Have you ever thrown a sheep at your friends? And would you do it at work? IT, FB & Other Digital Dilemmas (lol) 17 th May 2011.

Slides:



Advertisements
Similar presentations
Institutional Telecomms and Computer Network Monitoring Andrew Charlesworth University of Bristol 10 June 2002.
Advertisements

Using Information at the University University Secretarys Office
Northside I.S.D. Acceptable Use Policy
ACCEPTABLE USE POLICIES.  Use network resources for school work only  Always Log-on/Log-off  AUP/RUP training and signature pages are required  Always.
Thursday 8 March 2012 Will Clayton, Taylors Solicitors Social Media – The Ugly.
© The Association of Independent Schools of NSW ICT Conference Canberra Legal Ramifications Cathy Lovell Senior Advisor Employment Advisor 31 May 2013.
LEGAL ISSUES IN SOCIAL MEDIA Presented by: TAL WILLIAMS Partner (02)
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
The Data Protection (Jersey) Law 2005.
Digital Citizenship L’école élémentaire Beachy Cove Elementary School January 2013.
1 Social Media: Strategy and Implementation Are you protected? Amy D. Cubbage & Cynthia L. Effinger.
Boyertown Area School District Acceptable Use Policy.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
980 9 th Street, Suite 2300 Sacramento, California Telephone: Facsimile: Montgomery Street, Suite 788 San Francisco,
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
Access to Electronic Media Acceptable Use Policy August 8, 2011 Meece Middle School.
How many of these icons do you recognise?. Year 7 Guidance Manager CEOP Ambassador.
1 The Engineer as a Professional Privacy. 2 After reading the articles please answer the following questions. 1) Is privacy a concern that engineers have.
HIPAA What’s Said Here – Stays Here…. WHAT IS HIPAA  Health Insurance Portability and Accountability Act  Purpose is to protect clients (patients)
INTERNET and CODE OF CONDUCT
Employee privacy in a global company Sandra Kelman Privacy Manager (Asia Pacific) Privacy Issues Forum 30 March 2006.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
‘Do’s and Don'ts of Social Media’ Jean-Pierre van Zyl.
1 A few words about us “Levenes Employment provides 'outstanding' advice at a lower cost than City firms. Audrey Onwukwe 'fights hard for her clients';
1. Review of Selected Employee Policies 2 DRUG FREE WORKPLACE PURPOSE OF POLICY To ensure compliance with the federal drug-free workplace act. Provide.
Privacy and Security Risks in Higher Education
Data Protection in Financial Services Are you Seeing the Bigger Picture? 17 September 2008.
University of Maryland College Park, Maryland October 7, 2011 By: Rochelle S. Eisenberg, Esq. Hodes, Pessin & Katz, P.A
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Section Seven: Information Systems Security Note: All classified markings contained within this presentation are for training purposes only.
Electronic Use Policies.   Social Media  Internet.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
COM531 Multimedia Technologies Lecture 11 – Legal Issues.
Internet and Computer Rules If you want to use the computers you need to follow the rules.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Records & Information Management (RIM) Risk: Is Your Company Exposed? March 19, 2013.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Investigating Rights and Responsibilities at work
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
FIRMA April 2010 SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
INTRODUCTION OF DIVERSITY  Minimizing workplace diversity conflict  Develop strategies to specifically deal with issues of this nature  Developing.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
Human Rights Act, Privacy in the context of auditing Phil Huggins Chief Technologist, IRM PLC
Breakaway Session 2: Data Protection and The Role of the Data Protection Supervisor Michael Mingle Director, NTSS Solutions (UK) D ATA P ROTECTION C ONFERENCE.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Social media policy. Contents Who does this policy apply to? Use of brand and ownership Copyright and confidentiality IT policy What is a social media.
Sexting in Schools – How do we need to respond. Images or videos generated by children under the age of 18, or of children under the age of 18 that are.
The Impact of Social Media on Employment Law Carmel Sunley Sunley Solicitors Limited.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
Internet abuse > Joe Thornhill, Partner, Ward Hadaway 21 May 2009.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
Social Media in Schools I.N.T.O Youth Conference Friday 24 March 2017
Ogletree, Deakins, Nash, Smoak & Stewart PC
Data protection headaches: GDPR, brexit AND perimeter risk
Investigating the correct and legal way to use software
Andy Hall – Cyber & Tech INSURANCE Specialist
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
General Data Protection Regulation
Data Protection What’s new about The General Data Protection Regulation (GDPR) May 2018? Call Kerry on Or .
Tools & Approaches for Ongoing Privacy Compliance
SOCIAL NETWORKING Christine M. Farquhar Managing Director, Compliance J.P. Morgan U.S. Private Banking.
Presentation transcript:

Have you ever thrown a sheep at your friends? And would you do it at work? IT, FB & Other Digital Dilemmas (lol) 17 th May 2011

This Morning… 9.15 amIntroduction – Sarah Whitemore 9.30 am Abuse – Howard Robson 9.50 amMonitoring Staff & Internet Security – Paul Mew amSocial Networking – Nicole amTEA BREAK amPorn – Sarah amSum-up and Q&A amIt’s a wrap!

Chinese Whispers

Golden Tickets…?

Abuse Howard Robson

The Stats What % of people have been reprimanded at work for an ill advised ? What % of those had hit ‘reply all’ and insulted someone in error? Which sex makes the most gaffes?

A prize gaffe A telephone conversation (Nearly) an agreement The follow up The Law Society Red (or long faces?)

The Risks Reduced productivity Downloading of inappropriate material Disclosure of confidential information Viruses/Network Congestion Cyber bullying

The scary stuff… Cable & Wireless 24 suspended for ‘lewd racist and sexist jokes’ Royal & Sun Alliance 10 dismissed and 75 suspended for ‘sexually explicit s involving Bart Simpson’ Norton Rose ‘sexually explicit ’ to 10 million computers Western Provident states ‘Norwich Union in financial difficulties’ – damages £450,000

Who’s that girl…?

Alison Monica Halford Born 8 th May 1940 Age 22 joined the police Promoted to highest ranking female officer First female in charge of a police station Landmark EOC case

The Law The Human Rights Act 1998 Article 8 ‘right to privacy’ and ‘respect for family life’ Article 10 ‘right to freedom of expression’

Snappy regulations The Regulation of Investigatory Powers Act 2000 The Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000 Data Protection Act 1998

Accepted purposes Establish facts relevant to the business Ascertain compliance with regulatory practises Ascertain or demonstrate standards Prevent or detect crime Ensure the effective operation of the system Investigate or detect unauthorised use

Policies Why have an Electronic Communications Policy? To address risks & hazards of use: – Constructive dismissal – Discrimination, harassment and defamation – Intellectual Property issues – Contractual liability

What to put in your policy? Standards of conduct & performance Examples of proper & improper use Prohibition on chain e- mails & jokes Use must not breach policies on Equal Opps etc etiquette

What to put in your policy? Personal use - if permitted - to what extent Statement as to purposes of monitoring Type of monitoring to be carried out Subject access rights under Data Protection Act Retention and deletion policy Use of office phones, PDA’s Guidance on permitted blogging and social media

What to put in your policy? Training of managers about the Policy Supply policy documents /induction to new employees Up-dates on changes and regular refreshers

Case law Grant & another v Mitie Property Services UK Ltd 2009 McKinley v Secretary of State for Defence 2004 Robinson v Network IT Recruitment Ltd 2004

Scenario Helen - what would you do?

Monitoring Staff & Internet Security Paul Mew Technical Director RAMSAC Ltd

HR and technology

Introduction Paul Mew Technical Director at ramsac 16 years in IT 10 years at ramsac 5 years managing a network for the MoD

Technology is not the answer! Key elements…. IT Acceptable Use Policy IT Security Policy Training

Web management

management Audit/compliance/litigation/evidence Authorisation & control Productivity

Data leakage 98% accidental Lost laptops, iPhones, iPads, smartphones, USB keys misuse Instant Messaging Training Software

Thank you!

Facebook Nicole Seaman

Facebook

Human Rights Breach of contract Breach of policy Behaviour outside work Facebook & the Law

Facebook Issues Discrimination Confidential Information Recruitment Data Protection Productivity Reputation Privacy

Facebook scenario

What to do with offenders Misconduct issue Disciplinary procedure ‘Do I have a genuine belief, based on a reasonable investigation and is my reaction that of a reasonable employer?’

Social Media Policy Access Monitoring Confidential information Discriminatory comments Misuse of personal data Disclaimer Implications of breach

Facebook for your business Blogging & networking TP social media to further business Promotional strategies Clear policy

Facebook Update Facebook dismissal cases - Preece - Walters v Asda Stores Ltd EU “right to be forgotten online” Recruitment Service via Facebook

A real life example of when it goes wrong

Tea break

Internet abuse Sarah Whitemore

Statistics? Percentage of business- related internet useage in the work place? Percentage of companies who have dismissed for inappropriate internet useage? Of those dismissed, percentage for viewing porn?

A couple of random facts In 2002 the British Library suspended 9 Employees for viewing internet porn The British Library holds the largest collection of printed pornography in the world

Inappropriate viewings?

I don’t believe it…! Edinburgh Council v Dickson ‘I don’t recall the incident. I may have been hypoglycaemic at the time…’

What’s all the fuss about? Downloading and circulating sexually explicit material created ‘a general atmosphere of obscenity’ Morse v Future Reality Limited

What’s all the fuss about? A system of grading offensive material and applying corresponding penalties needs to be shared with employees RBS v Goudie

Bloggers beware Inappropriate websites Social networking group comments Blogging All in the public eye, not Protected activities

5 Steps to IT heaven Our survey said… Create a policy Train your managers & staff Monitor Use Be consistent Enforce as you would harassment policy

Q & A