Lecture 3 Ethics in the Workplace Privacy and Social Networks.

Slides:



Advertisements
Similar presentations
Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears, click a blue triangle to move to the next slide.
Advertisements

Wolfpack Advocacy Hour January 10, 2012 Grade 10.
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
Law Do you agree with the sentence in this case? Explain. Students supporting the sentence may suggest the people involved.
Fair Treatment in the Workplace. Introduction Each day, workers from around the world head to their respective jobs in order to complete the tasks required.
Washburn High School Student “Responsible Use” Guidelines for Electronic Technologies.
CYBER BULLYING…. What Is Cyber Bullying??? 0 "Cyber bullying" is when a child, preteen or teen is tormented, threatened, harassed, humiliated, embarrassed.
Cyber Crimes: Online Ticketing Fraud By: Erin Dobbs, Blaine Skrainka, Nick Worth, Kyle Stamper, Suzy Kiska.
CHAPTER 5 Crimes.  Civil Crimes – individual v individual  Criminal Crimes – individual v society  Crimes is a punishable offense against society in.
The Internet is Forever
Chapter 5 Test Review Test Friday.
 Contemporary issues: Cyberspace By Toby and Michael.
By: Melissa Leyva & Connie Villarreal
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Cyber-bullying & Cyber Security UNM Anderson School of Management For Jefferson Middle School’s 8 th Grade InfoTech Class.
Company LOGO Software Piracy Software Piracy Software Pirate Gets 7 Years in Prison Cannelle Cuvelier.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
CRIMINAL LAW: Case of the Drowning Girl
Use kind words, help when you can, share and take turns, listen to what others have to say, be honest and truthful, think before you speak out, remember.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
BY: CHELSEA KUCERA ELED 318 The Legal, Social and Ethical Issues in Technology for the Classroom.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
1. 2 Creating an Agency Relationship Agency is a relationship in which the agent agrees to perform a task for, and under the control of, the principal.
Electronic Use Policies.   Social Media  Internet.
Online Social Networking. Agenda Survey Results What is Online Social Networking? Popular Online Social Networking Sites Privacy Settings for Facebook.
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
Welcome to E.L. Wright iPad Safety Night I. Using Technology and Protecting Your Child E.L. Wright Technology Department and Richland County Sheriff's.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
COMPUTER ETHICS Do you know the difference between right and wrong?
00870B2F.0/Internet%20Safety.jpg.
Monitoring Employees , Social Media, Phones, & GPS Tracking GROUP 4 Peter Rankin, Kayla Roache, Derrick Fulton, Pam Goulais Janet Lavoie, Eric Annala,
Criminal and Juvenile Justice
The Advantages And Disadvantages Of Monitoring At Work
By: Gregory Swinson ACM TechNews: (3/27/12) Source: "Hacking IT Systems to Become a Criminal Offence." European Parliament. Web. 11 Apr
Laws and Resources. Understanding Case Law  Technology is evolving at an exponential pace  Existing laws and statutes can’t keep up change  Case law.
Online Safety 6th grade. Rules to know Protect your privacy Protect your password Protect the privacy of others Beware of contests, clubs, prizes, & gifts.
Maintaining Good Government Relations and Business Ethics.
Online Impersonation Using somebody else's name or likeness to create a website or social networking account, or sending s, text messages or instant.
Human Resource Management Lecture-38. Summary of Lecture-37.
Should employers have access to your social feeds?
Click your mouse anywhere on the screen when you are ready to advance the text within each slide. After the starburst appears behind the blue triangles,
Crown Court By: Sara Brown Matthew Youngblood Amber Aycock Stefanie Van Degna Carolina Rizzo Sabrina Fearon.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 9 Ethics and Information Technology Understanding Business Ethics Stanwick.
1 ENFORCING SOCIAL MEDIA AND COMPUTER USAGE POLICIES Haley R. Van Loon BrownWinick 666 Grand Avenue, Suite 2000 Des Moines, IA Telephone:
 Facebook is a public social network, and employers think they have the right to view the information on Facebook.  One signs the ‘fine print’ allowing.
PGHS Advocacy Digital Citizenship Lesson 2
Online Safety and Privacy Understanding online privacy and how your information is shared.
DIGITAL LAW. SEXTING – A Modern Phenomena Sample scenario: A 17 yr old boy and a 15 yr old girl meet at a party. The girl sends a playful, but sexually.
Chapter 10 Employee Retention and Terminations.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
What is Law?. Law vs. Values  Laws Reflect and promote societies values  Values/Morals (as per dictionary.com) of, pertaining to, or concerned with.
Chapter 5 (cont’d) 5.4 – Legal Rights and Search Laws.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
ING AND TEXTING By: Genevieve Ebot Willie Gillus and Briana Rhim.
CHAPTER 3 TECHNOLOGICAL, LEGAL, AND ETHICAL CONSIDERATIONS 2012 Business Communication I 1.
Ethics Computer Literacy. Ethics Definition “the principles of conduct governing an individual or a group” —(Merriam Webster Collegiate Dictionary, 2001)
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
Cje Karolina Kremens, LL.M., Ph.D. Wojciech Jasiński, Ph.D. Department of Criminal Procedure Faculty of Law, Administration and Economics University of.
A Gift of Fire, 2edChapter 7: Computer Crime1 PowerPoint ® Slides to Accompany A Gift of Fire : Social, Legal, and Ethical Issues for Computers and the.
Communicating safely and appropriately online. Why do we need passwords?
Cyberbullying Jada Tinch.
Protecting Your Privacy Online
ETHICS, EMPLOYEE RELATIONS AND FAIR TREATMENT AT WORK
Session 2 ‘Send me a Selfie’.
A Gift of Fire Third edition Sara Baase
Online Safety Assembly.
Presentation transcript:

Lecture 3 Ethics in the Workplace Privacy and Social Networks

Questions about Assigned Reading What is considered "fair game" for a company collecting information about prospective employees? What would you consider to be publically accessible information? What are some issues with the current or expanded use of E-Verify? What would you consider to be "fair game" for individuals in crafting their online persona? How to you feel about employers requiring drug testing (as a prerequisite for hiring, once after hiring, periodically)? How would you feel about DNA scanning by employers? What are some issues with mixing personal and work-related social media accounts? What are some issues with doing work on your own personal devices? How do you feel about employers monitoring your daily Web searches, online actives, texting, , and phone conversations? What are some issues of putting in extra work for your employer in the evenings and on the week-end? Do you agree that the CFAA should be used to make "violation of terms of use" a crime?

Is violating the terms of use of a website a crime under the CFAA’s provision about exceeding one’s authorized access for the purpose of committing fraud and obtaining something of value? This question is both a legal and a social one: Does it make sense for violation of terms of use to be a crime? The first major case involved a woman who pretended to be a 16-year-old boy on MySpace, began an online flirting relationship with a 13-year-old girl in her neighborhood (a former friend of the woman’s daughter), then broke off the relationship and sent cruel messages. The girl killed herself. The woman’s behavior was nasty and unethical. People wanted to see her punished, but it was not clear that she had broken any law. Prosecutors charged her with illegal hacking under the CFAA. They said she exceeded authorized access because she violated MySpace’s terms of use requiring that profile information be truthful. A jury convicted the woman, but the judge reversed the conviction. He said in effect that this application of the law was too broad. Normally, a breach of contract is not a criminal offence, and the CFAA does not state or suggest that it has become one. An ordinary, reasonable person does not expect that violating the terms of use of a website is a criminal offense. The decision of one judge, though, does not settle the legal situation. Prosecutions and lawsuits continue to treat violation of terms of use as a crime under the CFAA. Is Violation of the Terms of Use of a Website a Crime? A Gift of Fire: Social Legal and Ethical Issues for Computing Technology - Sara Baase

Natick Future Force Warrior Natick's Future Force Warrior will include location tracking, vital signs monitoring, autonomous/remote triage and first aid, enhanced situational awareness.