By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

HIPAA Privacy Practices. Notice A copy of the current DMH Notice must be posted at each service site where persons seeking DMH services will be able to.
Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Exercise Science The Legal & Professional Responsibilities of Personal Trainers.
Corrective Actions.
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
1 The University of Texas at Tyler Protecting the Confidentiality of Social Security Numbers UTS165 Information Resources Use and Security Policy.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Little brother is watching you
1 COPYRIGHT © 2007 West Legal Studies in Business, a part of The Thomson Corporation. Thomson, the Star logo, and West Legal Studies in Business are trademarks.
Hong Kong Privacy Code on Human Resource Management
Business Plug-In B7 Ethics.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
HUMAN RESOURCES ISSUES American University March 9-14, 2003.
EMPLOYMENT LAW CONSIDERATIONS JULY 13, 2004 Professor Susan Carle.
Chapter 14: Ethics, Justice and Fair Treatment at Work
© 2004 West Legal Studies in Business A Division of Thomson Learning 1 Chapter 33 Labor and Employment Law Chapter 33 Labor and Employment Law.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
INTERNET and CODE OF CONDUCT
Legal and Ethical Aspects of Personnel Management Advanced Marketing.
Plug – In B7 Closing Case Two Pg. 357 By Gabe Carlson
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
© 2004 by Prentice Hall Terrie Nolinske, Ph.D Respecting Employee Rights and Managing Discipline 14.
(Edited) WORKPLACE PRIVACY.
Veterinary Practice Law Quiz J EFFREY L. R OTH FEES & BURGESS, P.C. 213 Green Street Huntsville, Alabama Telephone  Facsimile
Privacy Law for Network Administrators Steven Penney Faculty of Law University of New Brunswick.
An Educational Computer Based Training Program CBTCBT.
Electronic Use Policies.   Social Media  Internet.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 39 Regulation of Employment Twomey Jennings Anderson’s Business.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 37 Regulation.
Chapter 40 Regulation of Employment Twomey, Business Law and the Regulatory Environment (14th Ed.)
Coding Compliance Plan July 12, Benefits of a compliance program  To demonstrate our commitment to honest and responsible conduct, decrease the.
Managing Risks Associated With Privacy Alison Baker- Senior Associate Hall & Wilcox 24 November
Investigating Rights and Responsibilities at work
Privacy BBA361 Business Ethics and Corporate Governance Lecture 4 Department of Business Administration Chapter 6, “Ethics and the Conduct of Business”,John.
Health Insurance Portability and Accountability Act of 1996 HIPAA Privacy Training for County Employees.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
Chapter 40 Labor and Employment Law. 2  What is the employment at will doctrine? When and why are exceptions made?  What federal statutes govern working.
©2001 West Legal Studies in Business. All Rights Reserved. 1 Chapter 21: Employment Relationships.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch The Legal Environment of Business A Critical Thinking.
Is monitoring employee’s internet usage moral? By: Brittany Tindall and Hannah Tyson.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Employment Regulation and Labor Law.
Chapter 39 THIRD PERSONS IN AGENCY. 2 The relationship of employer and employee is created by the agreement of the parties and is subject to contract.
FACULTY DIRECTOR TRAINING OFFICE OF EDUCATION ABROAD 1 Legal Issues and Education Abroad.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 9 Ethics and Information Technology Understanding Business Ethics Stanwick.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Data Protection: Workplace, Health and Safety. Employers’ responsibilities Employer obliged to provide safe place of work. Health and Safety Act 2004.
James Fox Shane Stuart Danny Deselle Matt Baldwin Acceptable Use Policies.
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Presentation to the Local Authorities Revenue Management Association – October 2012 The role of the Office of the Information Commissioner.
Comprehensive Volume, 18 th Edition Chapter 41: Regulation of Employment.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Data protection—training materials [Name and details of speaker]
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Monique Jefferson & Nadine Mather
Privacy and the Law.
Surveillance around the world
Chapter 20: Employment Relationships
EMPLOYMENT LAW.
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Chapter 17: Employment Relationships
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
General Data Protection Regulation (GDPR)
Privacy in the workplace
Presentation transcript:

By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

Web WatcherSpector ProSpy AgentPc Pandora

Key Stroke Monitoring Time Stamped Internet Connection HTTP, FTP, SMTP, POP3, TCP/UDP, IP, & Messaging. Application Monitoring

Remote Surveillance More restrictive Forwarding Interception of Messages SMTP, POP3 Filter/Block Content Remote freeze/lock up

Based on an American Management Association survey 75% of companies monitor website surfing. 50 % retain and review s 30% track keystrokes 80% of employers disclose their monitoring policies to their employees.

In 1990 an employee (Lori Eaton) of Nissan was conducting a training session demonstrating the use of their system. Lori Eaton randomly selected an to show how it worked, and the that was viewed was of an employee named Burke. This contained personal, sexual nature dialogue and not business related. Eaton Reported the Incident to her supervisor who then with managements authorization reviewed the messages for the entire workgroup. Nissan found a substantial amount of s that contained many sexual messages between Bourke and Hall.

Nissan issued warnings for use of it’s computer systems for personal use. Bourke was eventually fired and sued Nissan Corporation on the following grounds: – Common Law Invasion of Privacy – Violation of Constitutional Right to Privacy – Violation of Criminal wiretapping and eavesdropping statutes – Wrongful Discharge in violation of public policy

The court ruled in favor of Nissan Motor Corporation based on two grounds: – Based on the undisputed facts, plaintiffs had no reasonable expectations to privacy in their messages being sent on the company’s network and computers. – Plaintiffs failed to submit a separate statement meeting the requirements of Code of Civil Procedure section 437c.

Coverage for both public and private sector employees. That employees should have notice of data collection processes. That data should be collected and used lawfully and fairly. That employers should collect the minimum necessary data required for employment. That data should only be collected from the employee, absent consent. That data should only be used for reasons directly relevant to employment, and only for the purposes for which the data were originally collected. That data should be held securely. That workers should have access to data. That data should not be transferred to third parties absent consent or to comply with a legal requirement. That workers cannot waive their privacy rights. That medical data is confidential. That certain data, such as sex life and political and religious beliefs, should not be collected. That certain collection techniques, such as polygraph testing, should be prohibited.

High stress levels Low employee morale Depression Other nervous disorders Loss of trust Low productivity More sick days Low self respect -These problems lead to loss of revenue and efficiency in the workplace

Economic Loss Employees being denied the right to conduct a few personal matters at work often leave early to take care of them Managers and supervisors that spend more time monitoring employees are cutting back on their own efficiency and productivity Less time working means less revenue

"Employees are autonomous moral agents. Among other things, that means they have independent moral status defined by some set of rights, not the least of which is the right NOT to be used by others only as a means to increase overall welfare or profits. If a boss were to monitor every conversation or move, most of us would think of such an environment as more like a prison than a humane workplace.” SCU professor of philosophy Michael J. Meyer on privacy

Professor William Parent- points for determining whether an invasion of privacy is justifiable 1. For what purpose is the undocumented personal knowledge sought? 2. Is this purpose a legitimate and important one? 3. Is the knowledge sought through invasion of privacy relevant to its justifying purpose? 4. Is invasion of privacy the only or the least offensive means of obtaining the knowledge? 5. What restrictions or procedural restraints have been placed on the privacy-invading techniques? 6. How will the personal knowledge be protected once it has been acquired?

News report: Workplace Privacy