Plug – In B7 Closing Case Two Pg. 357 By Gabe Carlson

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

A Legal and Practical Primer on Development & Maintenance of Social Media Policies and Related Issues Richard I. Greenberg Jackson Lewis LLP 666 Third.
BUSINESS B2 Ethics.
EMPLOYER CYBER LIABILITY A Presentation by Joseph P. Paranac, Jr., Esq. LeClairRyan.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Things To Consider  If you were an employer would you condone the use of personal electronics?  Would screening s that come through the work.
Little brother is watching you
Social Media – Why Should You Care? Carlos S. Arévalo Zukowski, Rogers, Flood & McArdle 50 Virginia St. Crystal Lake, IL /
980 9 th Street, Suite 2300 Sacramento, California Telephone: Facsimile: Montgomery Street, Suite 788 San Francisco,
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
Employees and the Corporation The Employment Relationship Workplace Rights Privacy in the Workplace Whistle-Blowing and Free Speech in the Workplace Working.
Business Plug-In B7 Ethics.
S A B D C T = 0 S gets message from above and sends messages to A, C and D S.
Chapter 14: Ethics, Justice and Fair Treatment at Work
INTERNET and CODE OF CONDUCT
4/00/ © 2000 Business & Legal Reports, Inc. BLR’s Human Resources Training Presentations Progressive Steps of Discipline.
Social Media Policies Doug MacLeod Labour & Employment Lawyer MacLeod Law Firm.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
Who do I belong to? Webpages EduphoriaFirstClassBlackboardEdusoft District program that allows staff development registration, lesson plans, helpdesk.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
(Edited) WORKPLACE PRIVACY.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
© 2003 SHRM SHRM Weekly Online Poll: March 9, 2004 QOTW - Identity Theft Analyzing 340 responses of s sent, 1628 received (response rate = 20.9%).
Chapter 6 Acceptable-Use Policies: Human Defenses Trevor Norsworthy Christina Richardson.
Electronic Use Policies.   Social Media  Internet.
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
AtomPark Software is founded in The head office is located in Saint-Petersburg, Russia. Company is officially registered in the United States. AtomPark.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
E&O/D&O COVERAGES AND TRENDS WEBB HUBBELL,CRM,CWCA VICE-PRESIDENT AND COUNSEL THE MCLAUGHLIN COMPANY WASHINGTON,DC
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
00870B2F.0/Internet%20Safety.jpg.
HIPAA Training Developed for Ridgeview Institute 2012 Hospital Wide Orientation.
Social Media. Monitoring your usage Employers have a right to monitor their computing system usage: – – Phone – Internet usage – Accessing social.
Safe Access File Exchange (SAFE). Safe Access File Exchange  The SAFEFTP application seeks to provide a means to distribute UNCLASSIFIED files as an.
Cindy Sierra Gloria Advantages Employers want to be sure that no correspondence is being sent that may have an adverse effect on their company. Monitoring.
VA Academic Affiliation Conference July 13, 2010.
Acceptable Use Policy by Andrew Breen. What is an Acceptable Use Policy? According to Wikipedia: a set of rules applied by many transit networks which.
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
©2001 West Legal Studies in Business. All Rights Reserved. 1 Chapter 21: Employment Relationships.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Is monitoring employee’s internet usage moral? By: Brittany Tindall and Hannah Tyson.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Chapter 1.  Laws regulating the employment relationship  Evolutionary in nature  Importance of understanding employment law.
December 25, 2015 Copyright © 2010 WeComply, Inc. All rights reserved. Appropriate Internet Use Note to Trainer.
Technology and the Law R. Keith Booker, Ed.S Memphis East High School.
INTERNET SAFETY.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Monitoring Employees on Networks
© 2008 by Prentice Hall13-1 Human Resource Management Chapter 13 INTERNAL EMPLOYEE RELATIONS.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
In a Digital World.  Statutes and Regulations  Monitoring by Employers  Discovery.
Lesson 2: Workplace Digital Communication
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Case Study Kim Siebott Lynn Yip. Key Terms Drug Test: a test administered to determine the presence of drugs in someone’s body. Drug Policy: the policy.
Taylor County Schools FERPA (Confidentiality) Training August 17, 2010.
Dial-in Access Policy By Matt Lynott. Reasoning The reason for this policy is to define appropriate dial-in access and its use by authorized personnel.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
To spy or not to spy; that is the question
HIPAA Online Student Orientation
Internet Safety & Acceptable Use Standards
Internet Safety and Acceptable Use Policies.
Business Ethics Ethics are rules of behavior based on a group’s ideas about what is right and wrong Business ethics are principles that help define appropriate.
Presentation transcript:

Plug – In B7 Closing Case Two Pg. 357 By Gabe Carlson Invading Your privacy Plug – In B7 Closing Case Two Pg. 357 By Gabe Carlson

Invading Your Privacy Smyth versus Pillsbury Company Bourke versus Nissan Motor Corporation McLaren versus Microsoft Corporation

Smyth versus Pillsbury Company Terminated for sending inappropriate and unprofessional emails Smyth sued for wrongful discharge and invasion of privacy Case dismissed because the message was voluntary communicated

Bourke versus Nissan Motor Corporation Inappropriate personal emails throughout Bourke’s workgroup Disciplined employees sued for invasion of privacy Court ruled against the plaintiffs

McLaren versus Microsoft Corporation Password protected folder Dismissed because the email was being sent over the company network Fired for excessive chatting Court denied dismissal attempt by the company Employees were never informed of the monitoring

Case Questions Pick one of the above cases and create an argument on behalf of the employee. - Email is confidential and would not be used for a basis of discipline or discharge. Pick one of the above cases and create an argument on against the employee. - They violated company policy and should be disciplined.

Case Questions (cont.) 3. Pick one of the above cases and create an argument on behalf of the employer’s use of monitoring technologies. - The employers owns the systems and is responsible for their employees work products. 4. Pick one of the above cases and create an argument on against the employer’s use of monitoring technologies. - Need to monitor everyone

Current Information "You check your privacy rights at the door when you enter the workplace.“ Connecticut requires employer disclosure http://www.privacyrights.org/ar/Privacy-IssuesList.htm

Questions?