By Tyler Daniels.  Privacy  - Employers monitoring employees every move  - Can get employees fired for doing things they didn’t know were being monitored.

Slides:



Advertisements
Similar presentations
IT: Communication and Impacts
Advertisements

Part I: Making Good Online Choices
Cyber security refers to the technologies and processes designed to protect computers, networks and data from unauthorized access and attacks delivered.
Internet Online Safety How to have FUN and Stay in Control.
MODULE TWO Ethical and Legal Issues. Objectives: Particpants will: Understand privacy, confidentiality and ethics as they relate to being a volunteer.
A Guide to Internet Safety High School
Technology in Education Issues we need to know. Social, Ethical, and Legal. By: Kara Bushey ECED 201.
M. Guymon Pleasant Grove High School Spring 2003 Ethics & Computer Technology Day 18.
Computer Technology Day 18
Little brother is watching you
Web Security A how to guide on Keeping your Website Safe. By: Robert Black.
GLOBE NY METRO Modified with permission from AMSTI-GLOBE ( HOW DOES GPS WORK??
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Teen Dating:.
Character & Honesty. HONESTY is telling the truth and being truthful. Honesty means you’re not lying or being dishonest about something. When you cheat.
E safety. Ads It’s always best to not click on ads when you see them, and it’s always a good idea to ignore them, but if there are too many you can always.
Data Security GCSE ICT.
Is it ethical? 'Bill' was caught on Street View Australia after he collapsed in a drunken stupor on his mother's lawn. He apparently had gone out drinking.
PC Support & Repair Chapter 10 Communication Skills.
Business and Labor Policies House Policies and Procedures/Contracts Unions Private Enterprise Equal Rights Employee Benefits Employee Rights and Responsibilities.
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
s By Mollie.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GPS Morgan walsh. The GPS satellite system GPS stands for “Global Positioning System” A GPS is a space-based satellite navigation system that provides.
Group: Anju, Ashok, Justin, Joe and Christina
Crimes of Negligence or Incompetence Presented By: Lisa R. Williams.
The Advantages And Disadvantages Of Monitoring At Work
By: Emma Barnett CELL PHONE GPS: SAFETY OR STALKING DEVICES?
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Internet Safety Helpful Tips to Stay Safe. I bet you didn’t know… 18% of 8- to 10-year-olds spend time on some kind of social networking site daily Kids'
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
1 CUSTOMER RELATIONS & BUSINESS PRACTICES EMPLOYEES EXPECTATIONS.
HOW THEY WORK A cell phone is basically like a A cell phone uses one frequency to talk and another to listen When you make call, When you talk the cell.
Emily Ansell 8K viruseshackingbackups next. Viruses A virus is harmful software that can be passed to different computers. A virus can delete and damage.
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
Front Page Title Name Introduction Appropriate Images The Legal Issues -Personal Data -Freedom of Information -Computer Crimes Ethical Issues -
Viruses For… What is a virus? A virus, affects your computer and damages its software. It can affect your computer, and some viruses can damage your.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Backups. What is a backup. A backup is when someone copies some data (like you may copy and paste your schoolwork!) and sends it to another workstation.
Keeping Records and Paying Taxes. Organizing Your Financial Records Financial records documents such as bank statements, motor vehicle titles, insurance.
Establishing Healthy Financial Habits Personal Finance.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
By Liam Wright Manga comic group Japan SAFETY on your computer.
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
Welcome to Parenting in the Digital Age. This session will: Help you to get to grips with what your children are doing online Explain the W-W-W- approach.
Revision Q1: Explain the term HACKING?
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Digital Citizenship By Lisa Brackett ED 505. Netiquette on Social Media Sites What is it? “Netiquette is the etiquette guidelines that govern behavior.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Richard Keaton was 17 when a police officer pulled him over on the morning of July 4, 2007, and wrote him a ticket for going 62 mph in a 45-mph zone. Keaton.
Live On Site Chat! Increase your ROI by getting more customers from your website traffic!
New York State Center of Excellence in Bioinformatics & Life Sciences R T U Discovery Seminar /UE 141 MMM – Spring 2008 Solving Crimes using Referent.
Designed By: Jennifer Gohn.  “Getting people to do things they wouldn’t ordinarily do for a stranger” –Kevin Mitnick  There are several different.
FIBER OPTIC INTERNET Tierzero has been serving businesses in Southern California since 1997.
My Digital Footprint. How Might Your Digital Foot Print Effect Your Future Opportunities Your Digital Foot Print is an interesting trail that you could.
8 THINGS PARENTS CAN DO TO PREVENT CYBER BULLYING Belhaven Middle School, Linwood NJ from the New Jersey Principals and Supervisors Association Cyber Safety.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
The Cost of Free Lesson 4-4.
Unit 7 – Organisational Systems Security
Societal Issues in Computing (COMP466)
General Data Protection Regulations
Network Security Best Practices
Follow safety rules so that YOU: Avoid getting HURT.
Follow safety rules so that YOU: Avoid getting HURT.
Presentation transcript:

By Tyler Daniels

 Privacy  - Employers monitoring employees every move  - Can get employees fired for doing things they didn’t know were being monitored  - Could monitor employees even when they are off the clock  o o

 Employee  Can be a good and bad relationship depending on the employee  A good employee will be fine because they are doing what they are suppose to do and could get the recognition they deserve for their hard work  A bad employee won’t like it because it will lead to them getting caught doing things they aren’t suppose to do

 CUIiE CUIiE  Most phones and cars now have built in GPS receivers in them  The receivers send up signals to the GPS satellites orbiting the earth  3 or more GPS satellites pick up the signal, and use Trilateration  The satellites send down a signal giving the location

 One receiver receives the signal, it uses the installed tracking software and sends it either to the business owners phone or , or it will send it to the software companies site where you can log on to and view the location history

Always a privacy concern when personal information is being collected Since the information can be sent to the software companies website, if that site gets hacked the hacker can have all sorts of personal information about the employees Also, if your employer loses his phone, the personal information can also be lost. Must rely on two people to hold sensitive information private and securely

 Company using technology  + Can monitor employees  + Can insure max productivity  + Can help give accurate directions to employees who are on the road and decrease their down time  - Not all employees would want to be tracked  - Could lead to negative tension in work place  - Could lead to legal trouble if they don’t tell employees they’re being tracked

 Employee  + Hard working, honest employees benefit  + Can increase productivity if they drive due to more accurate directions  + Could get proper recognition they deserve for their hard work  + Slacker employees get fired leading the way for better working partners  - Being tracked everywhere  - Hacker can easily get personal information if they get access to the software through website or employer phone  - Employer could find what places their employee likes to go and follow them there  - Employer can use it with them knowing

 Problem – Employer getting in legal trouble for using the tracking software without employee knowing.  Solution – Company should educate employee about the software before hiring  - Set guidelines and company rules about where they can go and when  - Have employee sign consent form saying they are allowing the company to track them  - Company should tell their employee why they are doing this

 This would work because the employee signed a consent form and knew that they would be tracked  It would also avoid any tense and/or awkward situations if the employee found out by themselves or from someone other than the employer

 This software is greatly beneficial to a business owner and can be a great thing as long as it is used with good intentions and all information kept secure