Is monitoring employee’s internet usage moral? By: Brittany Tindall and Hannah Tyson.

Slides:



Advertisements
Similar presentations
What your employees are doing on the Internet? How much time they spend on the Internet? How much unchecked Internet usage costs? If Internet misuse was.
Advertisements

BUSINESS B2 Ethics.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Ten Employment Law Issues for Small Businesses David M. Knasel, Esq. Dominion Business Law PLC Tysons Corner | Leesburg, VA
How do Employees Steal from their Employer??. An employee is sent to deliver a package to a customer. On the way, the employee picks up his cleaning.
Things To Consider  If you were an employer would you condone the use of personal electronics?  Would screening s that come through the work.
Little brother is watching you
AB Tele-Boom in Uppsala is looking for a person who should take care of the toilets at the company. President Folke and his old computer.
 IT pro’s work raises ethical issues involves privacy. Ex: Should company have right to monitoring employees’ ? Should company have right to log.
Business Plug-In B7 Ethics.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Plug – In B7 Closing Case Two Pg. 357 By Gabe Carlson
Hiring Manager/Supervisor Training Offer Letters.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
Inappropriate Work Behavior CTE 1-Career and Technology Exploration.
(Edited) WORKPLACE PRIVACY.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Nine Elements of Digital Citizenship BH. Nine elements is identified to create a digital citizenship. Digital Access: full electronic participation in.
Computers and the Internet. Key Information: Key Information: Even if you delete your mail, messages may remain on servers or backup devices for.
Chapter 6 Acceptable-Use Policies: Human Defenses Trevor Norsworthy Christina Richardson.
2/28/2011. Michael Moore  CIQ&safety_mode=true&persist_safety_mod e=1
Legislation Affecting Employment Section Understanding Business and Personal Law Legislation Affecting Employment Section 20.2 Employment Law What.
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
Learning Theories By: Jaime De Leon Jr EDTC 3320 Professor Matthew Crosslin.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Social Media. Monitoring your usage Employers have a right to monitor their computing system usage: – – Phone – Internet usage – Accessing social.
Cindy Sierra Gloria Advantages Employers want to be sure that no correspondence is being sent that may have an adverse effect on their company. Monitoring.
Monitoring Employees on Networks: Unethical or Good Business?
Presented by Beang Tong ENGL393, Spring’03
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
MIRMA SPRING TRAINING 2014 PRESENTED BY JANE DRUMMOND WHISTLEBLOWER PROTECTIONS EMPLOYMENT PRACTICS UPDATE.
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
Employment Essentials for Vocational Dental Practitioners May 2013 Derek Eccleston.
©2001 West Legal Studies in Business. All Rights Reserved. 1 Chapter 21: Employment Relationships.
 Internet Surveillance  Stakeholder: Employee  Relationship: Employers sees an employee online activity.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Privacy at Johnson and Dresser By: Anuj Ghai & Ubaid Khan.
Social Issues. Employment change Computer Ethics Privacy Piracy Computer Crime Computer Viruses Data Protection and security.
University Policy towards Privacy and Network Use Group Members: Serena Lam, Sarah Hong, Charlie Korschun, Zan Fort, Kristen France, and Jason Saltiel.
Unit 13: IT Trouble Shooting and Repair
H UMAN R ESOURCES AND Q UALITY W ORKFORCE. What is Human Resources? to facilitate the process of attracting, developing, maintaining, and retaining a.
Factors Affecting Human Resource Plans.  The most human resource plans can be affected by internal and external change, so forecasting and flexibility.
SHARE BASIC INFORMATION ON ERGONOMIC ISSUES
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
Privacy Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Document retention policy. The corporate records of Adams and Kitchener constitute vital information. Records include everything you produce as an employee,
Monitoring Employees on Networks
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Counterarguments & Responses UNIV 112 Fall A part of argument Counterarguments answer the question: What significant questions or positions different.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
Podcasting for CPE’s Messina, Morgan & Peracchi, LLP.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
HR: Leading People, Leading Organizations © 2006 SHRM SHRM Weekly Online Survey: September 29, 2006 Workplace Privacy Sample comprised of 442 randomly.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Alexander County Schools Review of Board of Education Policies Technology Responsible Use 3225/4312/7320 Internet Safety 3226/4205 Technology In The Educational.
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
Unit 1 Health and Safety in the Engineering Workplace
Computers: Tools for an Information Age
Risk Research Bulletin, September 2009
Internet law Business law.
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
How would you define media? Give an example
Big Brother Camera’s Brittany Todd.
COMPUTER USE AGREEMENTS
Presentation transcript:

Is monitoring employee’s internet usage moral? By: Brittany Tindall and Hannah Tyson

* Companies monitoring their employers accounts/messages is completely legal, because they are using the companies equipment during company time. * Most companies, have a contract in place that includes an /monitoring policy that says they are allowed to do so. * In 2002, The Sarbanes-Oxley Act was passed and requires companies to monitor usage.

* Monitoring employees accounts and internet usage is completely moral and justified, and the employer should not have to notify the employee. * The company hires the employee to work, not play around on the internet and friends and family and therefore should not be doing so anyway (notified or not).

* During work hours and on company time, personal use should not be allowed. * Not only does it distract from the actual work at hand, but can also eventually get the company in trouble if the employee is doing anything wrong/illegal. * Personal use should be done on personal time and a personal computer or device.

* Bourke v. Nissan Motor Corp * A Nissan employee sent an explicit while in the workplace and Nissan used it as an example in an employee training exercise. The employee claimed this to be an invasion of privacy. This claim, however, was rejected by the court who ruled that Nissan had the right to view the s. Nissan had also made an privacy policy, outlining that they would intercept and read s.