Things To Consider  If you were an employer would you condone the use of personal electronics?  Would screening emails that come through the work.

Slides:



Advertisements
Similar presentations
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Advertisements

THE FUTURE OF ONLINE STORAGE. Insurance Lockboxs Purpose To provide a secure place to store your policy numbers, real estate holdings, financial information,
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Surfing the net: Ways to protect yourself. Internet Safety Look into safeguarding programs or options your online service provider might offer. Look into.
Internet Safety and Cyber Bullying All info came from
Keeping Your Child Safe on the Internet
_Protecting Our Kids New Technology: New Pitfalls Purpose: To help families ask the right questions, and make an informed decision for their children regarding.
Rights and Responsibilities in a Global Community
DHS SECURITY INCIDENT REPORTING AND RESPONSE SECURITY INCIDENT REPORTING AND RESPONSE DHS managers, employees, and other authorized information users.
PRIVACY & SECURITY HOW MUCH DO YOU KNOW ABOUT PRIVACY AND SECURITY?
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
THE FUTURE OF ONLINE STORAGE. AmeriLife Lockbox’s Purpose To provide a secure place to store your policy numbers, real estate holdings, financial information,
Jana Dixon Dawson Educational Cooperative
Social Media Policies Doug MacLeod Labour & Employment Lawyer MacLeod Law Firm.
E-Safety at MPL and beyond…... What are the risks our children face? Understanding the potential risks and encouraging safe and responsible use of the.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
BY: CHELSEA KUCERA ELED 318 The Legal, Social and Ethical Issues in Technology for the Classroom.
Hutton All Saints’ Online Risks and Dangers Workshop WEDNESDAY 19 TH NOVEMBER 2014.
Mattson Middle School One to One Laptop Program September 26, 2012.
Nine Elements of Digital Citizenship BH. Nine elements is identified to create a digital citizenship. Digital Access: full electronic participation in.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Behavior Expectations Jeopardy SubstitutePhysical ContactTechnologyAcademic
Keeping Your Child Safe on the Internet. Welcome We are first-generation Internet parents Our children are the first generation to be born and raised.
Class 6 Internet Privacy Law Social Media Privacy.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
By: Mackie Chapman, November 5th, IT 9, Block 2 Learning about computer safety may seem like a waste of time, but it is really important to learn how.
The Advantages And Disadvantages Of Monitoring At Work
Edgewood Behavior Expectations Jeopardy! Rules 1.Use Slideshow setting. 2.Divide the class into 2 teams 3.Establish the order to answer, pairing 2 students.
Parent Portal  Hand out userid and password  Login to NSA website and press the PowerSchool Parent Portal link on left tab  First time set up.  You.
Becoming a Digital Citizen Acknowledgments Thanks to UNC: The Graduate School for this PowerPoint Layout, Microsoft gallery for photos, and Commonsense.
Acceptable Use Policy and Internet Safety Training Mr. Chalmers, Media Specialist Southwest Middle School Used with permission from Kristin Seeger.
A Student’s Guide To The Internet By: Isaiah Klassen October 30 th 2013 I.T. Blk. 7.
Presented by Beang Tong ENGL393, Spring’03
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Grades 4-6 Be SAFE Online! Ceres Unified School District.
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
Suggestions for Parents Take the time to see what your kids are doing online and what their interests are. Let them teach you about the Internet. Surf.
Is monitoring employee’s internet usage moral? By: Brittany Tindall and Hannah Tyson.
Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst appears behind the blue triangles,
06/02/06 Workshop on knowledge sharing using the new WWW tools May 30 – June 2, 2006 GROUP Presentation Group 5 Group Members Ambrose Ruyooka Emmanuel.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 9 Ethics and Information Technology Understanding Business Ethics Stanwick.
Digital Communication By: Kimmie LaRich. Digital Communication- is how we communicate with people all over the world Two main ways we communicate are.
Electronic Safety Keeping yourself safe on the internet and cell phone Intended for Grades 4-5.
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
Let’s Get Savvy about Technology Mrs. George Dondero School.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Intro to Linked In Open Door Learning Center - Computers & Literacy Class.
Awareness raising session for Parents and Carers June Todd Awareness raising session for Parents and Carers June Todd.
INTERNET SAFETY How to Keep Yourself Safe Online.
PCS Technology for Students: Acceptable Use, Privacy, and Safety.
Lesson Objective: To understand more about the different places where employees can get help in managing their health at work.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Privacy and Social Media
BCOM 5 7 Communicating Electronically LEHMAN/ DUFRENE
PCS Technology for Staff: Acceptable Use, Privacy, and Safety
To spy or not to spy; that is the question
Computer Literacy – Grade 8
Multifactor Authentication & First Time Login
Introduction to BYOD EIT, Author Gay Robertson, 2017.
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Computer Literacy – Grade 8
How would you define media? Give an example
Student User Agreement and Policy 2022
Behavior Expectations Jeopardy
Big Brother Camera’s Brittany Todd.
Communicating in the IT Industry
Click on the link below to read the Policy on Acceptable Use of Internet and Electronic.
Presentation transcript:

Things To Consider  If you were an employer would you condone the use of personal electronics?  Would screening s that come through the work place be inappropriate? What are your thoughts about employee’s taking advantage of work time to use personal devices for anything not work related?

Smart Policies for Workplace Technologies

 Out of 91% of personal storage devices for work related purposes 63% of that population DO NOT use passwords to protect company data.

 Workers may get distracted by electronics at the work place  Company and personal data may intertwine with each other  Employee may go on website that are inappropriate at the workplace

 An Employee goes on an inappropriate website while a regional manager enters the office.  Company layouts are leaked due to the use of personal storage devices being used in the office.

At the end of the day Employers are liable for Employee actions!!!!  Therefore it is only safe to have restrictions on personal electronics use.  On the other hand people may feel that the eradication of electronics use maybe unfair.

Below is a link to a website that tells a real accounts of people getting fired for personal computer use at wrk CLICK HERE TO GO BACK TO YOUTUBE VIDEO!

Relating laws for personal use of electronics in the workplace. Lets Discuss the Loopholes of:  Employment privacy Electronic Communication Privacy Act  Interception and Access Act of 1979

Put YOURSELF in the Employer’s Shoes!!!!  Lack of productivity  Lawsuits  Information loss  Loss of MONEY

Work Cited  Bekish, Ashlee. "Employer Liability for Employee Cell Phone Use." Lawyers Find a Lawyer Law Firm, Attoney & Legal Services. 15 Jan Web. 30 Jan  Garrity, Sean, and George Weir. "Balancing the Threat of Personal Technology in the Workplace." International Journal of Electronic Security and Digital Forensics. 01 Apr Web. 15 Apr  Nsc. "Nsc Member Survey Result." National Safety Council, 23 Oct Web. 30 Jan  O'rouke, Anne. "Internet and Monitoring in the Workplace: Time for an Alternate Approach." Journal of Industrial Relations Web. 15 Apr