By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Things To Consider  If you were an employer would you condone the use of personal electronics?  Would screening s that come through the work.
Little brother is watching you
BUSINESSES AND THEIR EMPLOYEES 11 April. Employers survey, track, or record all or certain aspects of employee’s behavior or performance Workplace Monitoring.
Computers: Information Technology in Perspective By Long and Long Copyright 2002 Prentice Hall, Inc. IT Ethics & Healthy Computing Chapter 8.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
COMM 1010 Presentation By: Gina Haws Information for the presentation obtained from EVERYTHING YOU SAY, POST OR DO ON THE INTERNET CAN PUT YOU AT RISK.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
The laws Organizations are covered by lots of different laws
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
(Edited) WORKPLACE PRIVACY.
Nine Elements of Digital Citizenship BH. Nine elements is identified to create a digital citizenship. Digital Access: full electronic participation in.
Ashley Counce. What is Cyber Bullying?  Cyberbullying is the use of technology to harass, threaten, embarrass, or target another person. By definition,
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
Information Management 12-1 Chapter 12. Learning Objectives Describe the purpose of data collection and reporting. Identify the data that should be collected.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Welcome… Parent Awareness Session. Media Story 21 year old media student from Surrey who…… –Arranged to meet a 14-year-old at a railway station –Had.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
McGraw-Hill Technology Education © 2006 by the McGraw-Hill Companies, Inc. All rights reserved CHAPTER PRIVACY AND SECURITY.
00870B2F.0/Internet%20Safety.jpg.
The Advantages And Disadvantages Of Monitoring At Work
Dating at Wal-Mart Dating relation between a married associate is prohibited Maintain businesslike relations and avoid turmoils of extra marital affairs.
Cindy Sierra Gloria Advantages Employers want to be sure that no correspondence is being sent that may have an adverse effect on their company. Monitoring.
Mrs.. Taylor Cedar High School Business Web Page Design.
Information Anxiety By Meghan Randinelli. Introduction Greatest problem concerning ethical information technology (IT) is personal privacy Greatest problem.
Presented by Beang Tong ENGL393, Spring’03
PROGRAMMING JAVA Mrs. Taylor Top Ten Best Careers for College Students Mind2it.com 1. Software Engineer 1. Software Engineer 5. Computer Systems.
CptS 401 Adam Carter. Question  Which of the following is commonly cited as a benefit to telecommuting? A. Increased productivity B. Higher job satisfaction.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
Surveillance Jeff Saunders Dr. Garrison CSCI 101 Thurs. 12:30.
Is monitoring employee’s internet usage moral? By: Brittany Tindall and Hannah Tyson.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 9 Ethics and Information Technology Understanding Business Ethics Stanwick.
By Tyler Daniels.  Privacy  - Employers monitoring employees every move  - Can get employees fired for doing things they didn’t know were being monitored.
Surveillance and More Porsha J. Rice. Surveillance Cameras Nowadays surveillance cameras are virtually everywhere and in places such as: Schools Stores.
MIS 2000 Social Implications of IST. Outline Law & Ethics Accountability and Liability Information Rights Privacy Computer Abuse and Crime Intellectual.
Information Technology Issues How has the proliferation of IT impacted society? Adapted from Prof. Brenda Timmerman.
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
Lecture2 Networking. Overview and spam World Wide Web Censorship Freedom of expression Children and inappropriate content Breaking trust on the.
Confidentiality, Integrity, Awareness What Does It Mean To You.
What is the Internet?. The Internet is millions of computers all over the world connected together so they can exchange information.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
IT has had a big impact social in many different ways. Facebook is a social networking site that allows people to communicate and stay in touch with friends.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Privacy 2 (draft). Digital Dossier The data shadow The digital dossier Personal accountability.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Bringing Human Rights to the Workplace Avoiding Unpleasant Encounters with Civil Rights Lawyers Lewis Maltby President National Workrights Institute.
Solutions of Case Study 4 & 6
Privacy and the Law.
To spy or not to spy; that is the question
Data Protection Act and Other Laws
Appropriate Use of Technology
Internet Safety and Acceptable Use Policies.
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
Computers in the Workplace
Lesson 1: Introduction to HIPAA
Presentation transcript:

By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment

What type of monitoring is done at work? accounts and the Internet Conversations on the phone File sharing Viewing of inappropriate web sites Cameras in the workplace, such as the break- room, hallways, entrance and exit Length of breaks The different kinds of software you use on your computer

What type of monitoring is done in public places? Tax data Education data Medical data Driver and crime data Census data Insurance data Lifestyle data Credit data World Wide data Employment data Financial data Miscellaneous data Cameras in public buildings, on highways, and ATM’s

What type of monitoring is done on the computer? accounts Internet Chat-room messaging Instant messaging Inappropriate web sites

Why are you monitored at work? Technological advances and the increased use of electronic communication in the workplace have made monitoring its use necessary for most companies.

What is the impact? Failure to monitor employee’s use of and the Internet can be costly to the company. 70% of attacks on corporate computer systems are conducted from inside the firm Productivity has decreased due to personal use of electronic communications If you are caught doing something at work you are not supposed to be doing, you can be terminated, fined, jailed, fired, or put on probation.

Do you have to be made aware of monitoring? No, you don’t have be made aware of monitoring. It's almost always legal because there are no laws regulating electronic surveillance in the private sector workplace. The only limit to employer surveillance comes from the Electronic Communications Privacy Act (ECPA), a federal law passed in The ECPA prohibits employers from deliberately eavesdropping on purely personal conversations that an employee may have at work. It does not, however, prevent employers from listening in on business-related conversations or monitoring electronic communications such as and instant messaging.