IT Monitoring in the Workplace

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Workplace Bullying and Harassment Training and Legal Duties [Insert Presenter Name] [Company Name] [Date]
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
Employee Handbook / Personnel Policies Doug Scott, Industrial Steel Treating Co.
Little brother is watching you
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Organizing Your Job Search
Joel Garmon, Director, Information Security Mike Rollins, Security Architect Jeff Teague, Security Analyst, Senior 1
Social Media Policies Doug MacLeod Labour & Employment Lawyer MacLeod Law Firm.
WORKPLACE BULLYING & HARASSMENT TRAINING PRESENTATION 1 BENEFITS As workplace bullying, harassment and violence have become more common, the OHS laws have.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Keylogger A presentation of computer safety. What is a Keylogger?  A keylogger is an invisible tool for surveillance that allows you to monitor the activities.
Computers and the Internet. Key Information: Key Information: Even if you delete your mail, messages may remain on servers or backup devices for.
Electronic Use Policies.   Social Media  Internet.
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Presented by Beang Tong ENGL393, Spring’03
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
Privacy at Johnson and Dresser By: Anuj Ghai & Ubaid Khan.
Surveillance and More Porsha J. Rice. Surveillance Cameras Nowadays surveillance cameras are virtually everywhere and in places such as: Schools Stores.
PeopleSpan LLC | | | | Speaker Wendy Duggan, President PeopleSpan LLC 1.
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
Review Internet Safety. Definition Phishing is fishing for personal and financial information disguised at legitimate business .
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
HR: Leading People, Leading Organizations © 2006 SHRM SHRM Weekly Online Survey: September 29, 2006 Workplace Privacy Sample comprised of 442 randomly.
Best Free Key logger Download Computer & Internet Monitoring Software.
MS. MONA PAMELA DEBRA. ADVANTAGES AND DISADVANTAGES OF MONITOR AT THE WORKPLACE Monitoring employees in the workplace is a touchy topic. As technology.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Logitrac GPS The Future of GPS Technology City Department Overview.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
How to minimise the risks for your children online
Am I Being Paid Correctly?
Protecting Yourself and Your Information
IT Security  .
Personal spaces.
To spy or not to spy; that is the question
FastFacts Feature Presentation
What Teachers and staff need to know!
Year 4.
A POWERPOINT MADE TO KEEP YOU SAFE ONLINE!
Now What??? Stefanie Walker HR Consultant
LAUSD Responsible Use Policy (RUP)
Information Security 101 Richard Davis, Rob Laltrello.
Topic 5: Online Communities Press F5 to view!
Internet Safety.
Topic 6: Issues Press F5 to view!
Protect Your Computer Against Harmful Attacks!
Electronic Communication
Electronic Communication
Upgrade QuickBooks Software QuickBooks is accounting software that is meeting the requirements of small to medium sized businesses. The software is a.
Safety in the Digital World
Synthesise and Evaluate
Electronic Communication
Lesson 2: Epic Security Considerations
Computers in the Workplace
How would you define media? Give an example
Social Media Introduction
Online Safety: Rights and Responsibilities
Electronic Communication
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
CONVERCENT INCIDENT REPORTING Employee Training
Does It Matter Who Has Your Data?
Presentation transcript:

IT Monitoring in the Workplace Presented by Missy Day and Jenna Siegrist

Fun Facts 78% of companies monitor employees 30% of employee time* Based on a Nashville technology company Which accounts for the potential of… http://abcnews.go.com/Business/story?id=88319&page=1 http://www.cpai.com/risk-management/employergard/eprivacy.jsp http://nashvillepost.com/news/2012/7/1/the_monitoring_of_technology_emerges_as_a_workplace_issue http://www.amanet.org/training/articles/The-Latest-on-Workplace-Monitoring-and-Surveillance.aspx Delaware & Connecticut only states where employer legally has to notify you Government policies are more strict against employee monitoring Can even monitor WHAT you post on social media

The Beginning of Technology Monitoring City of Ontario vs. Quon Quon exceeded allotted character use each month Employer looked into the conversations As few as 8% work related Quon was disciplined He sued and won In 2010 it was appealed and the city won http://www.supremecourt.gov/opinions/09pdf/08-1332.pdf

Why is this legal? Protecting proprietary company information Any company property and what you do on it can be monitored http://www.wsws.org/en/articles/2006/10/hepa-o02.html Protecting proprietary company information Example: HP in 2006

Some Types of Monitoring Email (personal and work) Instant Messaging Websites visited Keystrokes Productivity Key Cards

Benefits of Monitoring Increase productivity Control data/information leakage Assist internal investigations Monitor quality of work/customer service

Does your workplace monitor you?

Short Video http://www.youtube.com/watch?v=5iRj67suTLs

Emailing What is legal? Case example Personal experiences with this?

Instant Messaging Personal or inappropriate conversations Keystrokes

Website Monitoring What is being monitored? Social media monitoring and screening Use of social media for job selection process Inappropriate sites Job search engines

Keystroke Logging 45% of companies Secretly records all of the keys struck on a keyboard This software can be on company cell phones too Beware of hackers on personal computers Employers can’t use: Login information to personal email, finances, etc. http://www.today.com/money/big-brother-may-not-be-watching-your-employer-probably-1C9950793 http://usatoday30.usatoday.com/tech/columnist/kimkomando/story/2012-02-24/work-monitor-smartphone/53221804/1

Keystroke Logging How do I know if I am being monitored? Advanced anti-spyware programs Task Manager Ask manager or HR http://www.today.com/money/big-brother-may-not-be-watching-your-employer-probably-1C9950793

Productivity Keystroke logging Screen Shots Time spent in each program Odesk example  Time spent in each program Mainly used for contractors to ensure they aren’t billing for personal time spent National Transportation Safety Board suggested monitoring pilots black boxes http://usatoday30.usatoday.com/money/workplace/2010-03-17-workplaceprivacy15_CV_N.htm

Key Cards Key Cards scanned to get into buildings can be tracked when you leave/enter Discretely monitors hours worked My company example KDDI created motion-sensing technology in 2010 to monitor employees Cleaning staff http://usatoday30.usatoday.com/money/workplace/2010-03-17-workplaceprivacy15_CV_N.htm

GPS Not all companies have legal right to do this (For cars) Need legitimate business reason Deliverymen, servicemen, truck drivers, etc. Company cell phone GPS monitoring Completely allowed Same kind of software as the Keylogger Can notify managers when.. you are moving leave a certain radius http://usatoday30.usatoday.com/tech/columnist/kimkomando/story/2012-02-24/work-monitor-smartphone/53221804/1

Future of IT Monitoring The government http://www.youtube.com/watch?v=Iv_2auG6DH0 Texas has become first state to require a warrant for workplace email surveillance Increased usage, also increased laws

Sources http://money.usnews.com/money/careers/articles/2008/08/ 04/7-ways-your-e-mail-can-get-you-fired?page=2 http://www.sba.gov/community/blogs/email-phone-and- social-media-monitoring-workplace-–-know-your-rights- employer http://www.pearlsw.com/products/imEcho/ http://www.scmagazine.com/employee-fired-for-emailing- health-data-to-herself/article/306366/ http://www.forbes.com/sites/kashmirhill/2012/08/16/how- to-tell-if-your-boss-is-spying-on-you/