Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.

Slides:



Advertisements
Similar presentations
Ethical Justice Chapter Fifteen: Whistleblowers. Whistleblowers Whistleblower is a generic term used to describe someone that reports misconduct within.
Advertisements

Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Whistle-Blowing Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
WEEK 9: DISMISSAL AS A RESULT OF MISCONDUCT 1. LEARNING OUTCOME The students will be able to; 2 1 Discuss the issue of dismissal as a result of misconduct(C4,P2,
IDENTITY THEFT AND FRAUD CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
1 Identity Theft and Phishing: What You Need to Know.
Consumer Issues Chapter 28.
“This workforce solution was funded by a grant awarded under Workforce Innovation in Regional Economic Development (WIRED) as implemented by the U.S. Department.
Right to Privacy: The Unwritten Right
Matthew L. Harvey Office of General Counsel Illinois Commerce Commission.
Security, Privacy, and Ethics Online Computer Crimes.
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
New HR Challenges in the Dynamic Environment of Legal Compliance By Teri J. Elkins.
Employees and the Corporation The Employment Relationship Workplace Rights Privacy in the Workplace Whistle-Blowing and Free Speech in the Workplace Working.
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Chapter 14: Ethics, Justice and Fair Treatment at Work
Licensing & Regulation Division Senior Sergeant Brett Kahan Presentation to the Association of Investigators & Security Professionals.
INTERNET and CODE OF CONDUCT
Business and Society: Ethics and Stakeholder Management, 5E Carroll & Buchholtz Copyright ©2003 by South-Western, a division of Thomson Learning. All.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Introduction to Fraud Examination. Discount Plus Company has been concerned for some time about its cash flows. Since the company began five years ago,
1. 2 Creating an Agency Relationship Agency is a relationship in which the agent agrees to perform a task for, and under the control of, the principal.
Electronic Use Policies.   Social Media  Internet.
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
5.01 Students will be able to understand the rights and responsibilities of consumers.
HIPAA OBJECTIVES  Define HIPAA  Define PHI  Use of PHI  Your rights  Your responsibilities.
Section 4.1 Business Ethics.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Unethical use of Computers and Networks
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Speak HIPAA Like a Native A Guide to Common HIPAA Nomenclature University of Miami Ethics Programs.
Presented by Beang Tong ENGL393, Spring’03
Chapter 9 Enhancing Information/Computer Security.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
HIPAA THE PRIVACY RULE. 2 HISTORY In 2000, many patients that were newly diagnosed with depression received free samples of anti- depressant medications.
Chapter 7 Blowing the Whistle Copyright © 2014 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent.
Chapter 40 Labor and Employment Law. 2  What is the employment at will doctrine? When and why are exceptions made?  What federal statutes govern working.
MIS 2000 Ethical and Legal Aspects of Information Systems Updated: June 2015.
THE LEGAL ENVIRONMENT OF BUSINESS © 2009 Pearson Education, Inc. publishing as Prentice Hall Ch The Legal Environment of Business A Critical Thinking.
Business Ethics & Social Responsibility
Health Insurance portability and Accountability Act (HIPAA)‏
“How Technology Is Changing Privacy Issues In The Workplace” By Catherine Clarke.
Welcome….!!! CORPORATE COMPLIANCE PROGRAM Presented by The Office of Corporate Integrity 1.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
CHAPTER 5 ETHICS & PRIVACY.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
WHISTLE BLOWING POLICY PRESENTATION TO THE PORTFOLIO COMMITTEE ON HUMAN SETTLEMENTS 22 JUNE
Computer Crime Second Part of Chapter 7 A gift of Fire – Sara Baase.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
NETWORK SECURITY LAB Rehab AlFallaj. Learning Objective ■In this Lecture you will learn: –Ethical Issues related to network security.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Health, Safety and Privacy in the Workplace OSHA Worker’s Compensation Polygraph Protection Act Electronic Communications Privacy Act.
Chapter 7 Blowing the Whistle.
Five Unethical Uses of Computers
Protecting Your Credit
Explain the nature of liability insurance
Computer Crime and Security Measures
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
Other Sources of Information
Ethical Use of Computers
Lesson 1: Introduction to HIPAA
CONTRACTS PRIVILEGED COMMUNICATION PRIVACY ACT
WEEK 9: DISMISSAL AS A RESULT OF MISCONDUCT
Presentation transcript:

Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn

Roadmap  Employee crime  Sabotage  Employee monitoring  Laws and cases  Case study  Conclusion

Employee Crime  Embezzlement and company sabotage  With the use of computers, employees have stolen hundreds of thousands from employers.  Some cases in the millions or even hundreds of millions of dollars.  Insurance companies have employees create fake policies.  Some steal data to sell to competitors.

Increased opportunity for embezzlement  The complexities of modern financial transactions increase the opportunities.  Victims of most costly scams include:  Banks  Brokerage houses  Insurance companies  Other large financial institutions

Sabotage  Fired or angry employees sometimes sabotage the company computer systems.  Motivations for sabotage are not new. What is new with computer sabotage is the ease with which saboteurs can cause a great amount of damage.

Protecting against frauds  Many practices reduce the likelihood of large frauds.  Responsibilities of employees with access to sensitive computer systems are rotated.  Each employee should have their own user ID and password.  Access control.  Immediate cancelation of access after an employee quits or is fired.  Careful screening and background checks on potential employees can be helpful

Employee monitoring “Technology now allows employers to cross the line from monitoring the work to monitoring the worker. - Cindia Cameron  Monitoring employees is nothing new.  Computers have made new kinds of monitoring possible.

Employee monitoring cont’d  Surveillance cameras  Telephone recordings  Keystroke loggers  GPS monitoring 

Law and cases  There is little law controlling workplace monitoring  The Electronic Communications Privacy Act (ECPA)  Prohibits interception of and reading of stored without a court order  Does not prohibit employers from reading employee on company systems  Does this seem ethical?

Law and cases cont’d  Courts place much weight on he fact that the computers, mail, and phone systems used at work are the property of the employer  Are provided for business purposes only  Courts sometimes rule against employers  If there is a convincing case that monitoring was done to snoop on personal activities  Track down whistleblowers  Decisions depend on a conclusion about whether an employee had a reasonable “expectation of privacy”  This concept is not always clear

National Labor Relations Board  Sets rules and decides cases about worker-employer relations  Workers have legal right to communicate with each other about work conditions  May do so on company systems in some cases  Companies must discuss policies  Use of surveillance cameras  Drug testing  Lie detector tests

Case Study  Headline: FDA staffers sue agency over surveillance of personal .  Beginning in 2012  Allegedly, FDA began to read personal s of 5 employees  Gained Access through keyloggers and interception

Allegations by employees  5 Doctors and scientists involved  Employees claim FDA was approving radiological devices that posed unacceptable risks to patients  Internal complaints were filed in 2007  FDA read and disclosed personal s addressed to members of Congress

Formal Lawsuit  The employees filed a formal lawsuit citing a violation of their constitutional rights.  They argue viewing their personal, not company, is unconstitutional.  FDA had to right to hold information over the employees head

Positive and Negative rights  Negative  The right to act without interference  Leave me alone  Positive  The right to allow or oblige action  Rights guaranteed by laws

StakeHolders  FDA officials  Employees  Doctors and Scientists  Public  Patients with cancer

FDA standpoint  Employees of the FDA have “no reasonable expectation of privacy” while using company computers.  FDA has the positive right to invade privacy  Protect FDA name  Continue to advance cancer research  Information leaks undermine FDA efforts  They assert the employees broke the law, not the FDA

Employee standpoint  Employees have the negative right to correspond with Congress without interference  Whistle Blower protections  Government correspondence is especially private  Employees have positive right to oblige action from the law  FDA should be punished for invading personal

Public standpoint  Public has the negative right to receive the treatment they desire  Risks of new technologies is their right to take  Utilitarian belief supports this view  Possible sacrifice of people is for the overall greater good  Kantian belief grossly opposes this view  By approving these devices, the FDA is using the public as means to an end

Outcomes  Investigation is still on going  Being overseen by the Department of Health and Human Services.  Of the 5 involved  1 fired  2 didn’t have contracts renewed  2 claimed they were passed over for promotion and quit

Solutions  Solutions could go in three ways  Favor FDA  Favor Employees  Favor the public  Indirectly the FDA  What do you think?????  Who has rights?  Who violated laws?

Conclusion  Technologies used for employee monitoring  Technologies used to commit employee crime  Case study  Ethical analysis

References  A Gift of Fire  monitoring-lawsuit_n_ html  sue-agency-over-surveillance-of-personal-e- mail/2012/01/23/gIQAj34DbQ_story.html