Monitoring Employees Email, Social Media, Phones, & GPS Tracking GROUP 4 Peter Rankin, Kayla Roache, Derrick Fulton, Pam Goulais Janet Lavoie, Eric Annala,

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Sexual Harassment in the Workplace Excerpted from Effective Human Relations by Reece and Brandt.
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
The right to privacy: should people have complete privacy, or should the state be able to investigate their private communication, or their employers?
HISD Becoming #GreatAllOver. How many hours per day does the average child between the ages of 8 and 18 spend with media and technology? (this includes.
Workplace Bullying and Harassment Training and Legal Duties [Insert Presenter Name] [Company Name] [Date]
Presentation Brought to you by: New Thinking. Are your Managers at Risk ? Are Fleet costs to high ?
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Social Context of Computing Chapter 7. Digital Divide  Technological inequalities  Impact of communication technologies  Radio  Television  Press.
Consumer Issues Chapter 28.
Social Media in the Physician Practice Setting. Objectives 1. Review the types of social media available for communication with patients. 2. Explain the.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Electronic employee monitoring
Mobile Resource Manager v2. Core Pillars  Engine - High fuel costs, vehicle maintenance  Productivity - Customers expect increasing levels of service.
Things To Consider  If you were an employer would you condone the use of personal electronics?  Would screening s that come through the work.
Little brother is watching you
Privacy and Sensor Networks: Do Sensor Networks fit with Fair Information Practices Deirdre K. Mulligan Acting Clinical Professor of Law Director, Samuelson.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Kusserow: “The Government Needs Comp Matching …” Published in the same journal as Shattuck. Comp matching ensures taxpayers’ money is safeguarded without.
Functional areas Retail Business.
Understand your role 1 Standard.
Chapter 14: Ethics, Justice and Fair Treatment at Work
Business and Society: Ethics and Stakeholder Management, 5E Carroll & Buchholtz Copyright ©2003 by South-Western, a division of Thomson Learning. All.
Unit 1, Chapter 3. Ethics – are the rules that help us tell the difference between right and wrong and encourage us to do the right thing. Ethical Behaviour.
WORKPLACE BULLYING & HARASSMENT TRAINING PRESENTATION 1 BENEFITS As workplace bullying, harassment and violence have become more common, the OHS laws have.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
1 CHCOHS312A Follow safety procedures for direct care work.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
Higher Administration
Employee Monitoring Con: Carmine Fieo Con: Samuel Heitzer Con: Robert Sagel Pro: Christina Hallock Pro: Tahmid Rashid Pro: Tynisha Snellbaker.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
BY: CHELSEA KUCERA ELED 318 The Legal, Social and Ethical Issues in Technology for the Classroom.
Occupational Health & Safety
Information Management 12-1 Chapter 12. Learning Objectives Describe the purpose of data collection and reporting. Identify the data that should be collected.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Chloe Miles IMPROVING PRODUCTIVITY USING IT. Menu Using Word Advantages Disadvantages Conclusion E-Safety Social Media Dangers of Social Media Sites Staying.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
The Advantages And Disadvantages Of Monitoring At Work
Monitoring Employees on Networks: Unethical or Good Business?
VA Academic Affiliation Conference July 13, 2010.
Presented by Beang Tong ENGL393, Spring’03
1 User Policy (slides from Michael Ee and Julia Gideon)
ETHICS and COMPUTERS An Overview 23/04/2017.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
Information Management Chapter 12. Learning Objectives Describe the purpose of data collection and reporting. Identify the data that should be collected.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
MODULE 17 COMMUNICATION “Listening can be the key to understanding” What is communication and when is it effective? How can we improve communication with.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
Monitoring Employees on Networks
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Lecture 3 Ethics in the Workplace Privacy and Social Networks.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
An Overview of Legislation and Board Policy. Federal Legislation (CIPA, COPPA) WCPSS Board of Education ◦ Policy 2313, 3013, and 4013 Federally Mandated.
Implementation of legislation (Chapter 47) By Haley Court.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Training those in the workplace 100% Funded by Department of Education & Skills Contact: Allison Bracken Mobile: Skills For Work.
THE OFFICE OF THE LEGAL SERVICES COMMISSIONER The Ethics of Cloud Computing Community Legal Centres 21 May 2013.
HR: Leading People, Leading Organizations © 2006 SHRM SHRM Weekly Online Survey: September 29, 2006 Workplace Privacy Sample comprised of 442 randomly.
BCOM 5 7 Communicating Electronically LEHMAN/ DUFRENE
Data Protection Act and Other Laws
10 MISTAKES EMPLOYEES MAKE AT WORK
Chapter 11 Career Development Services for Clients with Disabilities
How would you define media? Give an example
Laws Relating to Employment Conditions & Benefits
Presentation transcript:

Monitoring Employees , Social Media, Phones, & GPS Tracking GROUP 4 Peter Rankin, Kayla Roache, Derrick Fulton, Pam Goulais Janet Lavoie, Eric Annala, Tiffany Falconer

PROS OF MONITORING S Can create a paper trail of any type of work place harassment or cyberbullying. (Schulman, 2014) It helps to control hostile and harassing communications and encourages a safe and professional work environment. (Joseph, n.d.) Increases employee productivity. (Padilla, 2005) Security protects confidential information. (Padilla, 2005) Increases in network performance. (Padilla, 2005) Aids in regulatory compliance. (Padilla, 2005)

CONS OF MONITORING S It creates a lack of trust among employees. (Joseph, n.d.) Employees feel a sense of intrusion and lack of freedom resulting in a decrease in morale. (Joseph, n.d.) Monitoring is expensive and may divert funds from other revenue generating endeavours. (Joseph, n.d.) Can create storage and retention issues. (Padilla, 2005) Can decrease network/computer performance. (Padilla, 2005)

ADDITIONAL INFORMATION According to an American Management Association study, over half of responding businesses monitor . Over one quarter of those companies had fired someone due to misuse. (Guerin, D, n.d.)

PROS OF MONITORING SOCIAL MEDIA Encouraging the use of social media among workers can increase their collaboration and make more effective work relationships within the organization. (Falls, 2014) If an employer does check into social media profiles they may be able to see, and mitigate any issues or things being said online that could be potentially damaging to the company's reputation.

CONS OF MONITORING SOCIAL MEDIA Employees may put information on social media that they feel is hidden but the public is able to access it. (Kwasniewski, 2011)

ADDITIONAL SOCIAL MEDIA INFORMATION On Oct 19, 2014 the Supreme Court of Canada said that workplace computers contain so much personal information nowadays that employees have a legitimate expectation of privacy in using them. Employers can monitor their employees but employees have to know it is going on and can only do so if they have reasonable cause. (Makin, 2012)

PROS OF MONITORING PHONES Employees being monitored may benefit in the sense that monitoring can provide immediate feedback, keep the workforce efficient and focused and discourage unethical and illegal behaviour. (Ciocchetti, 2010) Monitoring of company telephone communications can be clearly outlined in company policy which may prevent major legal problems. (Ciocchetti, 2010) American laws allow employers to listen to a phone conversation until they recognize that it is personal, at which time they must cease and desist. (Ciocchetti, 2010)

CONS OF MONITORING PHONES Grants the ability to blanket the workplace and hear everything, this type of monitoring is unable to determine when a conversation is personal and disconnect the recording. (Ciocchetti, 2010) Employers can monitor every detail of their employees' actions, communications and whereabouts in and out of the workplace. These invasive practices can lead to sneaking around, lower morale, cause complaints, lead to employees quitting, and even lead to fear of using company equipment for work purposes. (Ciocchetti, 2010)

PROS OF TRACKING WITH GPS An organization can know where the employees are at all times. (Businessknowledgesource.com, n.d.) Very affordable now through phones or fleet management systems. (Businessknowledgesource.com, n.d.) A safety feature because you can see if they have gotten stranded, especially in poor weather conditions. (Businessknowledgesource.com, n.d.) Information is easily accessed by phone or computer. (Businessknowledgesource.com, n.d.) Ability to give accurate estimates on delivery times while they are en route. (Businessknowledgesource.com, n.d.)

CONS OF TRACKING WITH GPS Employees can feel like it's an invasion of privacy. (Businessknowledgesource.com, n.d.) Employees feel as if the organization doesn't trust them. (Businessknowledgesource.com, n.d.)

REFERENCE LIST Businessknowledgesource.com (n.d.) Equipping company vehicles with GPS, pros and cons. Retrieved from Ciocchetti, C.A. (2010). The eavesdropping employer: a twenty-first century framework for employee monitoring. Retrieved from Falls, R. (2014, January 14). The benefits of social media networking at work. Retireved from work/ Guerin, L., D, J. (n.d.). monitoring: can your employer read your messages? Retrieved from employer-read html Joseph, C. (n.d.). What are the pros & cons of monitoring? Retrieved from Kwasniewski, B.W. (2011, March 30). Social media: an emerging issue in the workplace. Retrieved from Makin, K. (2012, October 19). Supreme Court rules employees have right to privacy on work computers. Retrieved from Padilla, R., Jr. (2005, September 11). and web use monitoring: good or bad? Tech Decision Maker. Retrieved from Schulman, M. (2014). Little brother is watching you. Retrieved from