Do employees have the right to privacy in the workplace? Ethical, Legal and Social Issues in Information Technology Prepared by: Bozena Tkaczyk.

Slides:



Advertisements
Similar presentations
Protect Our Students Protect Ourselves
Advertisements

Nomination of IM&T Lead and Caldicott Guardian. Click hereClick here for guidance on the Caldicott Guardians Responsibilities. Work through the Information.
Ethics in Public Office Acts David Waddell. The Law on Ethics Ethics in Public Office Act 1995 Standards in Public Office Act 2001 An Act to provide for.
Insert the name of your organization here The Public Servants Disclosure Protection Act at.
Monash University Ethical and Professional Conduct.
Crisis Communications for Security Issues: A Nightmare You Can Manage Marilu Goodyear Donna Liss Allison Rose Lopez Jenny Mehmedovic The University of.
Copyright © Allyn & Bacon 2008 Chapter 8 Teacher Freedoms This multimedia product and its contents are protected under copyright law. The following are.
Why Won’t You Talk to Me? The Crown perspective
For CHILDREN’S SERVICES Adapt quickly to meet changing social care demands A familiar system that improves usability for frontline workers Release staff.
Woodland Hills School District Computer Network Acceptable Use Policy.
Responsible Charge—the case of Ed Turner and the city of Idaho Falls.
FOLLOWING UP ON IEPS: DOCUMENTATION... DOCUMENTATION... AND... YES... DOCUMENTATION! Jennifer Herbold 10/22/2014.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
© Information and Privacy Commissioner of Ontario, 2006 Circle of Care Ontario University & College Health Association - May 24, Manuela Di Re Associate.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
Mark S. Hayes – Blake, Cassels & Graydon LLP Privacy and Security – Some Observations Mark S. Hayes, Blake, Cassels & Graydon LLP 7th CACR Privacy and.
Business Plug-In B7 Ethics.
EMPLOYMENT LAW CONSIDERATIONS March 16, Difference between being an employer vs. a law enforcement officer Garrity – this case involves employees’
Developed by Susan Carle under NIC Cooperative Agreement 06S20GJJ1 EMPLOYMENT LAW CONSIDERATIONS Investigating Allegations of Staff Sexual Misconduct with.
Public Sector Integrity Commissioner (Canada) Judith Fiagbey, PPAL 6130 Ethics, Privacy and Access to Information.
Inclusive Practices- Effective IEP Implementation Through Progress Monitoring Presented by Robin Brister West Carroll Parish
Network security policy: best practices
Privacy: What you need to know Elizabeth Denham Information and Privacy Commissioner for B.C. Professional Investigators’ Association of B.C. October 26,
Welcome. Who am I? Philip L. Sullivan MCT, MCSE, MCSA Microsoft Certified Trainer for 6 Years Work as a Lead Windows NT\2000\2003 Instructor for Clark.
Evaluating and Purchasing Electronic Resources- The University of Pittsburgh Experience Sarah Aerni Special Projects Librarian University of Pittsburgh.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Introduction Definition Advantages for employees and employers
N OBODY SAID I SHOULDN ’ T PAGE 150 & 151- ETHICS C HAPTER FIVE MGS3040-Section 3 Group B Shavone Parris Idalia Fabregas Annette Immella Sergio Martins.
WORKSHOP IV Integrating Ethics, Compliance, Privacy and Security into a Single Organizational Initiative Geralyn Kidera JD Senior Vice President Council.
Copyright  2010 Pearson Education Canada / J A McLachlan Chapter Nine Making Ethical Decisions.
- The Basics - Training Module 1. What You’ll Learn In This Module What is a Conservation District? What is it suppose to do? Who are the people involved.
Your Ambulance Service Foundation Trust Consultation.
What does the VLRC do? The VLRC is a independent government funded organisation that monitors and coordinates law reform in Victoria. The major responsibility.
The Eighth Asian Bioethics Conference Biotechnology, Culture, and Human Values in Asia and Beyond Confidentiality and Genetic data: Ethical and Legal Rights.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Engineering Ethics Waste management.
“What’s Ethics Got To Do With It” Presentation to the Canberra Evaluation Forum Gary Kent Head Governance Australian Institute of Health and Welfare.
Data Protection STFC Presentation to PPD Senior Staff 26/11/2009 FoI/DP team.
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
10/20/ SAI 2012 Statewide Mentor/Mentee Meeting Matt Carver, J.D., Director of Legal Services tel fax –
The Rail Safety Summit  2015 RAIL SAFETY SUMMIT 2015.
EDAD 520 Legal and Ethical Foundations of Educational Leadership.
PETITIONS AND NOTICES CORE COURSE #13 PREPARING FOR A WELLNESS CHECK Don Wright, General Counsel SBOE.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
Paulyn Marrinan Quinn S.C. Ombudsman for the Defence Forces - Ireland Tuesday 8 May 2012, Istanbul, Turkey Session III : Human Rights and Fundamental Freedoms.
Project Scenario # 3 Daniel Gomez. I am the Information Systems Security Manager at Western Technical College. A virus has penetrated the network firewall.
Cormack Donahue Nathan Zirpolo Farukh Sarkulov P.T Clement.
Statements and Confessions
Vice-Principal Conference NAHT Thursday 12 th November 2009.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Damarion Taylor WS-107 January 18, Installing a Anti-virus (i.e. Norton) I.Place Norton Anti-Virus disc into your CD drive. II.Wait for auto-run.
U.S. District Court Southern District of New York 229 F.R.D. 422 (S.D.N.Y. 2004)
Internal/External Audit Corporate Governance part 5.
Woodland Hills School District Computer Network Acceptable Use Policy.
I can understand that sources of law include The Constitution, The Charter of Rights and Freedoms, Treaties, statutes, and common law. I can understand.
By Reid and Matthew  One’s ability to control what information one reveals about his or herself over the Internet.  To control who can access.
Our Need for Direction March 13. Remember the time … What was it like when you were in a situation where you suddenly had no source of light? Today we.
“TWO HEADS ARE BETTER THAN ONE” AN EXAMINATION AND ANALYSIS OF THE ROLE OF THE DEPUTY PRINCIPAL IN IRISH PRIMARY SCHOOLS TERRY ALLEN.
Public sector whistleblowing: Ombudsman Victoria’s experience 10 June 2010 Glenn Sullivan, Director Ombudsman Victoria.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
NEW YORK’S CONSTITUTIONAL CONVENTION AND WHY YOUR VOTE MATTERS.
Mark E. Bannon Executive Director
Portfolio Committee on Police DNA National Forensics Oversight and Ethics Board 23 November 2016.
Strategic Communications Training Freedom of Information X State MDA
GDPR Overview Gydeline – October 2017
GDPR Overview Gydeline – October 2017
Information Governance
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Portfolio Committee on Police DNA National Forensics Oversight and Ethics Board 23 November 2016.
Presentation transcript:

Do employees have the right to privacy in the workplace? Ethical, Legal and Social Issues in Information Technology Prepared by: Bozena Tkaczyk

Where is the line? “Public bodies have a responsibility to secure and protect their computers and networked systems against internal and external threats, however they must also respect an employee’s legal right to privacy,” said Commissioner Denham.

T IMES C OLONIST Tuesday, January 28, 2014 Victoria, British Columbia High 12, Low 8. Details C12 TC PUBLICATION LIMITED PARTNERSHIP timescolonist.com Privacy watchdog to probe use of spyware at Saanich municipal hall B.C.’s information and privacy commissioner is launching an investigation into Saanich’s use of spyware on municipal computers. _________________________ The new mayor of Saanich, B.C. alleges that municipal staff want to bug his computer … BUSINESS > B1 The municipality has said that software called Spector 360, which can record every keystroke and monitor online activity, was installed in response to a May 2014 cyber- security review. The program was purchased Nov. 21, less than a week after the municipal election, It was put on Atwell’s computer on Dec. 2, a day after he was sworn into office. "I was never informed of this action and it was done without my knowledge. Someone was planning to spy on everything I did on my computer," Atwell said A few weeks later, the plan had been revealed by an unnamed whistleblower and it came to light that the software that had been chosen did nothing to secure the system from outside threats, but rather, was implemented in order to monitor the incoming Mayor. IT technicians who were responsible for installing the software were given explicit instructions to enable the most privacy-intrusive features of the software. _______________________________________________________ “I have decided to act on my own motion and initiate an investigation into whether the district’s use of employee- monitoring software complies with the Freedom of Information and Protection of Privacy Act,” BC’s Privacy Commissioner said.

PRIVACY Editor: Bozena Tkaczyk > TUESDAY, April B1 TIMES COLONIST, VICTORIA, BC BC’s Privacy Commissioner has found that Saanich’s use of spyware to track on-line activity of its newly elected mayor and other staff violates employee rights. Commissioner Elizabeth Denham initiated an investigation in January, following public statements by Saanich Mayor Richard Atwell and persistent unanswered questions about the use of employee monitoring software by the district. In her report, Denham is recommending the District of Saanich disable key features of the Spector 360 software including keystroke logging, automated screen shots and continuous tracking of computer program activity. The Commissioner is also advising Saanich to destroy all data collected by the software. UPDATE: BC privacy commissioner to issue report on Saanich mayor’s spyware allegations ““One of the most disappointing findings in my investigation is the District’s near complete lack of awareness and understanding of the privacy provisions of B.C.’s Freedom of Information and Protection of Privacy Act. The law has been in place for more than 20 years, yet the District appears to not understand its most basic privacy provisions. The Commissioner’s full report at:

“Decisions were made by the senior management in the best interests of protecting Saanich’s information and technology system,” Laidlaw said. I am not here to protect your information! I am here to spy on you! Spector 360

LAW & ETHICS TUESDAY, December 8, 2015 B3 TIMES COLONIST, VICTORIA, BC Ethical decision-making and leadership are the basis of ethical organizations, corporate social responsibility. How does the District of Saanich fit in? _________________________ “Finding no evidence of malfeasance, I find no cause to terminate or discipline any employee” Internal investigation Wrongful use of spyware was a 'corporate decision' says Saanich CAO This case presented grave implications not only on law and justice, but also on the democratic system itself, which with this case, as well as many others like it, has been greatly eroded. In the end, the only person that had been punished was the whistle-blower who brought the matter into light - a truly sad outcome in a so- called Democracy. Editor: Bozena Tkaczyk > Privacy Commissioner Elizabeth Denham released a scathing report into the District’s improper use of Spector 360 on March 30, in which she said senior staff failed to consider privacy standards before approving its use. Denham also found senior staff failed to notify Atwell about the software’s installation on his computer, and noted “the District’s submissions to my office demonstrate a deep lack of understanding about the most basic tenets of the (Freedom of Information and Protection of Privacy) Act, such as what constitutes the collection of personal information.” Denham also concluded that Director of Corporate Services, Laura Ciarniello, gave the express approval to install the spyware. An in-house report released Wednesday on the use of spyware at the District of Saanich admits senior staff failed to consider privacy concerns, but stops short of blaming any individual staff member for its improper use.

References 1.Focus on line: The whistle blower’s tale: part Focus on line: The whistle blower's tale: part Focus on line: Investigations into investigations 4.The Times Colonist's coverage of Richard Atwell mayor-richard-atwell http:// mayor-richard-atwell disconnect-between-privacy-and-security http:// disconnect-between-privacy-and-security