Privacy Group #2: Information Technology in the Workplace Kola Ogunlana Craig Silverman Phil Wyman.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
William G. Madsen, Madsen, Prestley & Parenteau LLC A. Robert Fischer, Jackson Lewis LLC CBIA’s Mid-Year HR Update Workplace Privacy.
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
® Microsoft Office 2010 Appendix A: Introduction to SkyDrive and Office Web Apps.
Right to Privacy: The Unwritten Right
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
Little brother is watching you
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Business Plug-In B7 Ethics.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
Technology for Computer Forensics by Alicia Castro.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Business and Society: Ethics and Stakeholder Management, 5E Carroll & Buchholtz Copyright ©2003 by South-Western, a division of Thomson Learning. All.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Tina Kraigher and Milena Podjed-Fabjančič 18 April 2010 Processing of Telephone Traffic Data of Employees ( a Case Study )
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Security of Cookies In A Public Computer Lab Setting Russell Fech November 30, 2000.
UNIT 5 AMERICAN GOVERNMENT. LESSON PAGES How do the 4 th and 5 th Amendments protect against unreasonable law enforcement procedures? Objective:
Spyware! Tia. What Is Spyware? With so many types of popular software being spread around the Internet, it is important to be aware of what spyware is.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
12.1 © 2007 by Prentice Hall 12 Chapter Ethical and Social Issues in Information Systems.
(Edited) WORKPLACE PRIVACY.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Class 6 Internet Privacy Law Social Media Privacy.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
 Facebook  Twitter  MySpace  Windows LiveSpace.
Copyright and Intellectual Property Issues in the Digital Environment Amy Ginther Project NEThics (sm) Office of Information Technology University of Maryland.
Monitoring Employees , Social Media, Phones, & GPS Tracking GROUP 4 Peter Rankin, Kayla Roache, Derrick Fulton, Pam Goulais Janet Lavoie, Eric Annala,
University Health Care Computer Systems Fellows, Residents, & Interns.
The Advantages And Disadvantages Of Monitoring At Work
INFORMATION TECHNOLOGY The implications of IT. The general effect of IT on our lives There have been a number of general trends in it:  computers have.
What is Copyright? Copyright is a form of intellectual property protection granted under Indian law to the creators of original works of authorship such.
Information Management Chapter 12. Learning Objectives Describe the purpose of data collection and reporting. Identify the data that should be collected.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Privacy at Johnson and Dresser By: Anuj Ghai & Ubaid Khan.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
Information Technology & Ethics. Impact The impact of IT on information and communication can be categorized into 4 groups: privacy, accuracy, property,
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
The 4 th amendment. The 4 th amendment prohibits unreasonable searches and seizures and requires any warrant to be judicially sanctioned and supported.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Section 2: The Fourth Amendment: Your Right to Be Secure Chapter 13: Supreme Court Cases.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Xin Xie Fan Yang Dorlly Cruz PRIVACY ACT. Invasion of our rights We like Technology but we also want our privacy.
“H OW P RIVATE IS Y OUR P RIVATE L IFE ?” Background Information to help your reading comprehension.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
1 CS 501 Spring 2004 CS 501: Software Engineering Lecture 6 Legal Aspects of Software Engineering II.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
For More Tutorials ACC 210 WEEK 1 DQ 1  How does information flow between departments at your organizations? Why do some organizations.
Top Ten Ways to Protect Privacy Online -Abdul M. Look for privacy policies on Web Sites  Web sites can collect a lot of information about your visit.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
Online Training Course
Appendix A: Introduction to SkyDrive and Office Web Apps
Chapter 19 - Congressional Authority for National Security Surveillance Part I.
Spyware. By: Katheryn L. Gaston.
On-Site Investigations
Presentation transcript:

Privacy Group #2: Information Technology in the Workplace Kola Ogunlana Craig Silverman Phil Wyman

Introduction zWe will discuss various aspects of the Internet in the workplace: ycookies y ylegal issues yoverall implications

COOKIES AND WORKPLACE INTERNET ACTIVITY SURVELLIANCE What they are and why they are used by employers. Impact of cookies on employee-employer work relations. What option employees may be able to use in the future to protect themselves.

COOKIES: TECHNOLOGICAL BIG BROTHER ALSO WATCHING YOU zWHAT : Similarity to history files created by web browser Cookies  “Data files” zWHY : Consequence of employee unrestricted Internet access at workplace; concerns over employees accessing of non-work related web sites (ex. pornography, sports, shopping, etc).

COOKIES CONTINUED IMPACT: zEmployer-Employee relations zPrivacy fears zFreedom of speech argument zRecord keeping issue

COOKIES CONTINUED FIGHTING BACK zEncryption technology yStill not 100% effective, cost issues zWork at home yNot an alternative for some yAllowing own hardware protects personal files

Monitoring of in the Workplace zControversial Issue zLaw is sparse and vague, but advantage lies with employer zLeads to strain on the workplace relationship

Reasons For Employers to Monitor zHelps maintain an efficient and productive workplace zAllows employer to see whether or not employee is keeping up with expected work pace, is wasting time, or if personal problems are interfering with their work zHelps protect company’s funds and information(trade secrets) zProvide evidence for liability purposes

What Employers are Monitoring zTechnology is available to register every key an employee makes zMonitor what is currently on an employee’s screen, & web pages and s saved to their hard drive zDeleted s can be retrieved as well

Fourth Amendment zGuarantees protection against unreasonable searches and seizures z Courts have interpreted The Fourth Amendment to require that "legitimate business needs" be met for a search to take place zConsent to being monitored is required by employees in some states.

Electronic Communications Privacy Act zECPA(1986) applies to electronic monitoring, and defines it as “the computerized collection, storage, analysis, and reporting information about employees’ productive activities zChief Intention: to prohibit employers from using the electronic information they obtain without consent z Employers are granted the right to monitor employee conversations if, “they occur during the ordinary course of business, or with employee’s implied consent

Employee Precautions to Help Maintain Privacy z(1) Common Sense- do not send confidential or personal information via z(2) Delete as read it- not full proof, but makes it more difficult for employer to retrieve z(3) Use a separate account for personal or confidential messages z(4) Ask employer about privacy issues, and be aware of monitoring capabilities

Realities zSentiments of the Courts seem to be in favor of employers zMistrust at heart of issue zMistrust arguably brought on by unprofessional business practices by employees zLeads to a tense workplace environment

Conclusion zCookies are a crucial method for employers to monitor their employees’ activities z has made workers more efficient, but has also posed numerous privacy problems in the workplace zThe Supreme Court has set the precedent of defending employers in recent court cases

Our Opinion zWe think employers have a right to question their employees, however, there should be some exceptions made zUntil any reform takes place, employees’ best protection is to just keep all personal aspects out of the office zAny questions?