FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: 1055-21 August 11, 2010.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Information Technology (IT) activities and careers. Source:
Mobile Web products Brought to you by. Background Sentido started in 2004 as a web software development company (surveys) Soon started venturing into.
Controlling. Copyright © 2005 Prentice Hall, Inc. All rights reserved. 18–2 L E A R N I N G O U T L I N E Follow this Learning Outline as you read and.
Electronic employee monitoring
Little brother is watching you
Soft solutions for those who can’t afford to make errors.
BUSINESSES AND THEIR EMPLOYEES 11 April. Employers survey, track, or record all or certain aspects of employee’s behavior or performance Workplace Monitoring.
Chapter Extension 1 Information Systems for Collaboration © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
9 99 CHAPTER Privacy and Security. 9 © The McGraw-Hill Companies, Inc Objectives 1.Privacy 2.Security 3.Ergonomics 4.Environment.
IT JOBS TASK 20. SOFTWARE ENGINEER A software engineer designs and programmes software, operates systems, database systems etc. They know how software.
Digital Technology Basics Digital Technology Basics includes two lessons:  Lesson 1: The Modern Digital Experience  Lesson 2: Digital Technology & Career.
The laws Organizations are covered by lots of different laws
Communication Methods , or Electronic Mail, is an important part of communication within businesses and should be used effectively. An is made.
Case Study Chapter 8 Monitoring Employees on Networks: Unethical or Good Business? By Michele Schatz March 7, 2005.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
Tools to Help You - Communication. 2 | CACI Information Solutions and Services | Date | CACI Proprietary Information Mail & Calendaring  Microsoft Exchange.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Internet Safety Dr. Steve Broskoske Misericordia University.
Methods of communication
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
The Office Procedures and Technology
SURVEILLANCE SYSTEM HITRON DVR All rights reserved by Hitron Systems.
1 ITGS - introduction A computer may have: a direct connection to a net (cable); or remote access (modem). Connect network to other network through: cables.
Current Job Components Information Technology Department Network Systems Administration Telecommunications Database Design and Administration.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Chapter 11 Computers and Society, Security, Privacy, and Ethics.
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
INCORPORATING VOIP (VOICE OVER INTERNET PROTOCOL) PHONES IN THE WORKPLACE.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
Monitoring Employees on Networks: Unethical or Good Business?
Presented by Beang Tong ENGL393, Spring’03
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
M ONITORING Theresa Wynd CSCI 101 R 3:30. T ELEPHONE M ONITORING Employers may monitor calls with clients or customers for reasons of quality control.
Privacy at Johnson and Dresser By: Anuj Ghai & Ubaid Khan.
Hosted Voice & Hosted Contact Center
Surveillance and More Porsha J. Rice. Surveillance Cameras Nowadays surveillance cameras are virtually everywhere and in places such as: Schools Stores.
1 Enterprise Requirement Planning For Manufacturing.
Mobile Web products Brought to you by. This product is sold and implemented by a Franchise and Agent network.
Chapter 2Administrative Office Management, 13th Ed1 ADMINISTRATIVE OFFICE MANAGEMENT Chapter 2 Handling Administrative Management Challenges.
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
Monitoring Employees on Networks
ESSENTIAL STANDARD 2.00 Understand the nature of business. 1.
What is the Internet?. The Internet is millions of computers all over the world connected together so they can exchange information.
What is E-business Unit 3: E-business.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
HR: Leading People, Leading Organizations © 2006 SHRM SHRM Weekly Online Survey: September 29, 2006 Workplace Privacy Sample comprised of 442 randomly.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
4.03 Understand Information Technology activities and careers.
Information Technology Acceptable Use An Overview
IT Monitoring in the Workplace
BCOM 5 7 Communicating Electronically LEHMAN/ DUFRENE
To spy or not to spy; that is the question
Introduction to Computers
4.03 Understand Information Technology activities and careers.
PREPARED BY: RUMMY MIRANDA
4.03 Understand Information Technology activities and careers.
Introduction to Networks
Communicating Through the Internet and Other Technologies
4.03 Understand Information Technology activities and careers.
4.03 Understand Information Technology activities and careers.
Big Brother Camera’s Brittany Todd.
Presentation transcript:

FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010

WHAT IS EMPLOYEE MONITORING?  Supervising activities in progress to ensure… They are on course On schedule in meeting Completing the objective and performance tasks. I’m watching YOU!!

WHAT DOES AN EMPLOYER EXPECT ?  Make sure the employee is doing a good job.  The employee is not doing anything un-related to work.  Respect/Trust that the employee is doing what is expected of them.  Completeness of a given task.

 Computer and Internet connection is company property.  Employee productivity losses  Employee morale is low( not doing what is expected).  Catch trade secrets.  Protect the business. REASONS FOR MONITORING  Maintenance and Management of software  Application and Network Troubleshooting.  Storage and Bandwidth Capacity Planning.  Good for Employee Investigations.

4 TYPES OF MONITORING  Telephone  Computer  Electronic Mail/ Voice Mail  Video Think about your every move!

TELEPHONE MONITORING  Can my employer listen to my phone calls at work? YES!!! Employers may monitor call with clients/ customers for reason of quality control. Not every business is aware of this requirement… So the calls will be monitored without warning.

COMPUTER MONITORING  Employers can use computer software Which enables them to see what’s in the employee’s computer terminal.  Computer monitoring technique Allows employers to keep track of the amount of time spend away from the computer.

ELECTRONIC MAIL AND VOICE MAIL  If an electronic mail ( ) system is used at a company The employer owns it and is allowed to review its content.  Messages sent within a company As well as those that are sent from your terminal can be subject to monitoring by employer.

VIDEO MONITORING  Can employers use this in the workplace? YES!!! It’s a common method of deterring theft, maintaining security, and monitoring employees.  Video Camera Capture audio recording

LITTLE BROTHER It’s a software package that allows employers to monitor their worker’s internet use. It employs a database of 45,000 web sites. Productive Un Productive Neutral

EXAMPLE OF EMPLOYEE MONITORING

WORKS CITED "Employee Monitoring - Top Reasons to Monitor Your Employees." Employee Monitoring: Productivity Tool Network Software. N.p., n.d. Web. 10 Aug Knudson, Michelle. "10 Reasons Why You Should Monitor Your Employees & Internet Use at Work - Associated Content - associatedcontent.com." Associated Content - associatedcontent.com. N.p., n.d. Web. 10 Aug "Reasons to Monitor Employees." Computer Monitoring Software - Internet Monitoring. N.p., n.d. Web. 10 Aug Schulman, Miriam. "Little Brother is Watching You: Employee Monitoring." Santa Clara University - Welcome. N.p., n.d. Web. 10 Aug "Top 10 Reasons to choose Employee Activity Monitor | Computer Monitoring Software." PC Remote Monitoring Software - Remote Spy Software Imonitor Employee Activity Monitor - Computer Monitoring software to Monitor employees computer usage -. N.p., n.d. Web. 10 Aug "Workplace Privacy and Employee Monitoring | Privacy Rights Clearinghouse." Privacy Rights Clearinghouse | Empowering Consumers. Protecting Privacy.. N.p., n.d. Web. 10 Aug ) 2.) 3.) 4.) 5.) 6.)