SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Surveillance - Approaches to regulation Privacy & Surveillance Topic 8 Nigel Waters & Professor Graham Greenleaf September 2008.
NAU HIPAA Awareness Training
BIOMETRICS, CCTV & DATA PROTECTION By Drudeisha Madhub Data Protection Commissioner Date:
Right of Entry Training May What will we cover? Introduction & overview Suspected breaches Holding discussions with employees Changes to state OHS.
Higher Administration and IT Administrative Practices.
Introduction to the APPs and the OAIC’s regulatory approach Presented by: Este Darin-Cooper Director, Regulation and Strategy May 2015.
General Security Principles and Practices Chapter 3.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
WHS Legislative Overview for Independent Contractors.
ICAICT202A - Work and communicate effectively in an IT environment
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Chapter 14: Ethics, Justice and Fair Treatment at Work
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
FSCPC1 Privacy in the workplace Chris Connolly Director Financial Services Consumer Policy Centre.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
Landline and Mobile Phones Trixie Francisco. What is Wiretapping? Wiretapping is the monitoring of telephone or Internet conversations by a third party,
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
13 July 2006Susan Joseph Health Privacy It’s My Business Health Records Act 2001 (Vic) eReferral Service Co-ordination System.
(Edited) WORKPLACE PRIVACY.
G17: Recordkeeping for Business Activities Carried out by Contractors Patrick Power, Manager Government Recordkeeping Programme Archives New Zealand.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Indecent Exposure – Are Your Private Parts Truly Private? (Privacy and Technology) Barbara Buckett Barbara Buckett & Associates 27 August 2008.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Information Governance Policies. Business Support and Corporate Information Resources Team… Working to create a knowledge led organisation Information.
Regulation of Personal Information Sally Brierley & Emma Harvey.
Guide - Recordkeeping for business activities carried out by contractors Natalie Dewson Senior Advisor Government Recordkeeping Programme Archives New.
The Internet of Things and Consumer Protection
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Barry’s Buzz Items of interest affecting Local Government Revenue Management.
Privacy in the Workplace Roland Hassall, Partner Date: 12 November 2015.
Surveillance and More Porsha J. Rice. Surveillance Cameras Nowadays surveillance cameras are virtually everywhere and in places such as: Schools Stores.
Surveillance For IB-1 ITGS By Indrani.  Surveillance is the use of IT to monitor the actions of people.  For example, monitoring may be used to track,
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
Privacy Compliance in Schools Darrebin A/P’s Network 7 May 2009.
Introduction to the Australian Privacy Principles & the OAIC’s regulatory approach Privacy Awareness Week 2016.
Data protection—training materials [Name and details of speaker]
New Hire HIPAA Orientation. HIPAA Overview HIPAA is an acronym that stands for the Health Insurance Portability and Accountability Act of HIPAA.
McLean HIGHER COMPUTER NETWORKING Lesson 10 Ethical Implications Description of ethical implications of networks: Personal privacy Censorhip.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Alexander County Schools Review of Board of Education Policies Technology Responsible Use 3225/4312/7320 Internet Safety 3226/4205 Technology In The Educational.
Onsite CRM Security
Surveillance around the world
How to demonstrate environmental compliance to the regulators
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
The Ethics of Telepsychology
Presentation to Rising Stars Roundtable
Contingent Workforce: Global Privacy Laws Overview
Microsoft 365 Get help with regulatory compliance
General Data Protection Regulations: what you really need to know
Service Organization Control (SOC)
Privacy and Security in the Employment Relationship
Data Protection Legislation
Privacy & Access to Information
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
General Data Protection Regulations
Internet law Business law.
Handout 9: Organisational policies and procedures
Government Data Practices & Open Meeting Law Overview
How it affects policies and procedures
Government Data Practices & Open Meeting Law Overview
AUP, EDP, & Centralized Printing
SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Presented by Anthony J. Campiti Thompson & Knight LLP One Arts Plaza
TECHNOLOGY PROTECTION
Presentation transcript:

SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW A guide to legislation relating to employee electronic surveillance and monitoring

Surveillance and monitoring devices When most people think of surveillance, they think of video or still cameras, or phone tapping. However, technological advances have seen the introduction of a broad range of surveillance options available to employers today, including:

Surveillance and monitoring devices Global positioning systems (GPS devices): Used primarily in the transport industry to determine location of deliveries and ensure compliance with government traffic regulations.

Surveillance and monitoring devices Listening devices: Radio transmitters that interact with radio receivers to feed audio surveillance from one location to one or multiple locations.

Surveillance and monitoring devices Telephones: Commonly used in call centres to monitor new employees for training and induction purposes.

Surveillance and monitoring devices Computers: Can be used to monitor employees’ access to inappropriate emails or websites.

Surveillance and monitoring devices Biometrics: Technology that recognises people based on fingerprints, iris pattern, DNA, handwriting, etc. – commonly used in monitoring time and attendance of employees, as well as for security purposes.

Surveillance and monitoring legislation There is no across-the-board legislation that applies across Australia. Applicable legislation is: device-specific state or territory-based applies more broadly than the workplace

Device-specific, non-work-specific legislation Listening Devices Act 1972 [SA], Surveillance Devices Act 2007 [WA], Surveillance Devices Act 2007 [NT], Invasion of Privacy Act 1971 [QLD] and Listening Devices Act 1991 [Tas] – All generally prohibit the use of listening devices to listen to or record private conversations to which the user is not a party without the consent of all parties

Workplace-specific legislation – NSW/ACT NSW (Workplace Surveillance Act 2005) and the ACT (Workplace Privacy Act 2011) regulate overt and covert camera, computer and tracking surveillance. Both Acts require employers to provide employees 14 days’ notice (unless otherwise agreed) of an intention to conduct surveillance.

Notice of surveillance – NSW/ACT The notice must detail: Kind of surveillance to be conducted How it will be conducted When it will be conducted Whether it will be continuous or intermittent Whether it will be ongoing or conducted for a specific time Under both Acts, covert surveillance can be undertaken subject to an order by a magistrate where unlawful conduct is reasonably suspected.

Victoria – not just workplaces The Workplace Surveillance Devices Act [Vic] applies more broadly than workplaces. It applies to listening, tracking and optical surveillance devices. Employee consent is required to conduct optical and tracking surveillance.

Computer surveillance Employers have the right to monitor company-supplied computers, mobile phones, etc. if done in accordance with relevant policy/ procedures. Email and Internet comms privacy is only protected in NSW and ACT. Both Acts restrict employers from blocking employees’ emails and Internet access at work – particularly if it relates to industrial matters.

Interception and listening devices The Telecommunications (Interception and Access) Act 1979 [Cth] prohibits listening to or recording communications passing over a telecomms system without the consent or knowledge of the parties. Listening and surveillance devices legislation in each state generally prohibits the use of listening devices to listen or record private conversations to which the user is not a party without the consent of all parties.

Penalties Contravening surveillance or privacy laws can result in serious penalties. E.g., contravention of the Victorian listening devices legislation can result in up to two years’ in prison or substantial fines.

In summary… There is no national legislation covering electronic surveillance or monitoring of employees Legislation is usually device-specific. Employers can generally monitor company-supplied devices. Using listening devices without consent is generally prohibited.