To spy or not to spy; that is the question

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

MADISON COUNTY SCHOOLS ACCEPTABLE USE AND INTERNET SAFETY POLICY.
1 Richard V. Tucker, CIC Applied Systems Users Group of Central New Jersey Cyberslacking Cyberslacking Introduction.
BUSINESS B2 Ethics.
ICT & Crime Cyberslacking. What is Cyberslacking? Cyberslacking is wasting time (usually online) when you should be working Either at work or at school.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Presented by: Dan Landsberg August 12, Agenda  What is Social Media?  Social Media’s Professional Side  Benefits of Social Media  Regulatory.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Things To Consider  If you were an employer would you condone the use of personal electronics?  Would screening s that come through the work.
Acceptable Use By: Keith R. Watson CoC Information Security Manager.
Little brother is watching you
McGraw-Hill © 2008 The McGraw-Hill Companies, Inc. All rights reserved. Chapter 8 Threats and Safeguards Chapter 8 PROTECTING PEOPLE AND INFORMATION Threats.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Case Study Chapter 8 Monitoring Employees on Networks: Unethical or Good Business? By Michele Schatz March 7, 2005.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
Intellectual Property, Nondisclosure agreements, Electronically Monitored Workplaces, And high level thinking questions.
Electronic Use Policies.   Social Media  Internet.
A Fleming Parent’s Guide to Child Safety on the Internet Adapted by Kam Purewal June 24,2010 Based on: Responding to Cyberbullying: A Guide for School.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Effective Restrictions on Internet Usage What is our responsibility? & What can I do?
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
00870B2F.0/Internet%20Safety.jpg.
Enterprise Network Risks Attachments -- Workers opening an attachment could unleash a worm or virus onto the corporate network, and a new evolution.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Monitoring Employees on Networks: Unethical or Good Business?
Professionalism/Customer Service in the Health Environment Communications and Professionalism This material Comp16_Unit9 was developed by The University.
Presented by Beang Tong ENGL393, Spring’03
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Privacy at Johnson and Dresser By: Anuj Ghai & Ubaid Khan.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
Squalicum High School Computer Network Student Use Guidelines.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 9 Ethics and Information Technology Understanding Business Ethics Stanwick.
Computer System and Internet Misuse at the Work Place By: Kris Dimon.
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
INTERNET SAFETY.
Match these words to the letters in the picture.. screen, monitor, keyboard, mouse, microphone, speakers, system unit.
A Gift of Fire Fourth edition Sara Baase
Monitoring Employees on Networks
Counterarguments & Responses UNIV 112 Fall A part of argument Counterarguments answer the question: What significant questions or positions different.
A Parent’s Guide to Child Safety on the Internet.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Child Safety Online November 2011 Ann Hines, CISSP, GLEG.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Technology usage - students
IT Monitoring in the Workplace
Ogletree, Deakins, Nash, Smoak & Stewart PC
Internet Safety & Acceptable Use Standards
LAUSD Responsible Use Policy (RUP)
Internet Safety and Acceptable Use Policies.
Internet Safety and Acceptable Use Policies.
Customer Service in a Virtual World
Internet Social Media. Internet Social Media Benefits: Internet is a useful tool if utilized appropriately. Uses Benefits: Internet is a useful tool.
Big Brother Camera’s Brittany Todd.
What is keystroke logging?
Presentation transcript:

To spy or not to spy; that is the question Employee Privacy To spy or not to spy; that is the question

Statistics 37% of workers say they surf the Web constantly at work. 32.6% of workers surf the net with no specific objective; men are twice as likely as women. 48% of large companies blame their worst security breaches on employees. 70% of all web traffic to Internet pornography sites occurs during the work hours of 9 a.m. -5 p.m. 58% of industrial espionage is perpetrated by current or former employees. 64% of employees say they use the Internet for personal use while at work. 90% of employees feel the Internet can be addictive, and 41 percent admit to personal surfing at work for more than three hours per week. 60% of Security Breaches occur within the Company - behind the Firewall 25% of corporate Internet traffic is considered to be "unrelated to work". 30-40% of lost productivity is accounted for by cyber-slacking. http://www.staffmonitoring.com/P32/stats.htm

Statistics, Cont’d 77.7% of major U.S. companies keep tabs on employees by checking their e-mail, Internet, phone calls, computer files, or by videotaping them at work. 27% of companies say that they've fired employees for misuse of office e-mail or Internet connections, and 65% report some disciplinary measure for those offenses. 63% of companies monitor workers Internet connections and 47% store and review employee e-mail. 27% of Fortune 500 organizations have defended themselves against claims of sexual harassment stemming from inappropriate email. 90% of respondents (primarily large corporations and government agencies) detected computer security breaches within the previous 12 months, 80% acknowledged financial losses due to computer breaches, 44% were willing and/or able to quantify their losses, at more than $455 million. http://www.staffmonitoring.com/P32/stats.htm

E-Mail and Internet-Related Terminations The 28% of employers who have fired workers for e-mail misuse cite the following reasons:  —Violation of any company policy (64%)  —Inappropriate or offensive language (62%)  —Excessive personal use (26%)  —Breach of confidentiality rules (22%)  —Other (12%).  The 30% of bosses who have fired workers for Internet misuse cite the following reasons:  —Viewing, downloading, or uploading inappropriate/offensive content (84%)  —Violation of any company policy (48%)  —Excessive personal use (34%)  —Other (9%)  http://www.amanet.org/training/articles/The-Latest-on-Workplace-Monitoring-and-Surveillance.aspx

Internet, E-Mail, Blogs and Social Networking Employers are primarily concerned about inappropriate Web surfing.  —66% monitor Internet connections  —65% use software to block connections to inappropriate Websites—a 27% increase since 2001 when AMA/ePolicy Institute first surveyed electronic monitoring and surveillance policies and procedures.  http://www.amanet.org/training/articles/The-Latest-on-Workplace-Monitoring-and-Surveillance.aspx

Employers who block access to the Web are concerned about employees visiting:  —Adult sites with sexual, romantic, or pornographic content (96%)  —Game sites (61%)  —Social networking sites (50%)  —Entertainment sites (40%)  —Shopping/auction sites (27%)  —Sports sites (21%)  —External blogs (18%)  http://www.amanet.org/training/articles/The-Latest-on-Workplace-Monitoring-and-Surveillance.aspx

Computer monitoring takes many forms: —45% of employers tracking content, keystrokes, and time spent at the keyboard  —43% store and review computer files  —12% monitor the blogosphere to see what is being written about the company  —10% monitor social networking sites  http://www.amanet.org/training/articles/The-Latest-on-Workplace-Monitoring-and-Surveillance.aspx

Should You Monitor? http://employee-monitoring-software-review.toptenreviews.com

Resources: https://www.webwatcher.com/?gclid=CPXioJCz48ACFShp7AodhH4Aig Monitor your kids and your employees http://employee-monitoring-software-review.toptenreviews.com/ Employee monitoring tools with stats http://www.spector360.com/ Video for sales of software