 This presentation is not a implication, accusation or insinuation of GPC’s policy and procedures for monitoring employees.  This presentation is for.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Protect Our Students Protect Ourselves
SEARCH AND SEIZURE: COMPLICATED BY TECHNOLOGY
WHY ARE WE CHANGING THE POLICY? Rationale: –To maximize students learning potential via technology –To utilize the natural affinity most students possess.
FERPA Refresher Training Start. Page 2 of 11 Copyright © 2006 Arizona Board of Regents FERPA Refresher Training What is FERPA FERPA stands for Family.
ERICK BECKER || || 949–852–1800 || Social Media in the Workplace: Guidelines for Employers May 27, 2014 Erick.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Right to Privacy: The Unwritten Right
How to keep your kids safe online
Things To Consider  If you were an employer would you condone the use of personal electronics?  Would screening s that come through the work.
Little brother is watching you
1 GRAND VALLEY STATE UNIVERSITY FAMILY EDUCATIONAL RIGHTS & PRIVACY ACT (FERPA) TRAINING OFFICES OF THE REGISTRAR AND UNIVERSITY COUNSEL JANUARY 20, 2009.
VIDEO AND AUDIO SURVEILLANCE LAWS
PRIVACY & SECURITY HOW MUCH DO YOU KNOW ABOUT PRIVACY AND SECURITY?
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Privacy & Personal Information -- Why do we care or do we?
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
Introduction to Fraud Examination. Discount Plus Company has been concerned for some time about its cash flows. Since the company began five years ago,
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
+ Protecting Individual Liberties Section 1 Chapter 14.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
Bordoloi CMIS 108 Dr. Bijoy Bordoloi Privacy. Bordoloi Computers and Privacy These notes focus on the various topics associated with maintaining individual.
(Edited) WORKPLACE PRIVACY.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
An Educational Computer Based Training Program CBTCBT.
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
Internet regulation National limits of Internet Content.
Frequently Asked Questions about Strikes and Job Security If the union gets in here I can’t ever lose my job because the union will get it back for me.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Personal Privacy and Security Zenia C. Bahorski Ph.D. Department of Computer Science Eastern Michigan University Personal Privacy & Security - Z. Bahorski,
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Presented by Beang Tong ENGL393, Spring’03
Mrs. Marion Kreisel MSN, RN Adult Nursing 130.  A medical student took home copies of patients' psychiatric records to work on a research project. When.
Privacy at Johnson and Dresser By: Anuj Ghai & Ubaid Khan.
Surveillance and More Porsha J. Rice. Surveillance Cameras Nowadays surveillance cameras are virtually everywhere and in places such as: Schools Stores.
Teens lesson fourteen consumer privacy presentation slides 03/08.
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Bringing Human Rights to the Workplace Avoiding Unpleasant Encounters with Civil Rights Lawyers Lewis Maltby President National Workrights Institute.
Health Insurance Portability and Accountability Act (HIPAA) Primer for Observers, Volunteers, Medical Students Dr. Michael Palumbo- Privacy Officer/ EVP.
Privacy and the Law.
IT Monitoring in the Workplace
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
PRIVACY AND SECURITY (CCI410) PERTEMUAN 5 IR. NIZIRWAN ANWAR, MT
To spy or not to spy; that is the question
Employee Privacy and Privacy of Employee Information
Other Sources of Information
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
The Surveillance State
A Gift of Fire Third edition Sara Baase
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
Move this to online module slides 11-56
Baltimore Police Department & CitiWatch
Presentation transcript:

 This presentation is not a implication, accusation or insinuation of GPC’s policy and procedures for monitoring employees.  This presentation is for information and entertainment purposes only!

 While it is true employees have workplace privacy rights, it is also true that employer’s have privacy rights.  They have the right to invade your privacy.

 Using sophisticated software, hidden cameras, phone-tapping devices, "smart card" security badges and global- positioning technology, employers may electronically snoop employee:  Computer keystrokes and files  Internet, Web and usage  Locations, movements and activities  Phone conversations and numbers dialed  Job performance

 Such monitoring is virtually unregulated. Therefore, unless company policy specifically states otherwise (and even this is not assured), your employer may listen, watch and read most of your workplace communications.

According to the most-recent, often-cited Electronic Monitoring and Surveillance published by the American Management Association (AMA) and The ePolicy Institute, most of the employers surveyed indicated that they subjected their employees to electronic surveillance in some way, shape or form; for example: 73% monitored messages 66% monitored Web surfing 48% monitored with video surveillance 45% monitored keystrokes and keyboard time 43% monitored computer files

 Advancements in technology, employer abuse or monitoring systems, and the lack of legislation protecting employees have all sparked concern for employee privacy.  American workers have almost no legal protection from employers who want to poke or prod into their personal lives.  Few workers realize that there is no federal law that protects their privacy on the job.

 While stipulations on employee privacy parameters vary from state to state, legal experts state that private sector employees have fewer rights than they commonly believe.  “There is no general federal or state law creating or protecting a zone of privacy in the workplace," wrote George Webster in Association Management. “

 In fact, the ACLU receives more complaints about workplace rights violations than about any other issue.  The ACLU continues to fight for employees' right to privacy by challenging how those rights are violated by employers.

 The U.S. Constitution's First Amendment free-speech clause and the Fourth Amendment protections against unreasonable searches and seizures apply only to action by the government, not to private-sector employers….  By and large, employees leave their constitutional rights at the workplace door. A few state constitutions do extend speech and search protection to private-sector employees.

 Today's presentation entails the following topics:  Telephone Monitoring  Computer Monitoring  Electronic Mail and Voice Mail  Video Monitoring  Data Badge Surveillance

 Eavesdropping and phone tapping are the most common methods of monitoring used by employers. Most people link phone tapping with some sort of police or FBI work, but it is commonplace in businesses, from retail stores to government offices.

 Can my employer listen to my phone calls at work?  Are my conversations with co-workers subject to monitoring?  Can my employer obtain a record of my calls.

 If you have a computer terminal at your job, it may be your employer's window into your workspace. There are several types of computer monitoring.

 Employers can use computer software that enables them to see what is on the screen or stored in the employees' computer terminals and hard disks.  Employers use software that can keep track of the amount of time an employee spends away from the computer or idle time at the terminal.

 Is my employer allowed to see what is on my terminal while I am working?  How can I tell if I am being monitored at my terminal?

 Is electronic mail and voice mail private?  When I delete messages, are they still in the system?  Is there ever a circumstance in which my messages are private?  Are my text messages on an employer- provided cell phone private?

In 2010 Maryland corrections officer Robert Collins approached the ACLU of Maryland late last year, disturbed that he was required to provide his Facebook login and password to the Maryland Division of Corrections (DOC) during a recertification interview. He had to sit there while the interviewer logged on to his account and read not only his postings, but those of his family and friends too.

Can employers use video monitoring in the workplace?

In April 2005 a case brought by the ACLU of Southern California, a federal judge ruled that Ontario police officers' rights under both federal and state law were violated when a police detective installed a video camera in a men's locker room to spy on the officers.

 An active badge is a credit card sized badge that an employee wears on the outside of his or her clothing so movement can be monitored in a building using his or her unique ID.

 Are there any laws that deal with workplace privacy?  Currently there are very few laws regulating employee monitoring. If you are concerned about this issue, contact your federal legislators, especially the members of the House and Senate Labor committees in Congress.

 Employers must notify employees and applicants of electronic monitoring policies  Prior to monitoring, employers must provide a visual or aural signal to employees and any customers  Employers must provide employee access to all data obtained by electronic monitoring  Employees have the right to a grievance procedure to dispute inaccurate or misleading data

 Employers are prohibited from using electronic monitoring to obtain data that is not relevant to work performance  Areas subject to monitoring are restricted and cannot include rest rooms, locker rooms and lounges  All data collected is to be of limited use and cannot be used for an employee evaluation or to introduce disciplinary actions against an employee  Employers are prohibited from disclosing personal data without prior employee consent

 “Don’t do anything you don’t want monitored.”

 Workplace Fairness [18]Affiliated with the National Employment Lawyers Association,  American Civil Liberties Union 125 Broad Street, 18th Floor New York, NY (212) Publications Ordering: ACLU (2258) Web:

 National Work Rights Institute 166 Wall St. Princeton, NJ (609) Web:  9 to 5, the National Association of Working Women 207 East Buffalo St., #211 Milwaukee, WI (414) Hotline (800) Web:

 Workplace Fairness "Surveillance at Work" nce nce  National Workrights Institute “Video Voyeurism: Employer Video Monitoring of Bathrooms and Locker Rooms” /em_videomonitoring.html /em_videomonitoring.html  National Labor Relations Board Advice Memorandum RE: ABC, Case 31-CA Memos/1997/p051297_abc.htm 20Memos/1997/p051297_abc.htm