Unit 3: Work and the Workplace Presented By: Ryan Akers, Christopher Hulen, Jonathon Rhoad, Troy McLaughlin, Kristen Vogan, and Katy Crouch.

Slides:



Advertisements
Similar presentations
Securing your Social Networking Profile Presented by: Kevin O'Brien Division of IT SF State.
Advertisements

Missey Jackson, CPP Payroll Director Parallon/HCA.
Hidden Risks of Using Facebook, MySpace, and Other Websites to Scope Out New and Prospective Hires Anthony J. Zaller, Esq. Van Vleck Turner & Zaller Website:
Career Networking: Utilizing LinkedIn and Other Social Media Tools Brian White, College Relations Manager, Payless ShoeSource Sara Clayton, Assistant Director,
July, 2004 Computer Jobs & the FLSA. The Fair Labor Standards Act  Regulations first passed in 1938, and recently revised, were written to provide employees.
COMP 2903 A12 – How Deep Can You Probe? Danny Silver JSOCS, Acadia University.
Security, Privacy, and Ethics Online Computer Crimes.
Emerging Trends in the Technology Job Market.  According to a recent Bureau of Labor Statistics study, eight of the 10 fastest- growing jobs are computer-related.
Chapter 14: Ethics, Justice and Fair Treatment at Work
Interviewing – Guidance on Appropriate Questions Reviewed April 2013.
Chapter 15 Information Technology Careers.
Certify skills through Microsoft ® Office Specialist Microsoft Office Specialist 2010 represents an exciting opportunity for students to become.
By Olivia Neadle.. Key words: Right – a right is something that you are entitled to, for example: a lunch break. Responsibility – a responsibility is.
Marketing BY: CHEREESE LANGLEY. Nature of work Formulate, direct and coordinate marketing activities and policies to promote products and services, working.
LINKEDIN How to become professionally Linked Career Services Office Salisbury University.
Jobs for Montana's Graduates B11L1PP1. Importance of a Job Application  This summer Sam is applying for his first job. He wants to earn money to purchase.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
Read to Learn How to prepare for and complete a job application How to write an effective résumé and cover letter.
Chapter 21.1: Employment Conditions & Benefit Laws Section 21.1 Health & Safety Fair Wages & Benefits Privacy.
© Paradigm Publishing Inc Chapter 15 Information Technology Careers.
Automation for Human Resources in the K-12 Education space.
Computers Are Your Future Tenth Edition Chapter 10: Careers & Certification Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
SEARCHING FOR A JOB CCM Mission Station F.I.T. Program 2015.
ENG 412 Professional English The Job Search. 2 Chronological (arranged around dates) Functional (arranged around skills) Combination 1. You are putting.
GOALS BUSINESS MATH© Thomson/South-WesternLesson 10.1Slide Employee Recruitment Costs Calculate the cost of employment advertising Calculate the.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Hospitality Operations Objective 4.02 – Human Resources.
Certify skills through Microsoft ® Office Specialist Microsoft Office Specialist 2010 represents an exciting opportunity for individuals to increase.
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
CS 306 Unit 3 Work and The Workplace. CS 306 A guest worker program that provides seasonal and hard-to-find-labor is in the news. What are the pros and.
© Family Economics & Financial Education – Revised April 2008 – Career Unit – Job Application Funded by a grant from Take Charge America, Inc. to the Norton.
National Association of Colleges and Employers Legal Issues of Social Networking Jeffrey S. Stewart, Esq.
Hospitality Operations Objective 4.02 – Human Resources.
White waitress needed, salary $60 per wk plus tips. Contact Mr. Charlie of Connor’s Restaurant 2659 North Broadway.
Establishing Solid HR Practices Presented by Dina Walton HR Director at Lotus School for Excellence.
Department of Accounting and Information Systems Ernst & Young Seminar in Professional Leadership Community College Outreach.
HELP WANTED? Job prospects for CS Compensation (show me the money) Career networking.
Chapter 6 FINDING AND APPLYING FOR A CAREER. USING TECHNOLOGY AT WORK Information Technology (IT) refers to the creation and installation of computer.
00870B2F.0/Internet%20Safety.jpg.
Digital Citizenship Project By Lacy Brown. Netiquette Netiquette is etiquette for the internet. Netiquette is etiquette for the internet. You should be.
Looking for a job is not a “One Time Thing” On average, workers will change jobs about seven times during their careers. Nearly 80% of all jobs require.
SHRM Survey Findings: The Use of Social Networking Websites and Online Search Engines In Screening Job Candidates ©SHRM 2011 August 25, 2011 SHRM Survey.
 Unflattering information drifting around the Internet  Information you posted  Information someone else posted.
Should employers have access to your social feeds?
Staff induction at AOI Institute. An induction programme is an important process for bringing staff into an organisation. It provides an introduction.
Steve Smalley 5/21/12 Hour 4.  Design and develop software  Use computer science and mathematics to test and evaluate software applications  Design.
1 Copyright © 2010 Pearson Education, Inc. Publishing as Prentice Hall.
INTERNET SAFETY.
CHAPTER 6 Selecting Employees and Placing Them in Jobs
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 EMPLOYMENT, WORKER PROTECTION, AND IMMIGRATION LAWS © 2010 Pearson Education, Inc., publishing.
CS 306 Unit 3 Work and The Workplace. CS 306 A guest worker program that provides seasonal and hard-to-find-labor is in the news. What are the pros and.
HELP WANTED? Job prospects for CS Compensation (show me the money) Career networking.
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
© BLR ® —Business & Legal Resources 1501 Essential HR For Those Who Have Recently Assumed HR Responsibilities.
Avoiding (Un)Intentional Discrimination When Recruiting via Social Media Stephanie R. Thomas, Ph.D. Thomas Econometrics
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
Garrett County Chamber HR Round Table April 6, 2016.
COMP 2903 A9 – National ID: Biometrics Pinned to Social Secuiry Cards Danny Silver JSOCS, Acadia University.
Chapter 15 Information Technology Careers.
Human Aspects of Organizing Reading: pp. 173 – 183.
Agency – Unions – FLSA.
EMPLOYMENT LAW.
Chapter 5 Workers and The Law Chapter 5.2.
Human Resources Functions
INFS 452 – Computer Ethics & Society
Social Media in Careers
IT and Society Week 2: Privacy.
Agency – Unions – FLSA.
Presentation transcript:

Unit 3: Work and the Workplace Presented By: Ryan Akers, Christopher Hulen, Jonathon Rhoad, Troy McLaughlin, Kristen Vogan, and Katy Crouch

Methods employers gather information on the web : Google or Yahoo Facebook or MySpace Online Databases Survey Results : By (SHRM) Society for Human Resource Management Nearly half of HR professionals run candidate’s names through a search engine before making an offer. 15% check social networking sites of candidates. 40% of those who don’t go to those sites now, are “somewhat likely” to “very likely” to visit in the next 12 months. HOW DEEP CAN YOU PROBE?

Potential Risks : Violating the FCRA (Fair Credit Reporting Act) it requires employers to get consent before getting a background check Discrimination claims Being suspected of rejecting a candidate based on race, religion, or marital status Some states protect candidates by limiting the extent employers can consider off-duty conduct. Violating networking sites terms of usage Some online information just isn’t true

HOW DEEP CAN YOU PROBE? Online Databases : (Do-it-yourself screeners) Many databases rely on incomplete data sources or on information that is out of date Some don’t provide a distinction between arrest records and convictions. Continuing Developments : Some system designers are partnering with screening companies to ensure data flows smoothly from an HR department to the screening company. Some data brokers are marketing all-in-one applicant tracking and background checking systems.

QUESTIONS 1. What percent of HR professionals check social networking sites of candidates? A. 30%B. 15% C. 50% B. 15% 2. Many online databases rely on complete data sources and up-to-date information. True or False? False

National ID Biometrics Pinned to Social Security Cards

Congress is lobbying for RFID chips to be placed in Social Security Cards – Will allow employers to check their applicants’ citizenship by a simple scan Possible biometrics for the card: – Photo – Fingerprint – Iris Scan National ID

Many problems with this idea: – Many children’s parents apply for SS card before they are old enough for a decent finger print – Would have to think of new way to send the cards – Many immigrants work jobs where the employer wouldn’t have the equipment to scan the card – Employers already have a range of documents they can accept to prove citizenship – Government data bases do occasionally have flaws This could keep someone from getting hired through no fault of their own National ID

Strive Act – There are 17.8 million records in the government’s employee databases that contain inaccuracies. – Allows an applicant to correct any errors if their file comes up “ineligible for employment” National ID

T/F: Congress is proposing biometrics in our SS cards as a form of Immigration Regulation – True A possible biometric for the card is: – A) Photo – B) Fingerprint – C) Iris Scan – D) All of the above D) All of the above Questions

Computer Software Engineers

Computer Software Engineers are projected to be one of the fastest growing occupations over the next 5 years. Very good opportunities are expected for college graduates with at least a bachelor’s degree in computer engineering or computer science with practical work experience.

Computer software engineers must continually strive to acquire new skills in conjunction with the rapid changes that are occurring in computer technology. Average annual earnings of a computer software engineer $46,520 – $113,830

Questions What was the average earnings of a computer software engineer? A.Up to $1,000,000 B.$50,000 - $75,000 C.$46,520 - $113, 830 Answer: C T/F: Once a computer software engineer is finished with their education, there is no need for new skills to be acquired. Answer: False

Dilberts of the World, Unite White Collar Uprising in the US

White Collar Workers Between 1977 and 2004 the number of professional and high-skilled US workers more than doubled. Microsoft had white collar employees that were called “Permatemps.” Basically this classification means employers don’t have to pay regular benefits.

Government and High Tech Companies Overtime In 1997 the Seattle Times published a front page story about how Microsoft used its connections in state government to secure a regulatory change exempting high-tech companies from paying overtime. Permatemps The Times also noted that the local labor movement hung the permatemps out to dry. Two unions supported the rule change after it was revised to make sure their members were protected.

Questions “Permatemps” get paid overtime in Seattle? True False ______ used its connections to secure a regulatory overtime pay change in Seattle? A. Apple B. Dell C. Toshiba D.Ford

Privacy, Legislation, and Surveillance Software Protecting the corporation while respecting employee privacy-an old puzzle made more complex with new software.

Using Company Time Productively Employer’s want to make sure their employees are using company time productively and not creating a legal liability for their business as a result of harassing or offensive communications. According to the annual survey conducted by the American Management Association, more than three-quarters of all major US firms record their employees while they are at work.

Work Place Privacy Workplace monitoring has existed for a long time in one form or another and will undoubtedly continue to proliferate and become increasingly sophisticated as technology advances. A recent study revealed that 10% of U.S. companies have received subpoenas resulting from employee .

Questions Companies monitor their employee’s s even if they are not work related? True False According the annual survey conducted by the American Management Association more than _____ all major US firms record their employees while at work? A. One-quarter B One-half C. Three-quarters D. 100%