December 25, 2015 Copyright © 2010 WeComply, Inc. All rights reserved. Appropriate Internet Use Note to Trainer.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Woodland Hills School District Computer Network Acceptable Use Policy.
Objectives Describe behaviors indicative of bullying at work Explain the two types of harassment Establish a barometer for humor at work Identify the.
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
ERICK BECKER || || 949–852–1800 || Social Media in the Workplace: Guidelines for Employers May 27, 2014 Erick.
Copyright© 2010 WeComply, Inc. All rights reserved. 5/7/2015 Careful Communication.
Employee Handbook / Personnel Policies Doug Scott, Industrial Steel Treating Co.
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Copyright© 2010 WeComply, Inc. All rights reserved. 5/15/2015 Avoiding Insider Trading.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Boyertown Area School District Acceptable Use Policy.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
980 9 th Street, Suite 2300 Sacramento, California Telephone: Facsimile: Montgomery Street, Suite 788 San Francisco,
1 © 2008 Venable LLP Top 5 Technology Legal Traps for Associations Venable LLP August 24, :45 AM – 12:00 PM ASAE Annual Meeting Los Angeles, CA.
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Jeopardy The Sexual Harassment Edition. Definitions Rules, Regulations, Guidelines & Law What Next (or What’s Not Next)? Facts About Sexual Harassment.
VISD Acceptable Use Policy
KUSD Student Acceptable Use Policy School Board Policy #6633.
Internet Security PA Turnpike Commission. Internet Security Practices, rule #1: Be distrustful when using the Internet!
INTERNET and CODE OF CONDUCT
Social Media Policies Doug MacLeod Labour & Employment Lawyer MacLeod Law Firm.
August 15, 2015 Copyright © 2010 WeComply, Inc. All rights reserved. Ethics and Compliance Basics Note to Trainer.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
Copyright TurboPCI, Inc. All rights reserved. PCI Compliance Security Awareness Training 31 December 2011.
1 Blogs and Personal Web Pages: Legal Issues And Practical Advice Baker & Daniels LLP Webinar July 16, 2008 Audio
Frank Hagy, CIO 09 November © Florida League of Cities, Inc All rights reserved Professional Image The Organization’s Personal Legal Risks.
Copyright© 2011 WeComply, Inc. All rights reserved. 9/6/2015 Whistleblowing.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Using SWHS: The AUP [Acceptable Use Policy]
Electronic Use Policies.   Social Media  Internet.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
Copyright© 2010 WeComply, Inc. All rights reserved. 9/19/2015 Record Management.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Online Security By:. The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access.
00870B2F.0/Internet%20Safety.jpg.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Copyright© 2010 WeComply, Inc. All rights reserved. 10/13/2015 Information Security.
User Responsibility  1. To transmit or knowingly receive any materials in violation of United States, state, or local laws, or in violation of school.
Monitoring Employees on Networks: Unethical or Good Business?
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Professionalism/Customer Service in the Health Environment Communications and Professionalism This material Comp16_Unit9 was developed by The University.
October 20, 2015 Copyright © 2010 WeComply, Inc. All rights reserved. Questionable Interview Questions Note to Trainer.
Introduction to Computer Security PA Turnpike Commission.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Chapter 8 Ethics and Technology
Component 16- Professionalism/Customer Service in the Health Environment Unit 9- Personal Communications and Professionalism This material was developed.
Copyright© 2010 WeComply, Inc. All rights reserved. 11/12/2015 Conflicts of Interest.
BYOD: Bring Your Own Device
Digital Citizenship Eagle Ridge’s School Policy. Expectations for Students  Students are invited to use their personal devices as directed by their teacher.
Granbury I.S.D. Acceptable Use Policy for Technology Resources
SOCIAL MEDIA POLICY 2012 Rutherford County. What is Social Media? “Content created by individuals using accessible and scalable technologies through the.
January 9, 2016 Copyright © 2010 WeComply, Inc. All rights reserved. Code of Conduct Note to Trainer.
Woodland Hills School District Computer Network Acceptable Use Policy.
CODE OF CONDUCT TRAINING We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
YOU’RE IN BUSINESS YOUR PEOPLE ETHICS IN BUSINESS.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Ogletree, Deakins, Nash, Smoak & Stewart PC
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Appropriate Internet Use
Presentation transcript:

December 25, 2015 Copyright © 2010 WeComply, Inc. All rights reserved. Appropriate Internet Use Note to Trainer

December 25, 2015 Copyright © 2010 WeComply, Inc. All rights reserved. Appropriate Internet Use Introduction

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.2 Internet has revolutionized the way businesses and other organizations operate Appropriate Internet use is essential to our organization Inappropriate use can be extremely detrimental Workplace discrimination Copyright infringement Securities-law and antitrust violations Loss of trade secrets Computer viruses and bandwidth issues Overview

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.3 Electronic communications can create significant legal risks Messages may go out without deliberation/review that typed/proofread letter might receive Humor/sarcasm may be misinterpreted when committed to writing Use special care in all that you do with our e-communication systems Whatever you communicate electronically can be retrieved and traced back to you E-communications

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.4 In the news…

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.5 We reserve the right to monitor, access and disclose the e-communications and Internet activities of everyone who uses or accesses our system We may monitor — When data on your computer is needed, but you are unavailable When we suspect that someone is making unauthorized or improper use To determine if illegal material/unlicensed software is being stored or used In response to requests in legal or regulatory proceedings For resource-planning purposes Monitoring and Access

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.6 In the news…

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.7 Computer systems are to be used for carrying out our business needs Personal use that interferes with your work performance is prohibited and will be considered grounds for discipline You should have no expectations of privacy for any e-communication or Internet activities on our information systems Don't rely on deletion or erasure of e-communications as means of keeping them "private" in any respect Personal Use

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.8 We can now broadcast content through a vast array of Internet outlets Facebook, LinkedIn, MySpace Blogs, podcasts, YouTube Most social-networking activity occurs during business hours but not for business purposes Social-media use can lead to many types of business/legal issues Certain posts could expose both you and our organization to legal action Posts to social-networking sites can be used as evidence in lawsuits Social Networking

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.9 Limit your social-networking activity at work to personal or break time Never — Post negative or disparaging comments about our organization Speak for our organization Use our logo or other intellectual property Use our computer network for any prohibited communications Think before your post, tweet or click! Social Networking (cont’d)

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.10 Pop Quiz! Assuming that this is an employee’s personal blog, which of the following statements is the most accurate: A.Since this is not a company blog, the author’s entry cannot be the basis for any legal liability or adverse employment consequences. B.This entry could implicate the company in a violation of the Americans with Disabilities Act. C.This entry illustrates an employee’s conflict of interest. D.This entry could get the employee fired even though it doesn’t violate a specific law or company policy.

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.11 Inappropriate Communications We strictly prohibit — Sending anything that would violate discrimination and harassment laws Communicating in a way that would compromise confidentiality or violate any laws Soliciting for ventures unrelated to our business Transmitting any material you are not authorized to access Retaining messages that were misaddressed or sent inadvertently Sending communications that attempt to hide your identity

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.12 Pop Quiz! Which of the following statements is the most accurate: A.Because instant messages are generally not saved on the participants’ computers, they cannot be the basis for any legal liability. B.This exchange illustrates a violation of privacy by “Fam45” against “Page 16”. C.This entry could get “Fam45” fired even though it doesn’t violate a specific law or company policy. D.If “Page16” works with and reports to “Fam45”, this exchange is an example of quid pro quo sexual harassment by “Fam45”.

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.13 Prohibited Internet Use We also prohibit — Accessing pornographic sites Accessing information that you're not authorized to access "Hacking" into computer systems Excessive non-work-related use Downloading files without authorization Conducting job searches Anything that could incur liability for copyright infringement, defamation, insider trading, workplace discrimination, or other unlawful conduct

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.14 Passwords Memorize your passwords and change them periodically Don't write down or share your passwords with anyone You are responsible for all messages, files and other data created, edited or sent under your password Don't leave your computer or device unattended without password protection Notify the IT department promptly if your computer or device is lost or stolen Be on the lookout for social engineering

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.15 Passwords (cont’d) Memorize your passwords and change them periodically Don't write down or share your passwords with anyone You are responsible for all messages, files and other data created, edited or sent under your password Don't leave your computer or device unattended without password-protection Notify the IT department promptly if your computer or device is lost or stolen Be on the lookout for social engineering

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.16 Working remotely involves added responsibilities: To use our e-communications systems safely and securely Keep our organization in compliance with all applicable data-privacy laws These responsibilities apply at home, in the office or on the go All computers and handheld devices must be password-protected and approved by IT Department before you may use them for work Non-exempt employees must record all time spent on work-related matters, whether inside or outside the workplace Working Remotely

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.17 Working Remotely (cont’d) Working remotely involves added responsibilities: To use our e-communications systems safely and securely Keep our organization in compliance with all applicable data-privacy laws These responsibilities apply at home, in the office or on the go All computers and handheld devices must be password-protected and approved by IT Department before you may use them for work Non-exempt employees must record all time spent on work-related matters, whether inside or outside the workplace

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.18 Pop Quiz! While on a business trip, Zoe left her PDA in a cab. She called the cab company, but they did not have it. The device was password- protected, so she decided to wait until she returned to the office to report it. Was this okay? A.Yes, because it could still be found by the cab company. B.Maybe, because it's password protected. C.No, if there's a way the device can be disabled remotely.

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.19 Violations Employees who violate policies, rules or laws will be subject to discipline, up to and including discharge from employment Employees who make excessive personal use of e-communication systems may be responsible for costs Upon termination, employees must return all property issued for work purposes Employees who discover a violation of any rules have a duty to notify their supervisor or the IT Department as soon as possible

Ethics and Compliance Basics Copyright © 2010 WeComply, Inc. All rights reserved.20 Final Quiz

December 25, 2015 Copyright © 2010 WeComply, Inc. All rights reserved. Questions?

December 25, 2015 Copyright © 2010 WeComply, Inc. All rights reserved. Thank you for participating! This course and the related materials were developed by WeComply, Inc. and the Association of Corporate Counsel.