procedures used should be displayed. This should include technical such as use of firewalls, cookies and also non technical such as how data is protected from third parties with proper contracts or training.
• What safeguards are put in place to protect information from loss, misuse or alteration – It is very important to keep the customer financial and confidential information safeguard from outside users. For example hackers, spam, viruses, Trojan, spyware and so on. Otherwise they may alternate the information or misuse information such as credit card information. It is better to destroy credit card information as soon as transaction is finished.
• How website visitors can update or correct inaccuracies in their information – It is really important that there may be case that customer may change the living place so he or she should change the information. Therefore web site should have an option to chance the registered customers’ details by login with authorized username and password.



3.3 Security Threats
Why we consider security threats? Being a small business it has high probability to attack the system assuming that system does not protected or small business does not have the capability of gain expertise knowledge about the security. With the explosion of the network connection it is possible to access any computer which connects to the internet as any telephone in the world can access another. Because of that it is very important to have authenticate system for each and every computer in the world. The National Cyber Security Alliance together with their partners has identified the most likely security threats a business may have to endure from millions of threats (Teixeira, 2007).
• Computer viruses – It a threat that could be harmful to your system by accessing your financial and confidential and it will do some damage to your data such as erase all data or turn off the server while the system is being run and also it may damage hardware system as well. It can be attacked in various ways that you might miss lead by the viruses. It could be an E-mail, online request or small software such as windows media player plug-in. You should be aware of these viruses in order to maintain your system properly.
• Hacking – This could be very harmful to your business because hacking means some kind of unauthorized access. It will not damage your system but it is possible to read your private data such as credit card details of customers, password, business sells, and company profit and so on. Usually hackers can access any data that you stored in the system. Hackers may gain the remote access capability of the system. If it will happen they can access computer from anywhere that they have internet.
• Denial of Service Attacks – This is usually happen in the large companies that frequently communicate via internet. But still when the online business is running it will access plenty of customers in future. What denial of service attack does, it can cost the target person or company a great deal of time and money. Typically, the loss of service is the inability of a particular network service, such as e-mail, to be available or the temporary loss of all network connectivity and services. A denial of service attack can also destroy programming and files in affected computer systems even though it does not cause any theft of information or other security losses.
• Networking – In networking there are many loose points that open the gate to the hackers. It is highly recommend that the system should be properly networked by the expertise by using all possible network security options. It may cost you for the networking using required networking equipments but it saves business’s and customers’ financial and confidential data from hackers. If the business does not consider this security factors it may cause you some serious issues.
• Physical damages – This is a another major considerable fact. Because if the system only runs on the server and only few computers are used you may at a risk of data my physical damage such as fire. In this case system should have a back up system to prevent lost of important information that contain only the system but no paper work. Back up storage should not be the same place of your business place. These two places should be well separate by distance. This may cause you extra money as well. But it can consider as investment on behalf of security.
• Unauthorized Access – It is happened because of less security of your system or network. As it was mentioned above all computers should have authondicate access. Otherwise it may cause unauthorized access. It will discribe furthermore in section 3.2.2
• Employees – This is another aspect to be considered when concerning security threats. An employee or a disgruntled employee in the business has the most knowledge and possibly the access on sensitive and confidential data. Either the party has the capability to sabotage the company by selling or by destroying company data forever. They might make it a never recoverable loss to the business. Despite on the fact it should be very careful when deal with the employees.
3.4 – Security measures
One of the first things any company will need to do is to review what personal information they control, whether they actually process the information, or whether this is carried out by someone acting on their behalf.
• How valuable, sensitive or confidential is the information?
• What damage or distress could be caused to individuals if there was a security breach?
• What effect would a security breach have on your organisation? In cost? To your reputation? To the trust of your customers or clients?
This will help you assess what security measures you need to have in place.
(Information Commissioner’s Office)

3.4.1 Successful business transactions
The online business transactions are doing virtually. In order to authorized the transaction it is required to have various kind of private details such as name, address information, credit card details and some times bank account details as well. Hence the website should be secure and safe which make the customer trust and rely on the web site. You should be able to make sure customers this is a good secure web site to do online transactions since they have doubt about fake web sites. Implement a secure transaction environment in you website following methods have to be used.
• It is safe to maintain a table of content of registered customers. Then web site can form a log in page before a customer performs a transaction. A password of a registered user should be private to that person.
• In online transactions there are many secure ways. But cryptography is one of the safest and famous methods use for online transactions. The technology is used encryption to make the customer data into an unreadable form for a hacker who trying to read data in between data transmission. Once it reaches the destination it will be decrypted to the original data. This mechanism uses a secrete key or a code to encrypt the information and use the same key to decrypt at the other end (Tanenbaum, 2003).
• Even though transaction is happened securely it should be make sure that the payee and payer is genuine. In this case digital certificates are used for authentication. It can be used private and public key encryption called as symmetric key encryption. If it is used both keys, called as asymmetric key encryption. For an instance the message encrypts with the private key of the customer, can decrypt only using his public key. Once it reaches the receiver end the message can be decrypted using the pubic key which was provided with the digital certificate earlier. This is issued by a certificate authority. This method will compare and make sure the signatures are same and content of the data was not modified during the transmission (George, 2008).
3.4.2 Prevent unauthorised access
Unauthorised access is a major issue of an online business. It is highly recommended to be used latest methods and technologies to prevent unauthorised access. .
• The company’s computer system should be first facilitating with a firewall. The firewall can be either a separate software or it can be incorporated with a security software or OS. Linux is the widely used Operating System for the high standard of security. Servers should be installed with latest antivirus software and spyware programs. Most importantly the operating systems should update with the latest service packs and updates.
• Make sure the company wireless network is protected. Since most wireless networks including wireless access points have a default password which can lead unauthorised access those have to be changed. The network should also have an encryption method (BBC).
• The easiest way that hackers have found is spam mail. Staff should be well trained about those unnecessary spam viruses because via the mail you might give away all confidential information to others. If a staff member receives a mail looks just like from the company itself or by another company (i.e. banks, ISP, etc) asking for any sensitive data or asking run an exe file or even just open a presentation (pps file) he/she should have the knowledge take appropriate necessary action.
• The company employee should know about the data protection policies in the company. They should have own password that only known by them self. When a one staff member leaves should disable his account and also should be reset all the passwords that he knows of the system. (Mukhopadhyay, Mishra, 2007).




3.5 Legal Implication
The law also implies for security breaches. According to the Computer Misuse Act 1990 under sections 1(1) person can be offended (wikipedia).
A person is guilty of an offence if:
a) He causes a computer to perform any function with intent to secure access to any program or data held in a computer;
b) The access he intends to secure is unauthorized; and
c) He knows at the time when he causes the computer to perform the function that this is the case.
Person guilty of an offence under this section shall be liable on summary conviction to imprisonment for a term not exceeding six months or to a fine not exceeding level 5, on the standard scale or both.(wikipedia).

















Section 04: Online Selling
Online selling is the where that actual business is going on with the customers and earns money. In UK there are legal requirements to be considered in order to provide a standard service to the customers and also protect the business. When your website display items for sale it is an “Invitation to Treat”. The customer can make an “Offer” to you by sending a request to buy the product. Your system should be generated two mails that your request granted and also when goods are released.
4.1 UK laws and legal requirements
There are legal implications entitled for an online transaction governs by the following UK laws.
• Sales of Goods Act 1979
• Consumer Protection Act 1987
• Data protection Acts 1984 and 1998
• Electronic Commerce (EC directive) Regulations 2002
• Consumer Protection (Distance Selling) Regulations 2000
According to the Electronic Commerce Regulations act if a business sets up a website to promote its goods or services, require the business to provide customers with certain information. For example, the website should state the name of the business, the geographical address and the e-mail address. If the website mentions the price of goods, it should also state whether the price includes tax and delivery costs. A business will therefore be in breach of the Regulations if the information is difficult to find or if the website is not easily navigable. As a transactional websites must contain additional information since they place orders via online as mentioned above. For an example the technical steps that the customer must follow to place an order. This is normally fulfilled by using a shopping cart or shopping basket system and also let customer know by sending an E-mail about the order. (EC Regulations 2002)
If the customer is a consumer who buying goods for personal use and the customer orders goods on-line, further requirements are forced on the supplier by the Distance Selling Regulations. Even though this law not applicable to all kind of business, it is applicable for this business.
In Distance Selling Regulations as the contract will be concluded over the internet, the information must be contained on the website as there is no opportunity for the supplier to provide the information in any other way before the order is placed. The customer must be informed of the name and address of the supplier, a description of the goods, arrangements for payment, delivery and performance, the price of the goods (no hidden prices will accepted in may be criminal offence) any additional charges for ordering goods on-line and delivery costs. The customer must also be informed of the right to cancel the contract. All the necessary information should be known by the customer. (Distance selling Regulations 2000)
Under Data Protection Act customer has rights to know what information gain by them and how business handle the information. Which means it gives individual rights over their personal information. As Discussed in the section 3.2.1 should be aware what information to be collected how we handle that information. It should be held securely and should be up to date. You should train staff in their duties and responsibilities under the Data Protection Act, and putting them into practice.


ADVERTISEMENT

4.2 Other requirements
In the advertisement also have legal requirements. Advertisement should be legal, decent, honest and truthful. Your advertisement should be competitive and more attractive to the customer. By looking at your advertisement customer should understand what is the product and what is the different of this product from the same other products. You should aware of not misleading the customers. It will be a criminal offence (Misleading Advertisements Regulation 1988). Advertisement should not be effect to the economic behaviour and it should not be harm to the competitors even though you trying to be especial among them and do not promise anything that you never going to do and also do not create false impressions.
It is advised to be very care full when doing competitive advertising because it may be an unfair competition. You can not do trademark infringement. It means your trademark should not be identical or similar with some others trademark. Company name has the same rule it should be a unique name. There are different rates of advertising for example flat rete, cost per thousand impressions, cost per click and etc. Tobacco advertising is prohibited in all media. But our website does not have such products. In offers made to customers, statements like “Subject to Availability” should be displayed.


Section 5: Intellectual Property
In a business there are properties such as lands, buildings, vehicles and etc, but there are some intangible properties which are creation of the mind such as name, symbols, and images and so on. Some of these properties make the business unique among others in the business world. As an E-commerce system www.ayurvedicsoap.co.uk has its own intellectual properties. The Business name and Trademark can consider as the main intellectual property of the business and also the quality and uniqueness of the products are some of the main factors. There are some more intellectual properties such as the website and database. This section will discuss about different IP rights and how it extends in products and website.
• Copyright
• Industrial Property
• Trademark
• Company Name and Domain Name
• Website
• Database

5.1 Copyright
Copyright is rights against copying or exploitation of artistic or literacy work. It is very important in a business. Because business has its own intellectual property that is bounded by the law that can not copy by any other outside sources (Copyright, Design and Patent Act 1988). It has limited writes that expires 70 years after author’s life. Make sure that when you sign contract with web site developers and Database designers and system developers it should transfer ownership when you buy the property from them. Otherwise they are the owners of that relevant property and owner has the copyright. (Crown, 2003)

5.2 Industrial Property
Creations, industrial designs and inventions fall into industrial property. The expression “industrial” property may appear not to be entirely logical because it is only as far as inventions are concerned that the main segment of economy that is interested in them is industry. Indeed, in the typical situation, inventions are exploited in industrial plants. But trademarks, service marks, commercial names and commercial designations are of interest not only to industry but also and mainly to commerce. Notwithstanding this lack of logic, the expression “industrial property” has acquired a meaning, which clearly covers not only inventions but also the other objects just mentioned (World Intellectual Property Organization, 2003).
5.2.1 Trademark
The trade mark is a significant intellectual property of the business that carries the whole idea of the business. We should make customers mind very friendly with the product by the trademark. Infringement and dilution are the two general ways of violation a trade mark (George, 2008). Infringement is the use of a reputed business trademark by some other business. Infringement is to make the customer mind confuse with the two products. If the two products are identical then customer may mislead, or the selling product is similar or identical to the original product and create some confusion in the public as well. So it is violation of trademark law (Hedley, 2006). Trademark dilution happens when use a trademark owner's famous trademark in a way that is likely to weaken its capacity to identify the trademark owner's goods or services or to tarnish the wholesomeness of the mark. The trademark owner need not show that you created consumer confusion, and dilution may occur even if your goods or services are completely different from the trademark owner's. All these can heavily damage the lawful business.
It should be very careful when you select a trademark for your company as mentioned above it is heavily bounded by the law. You can not even display other companies’ trademark without acknowledge them. It will be a trademark infringement. If you display any other products trademark it is important to have an agreement or a licence that gives permission to use display.

5.1.2 Company Name and Domain Name
This is again a very essential property of the business. As the trade mark almost same rules apply to the domain name that protected by trademark. When you choose the company name it should be follow the steps that were mentioned in the section 01. Even if you check companies name still you can be infringement by selecting a name. Suppose there was a business which had good reputation and all customers knew about the name and the product but it is not available in the companies name. But still you can not use that name to the company because you considered as infringe of company name.
In domain name selection it is again go through many laws. What we have to consider is that the domain name is available. If it is available you can not re-register it. If it is available you should change your domain name. But when you are changing the domain name it should not be typosquatting. That means it should not be a similar domain name which is available. Example www.bbc.co.uk is available there should not be a domain name such as www.bcc.co.uk. It is infringement. Also you can not damage the any other trade reputation and good will within the UK. For an example can not use coca – cola name or trade mark for the toilet papers.

5.1.3 Web Site
The web site has different issues related with intellectual property since it has been design by out source. As it is mentioned above the ownership of the web site is the most important to consider. Does that mean the website development company owns your web site? You may not get the whole ownership since there can be other software incorporates with the site for different functions to operate in the site where copyrights are to the development company. Even though developer developed the web site it was given by you. Which means that it content is yours it has all your ideas and your business ingredients. Just because you do not have the ability or the professional knowledge about the web site developing it has been given to the professional. It can be considered has out sourcing. As mentioned above it is safe to be always a legal agreement with the respective owners to avoid framing.


5.1.4 Database
Database is a very crucial factor in your online business. As its name one can understand what it contains. It has all the important data in the business and also private data. Creating and maintaining a well analysed database management system is a very hard task. As in web site developing you might want to have third party to develop and maintain proper database system.

Since it has all the important data it should be well protected. Because of that protection of the database is extremely important. The law protects databases with original contents, which means that if by reason the selection and the arrangement of its contents, the database constitutes the authors own intellectual creation (Hedley, 2006). In the legislation of Copyrights and Related Rights Act 2000, Section (2) 1 states, it is only the contents the law covers, but not the DBMS use to operate the database. So tables and other creation in the database are protected. The copyright owner normally is the creator. If an employee of your business creates the database the company can get the ownership under the law. But if the development company creates the database behalf then a proper contractual relationship should be build for the database ownership for you business (Database rights, Outlaw).
A database is infringed if a person extracts or re-utilise any data from a protected database without the owners permission. The remedies are available to the infringer and also for the persons who authorized to action. If your business access data from third parties it is important to have clear agreements and/or licences with them.

Section 6: Professionalism and Ethics
In general life everyone does have some professionalism and ethics. According to the profession doing it has some code of ethics. For a software engineer has code of ethics such as
6.1 – Importance and issues
A business has certain Professional and ethical issues to deal while on the move for success. There are ethical principles which can be guidance alone the way to decision in your online business. They can be put in the following format (Rainbow, 2002).
• Beneficence – The best Solution
• Least Harm – The best out of available options
• Respect – Respect of freedom of individual
• Justice – Fair solutions to all involved.
A professional business always has the ability to think beyond the scope of a normal business, which means that they have a wider view in making decision. They can be beneficial to the business in a better way. The client as the main asset of the business should be protected. As discussed in the early sections in the report security, privacy and comfort should be provided. The employees are important to the business to progress successfully. So the welfare of them is also important (Oz, 1992). Professionalism and ethics is basically about better selections made by professional bodies in the business in relation with the rest of the parties which they deal. There can issues professionally and ethically with the growing demand of consumers and technologies. These can be behavioural standards, the rules for employees, the freedom and their rights. These further can look at ecommerce activities such as data access rights, misuse of data and privacy. The choice of ethical theories such as deontology or utilitarianism should make wisely. Sometimes they can be the best options for all the parties or it can be a choice between two options in which case the least harmful decision has to be made.
6.2 – Advice on surveillance systems on employees
Discussion on installing cameras and use of different software to monitor employees has different views ethically. Different researches have different arguments on the good and bad. According to Botan (1996) there should be more specific laws regarding surveillance systems (citied by Ahamad, 2007). From a business stand point it is a best practice to make sure that the work is done properly and no misuse of data or equipment is happening. But on the other hand it may have a negative impact on the employees. Using the Social Facilitation Framework Zajonc (1965) explains that use of computer monitoring will increase the simple tasks carried out by an individual, but on the other hand decreases performance on complex tasks (citied by Ahamad, 2007). So it is better to avoid employee monitoring as they will not be only dealing with simple task all the time.
If you willing to have the surveillance systems inside the company it is advise that it should be notified to the employees as otherwise it will be breach of law as the employee privacy are monitored without individual’s knowledge. Monitoring emails is strictly prohibited according to the law in some countries in the Europe.