1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.

Slides:



Advertisements
Similar presentations
November 19, Employment and Recruitment 2. Non-Discrimination Notice 3. Sexual Harassment 4. Criminal Background Check 5. Child Abuse and Neglect.
Advertisements

Rockingham County Public Schools Technology Acceptable Use Policy
MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
Northside I.S.D. Acceptable Use Policy
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Pirated Software: A Global Epidemic Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque, NM.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Copyright Atomic Dog Publishing, /18 Social Responsibility and Management Ethics Chapter 3.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
1 The Broader Picture Chapter 12 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall.
Hospitals & Social Media. Laws Implicated Federal Trade Commission –Disclosure of employment status –False or misleading statements State & Federal Wiretap.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Chapter 14: Ethics, Justice and Fair Treatment at Work
INTERNET and CODE OF CONDUCT
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Preventing Workplace Harassment Training Nilka Smith University of Phoenix Online EDTC 560 – Internet & Distance Education Delivery Janet Wright - Facilitator.
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
Plug – In B7 Closing Case Two Pg. 357 By Gabe Carlson
Case Study Chapter 8 Monitoring Employees on Networks: Unethical or Good Business? By Michele Schatz March 7, 2005.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
Inappropriate Work Behavior CTE 1-Career and Technology Exploration.
Sexual Harassment “The Issue is Respect”. Sexual harassment is a serious issue in the workplace. It has a negative impact on the victim, can result in.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Chapter 6 Acceptable-Use Policies: Human Defenses Trevor Norsworthy Christina Richardson.
Digital Citizenship Texting vs. Sexting Cyberbullying.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Cindy Sierra Gloria Advantages Employers want to be sure that no correspondence is being sent that may have an adverse effect on their company. Monitoring.
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Chapter 8 Ethics and Technology
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Chapter 3. What is Organizational Responsibility? Organizational responsibility refers to the responsibilities an organization has in order to have an.
Computer Issues Acceptable Use Policy Online Safety Photo Permission Forms Rachel Gorsuch Stephanie Herbin Natalie Wu Acceptable Use Policy Online Safety.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 9 Ethics and Information Technology Understanding Business Ethics Stanwick.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
CstM Management & Organization ethics. ethical behavior… eth·ics [eth-iks] -plural noun 1.the moral code of principles that sets standards of good.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
INTERNET SAFETY.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Woodland Hills School District Computer Network Acceptable Use Policy.
School Accounts Presented by: Mrs. Mazzola.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
CODE OF CONDUCT TRAINING We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Understanding the dangers of living online.  Personal networking (Facebook, MySpace, etc.)  Research information  Download music  Gaming  Instant.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Ogletree, Deakins, Nash, Smoak & Stewart PC
To spy or not to spy; that is the question
Business Ethics: Ethical Decision Making and Cases, Seventh Edition
The Broader Picture Laws Governing Hacking and Other Computer Crimes
Chapter 13 Security and Ethical Challenges.
Woodland Hills School District
Presentation transcript:

1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar and Cyberterror Hardening the Internet Against Attack

2 Figure 12-3: Employee Workplace Monitoring Monitoring Trends  American Management Association survey  monitoring use from 15% to 46% between 1997 and 2001  Internet connections in 2001: 63% monitored  In 2001, 76% had disciplined an employee; 31% had terminated an employee

3 Figure 12-3: Employee Workplace Monitoring Why Monitor?  Loss of productivity because of personal Internet and use Significant personal Internet and use is occurring Employees and companies generally agree that a small amount of personal use is acceptable Biggest concern is abnormally heavy personal use Some employees are addicted to personal use

4 Figure 12-3: Employee Workplace Monitoring Why Monitor?  Harassment Title VII of the Civil Rights Act of 1964: sexual and racial harassment Pornography, other adult content are fairly common Monitoring for keywords can reduce pornography and harassment and provide a legal defense

5 Figure 12-3: Employee Workplace Monitoring Why Monitor?  Viruses and other malware due to unauthorized software  Trade secrets: Both sending and receiving must be stopped  Commercially damaging communication behavior: Can harm reputation, generate lawsuits, and run afoul of stock manipulation laws

6 Figure 12-3: Employee Workplace Monitoring The Legal Basis for Monitoring  Electronic Privacy Communications Act of 1986 Allows reading of communications by service provider (firm) Allows reading if subject agrees (make condition of employment)  Employee has no right to privacy when using corporate computers

7 Figure 12-3: Employee Workplace Monitoring The Legal Basis for Monitoring  In United States, at-will employees can be disciplined, dismissed easily  Must not discriminate by selective monitoring  Unions often limit disciplining, agreement to be monitored  In multinational firms, stronger privacy and employment rules might exist

8 Figure 12-3: Employee Workplace Monitoring Should a Firm Monitor?  Danger of backlash  Are the negative consequences worth the gain?

9 Figure 12-3: Employee Workplace Monitoring Computer and Internet Use Policy Should Specify the Following  No expectation of privacy  Business use only  No unauthorized software  No pornography and harassment  Damaging communication behavior  Punishment for violating the policy Employee Training in Policy is Crucial