COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Northside I.S.D. Acceptable Use Policy
Are you being a safe and successful digital citizen? E-safety
Acceptable Use of Computer and Network Resources Jim Conroy Acting Director, Academic Computing Services September 9, 2013.
ERICK BECKER || || 949–852–1800 || Social Media in the Workplace: Guidelines for Employers May 27, 2014 Erick.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Things To Consider  If you were an employer would you condone the use of personal electronics?  Would screening s that come through the work.
Little brother is watching you
Ethical Behavior 7-12 Conforming to moral standards or conforming to standards of conduct of profession or group Conforming to moral standards or conforming.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Chapter 14: Ethics, Justice and Fair Treatment at Work
1 Business Ethics and Technology Chapter 9 Professor Craig Diamond BA 385 October 28, 2009.
INTERNET and CODE OF CONDUCT
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
E-monitoring in the Workplace Trent and Jamila Robert and Jamie Trent and Jamila Robert and Jamie.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.
(Edited) WORKPLACE PRIVACY.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Intellectual Property, Nondisclosure agreements, Electronically Monitored Workplaces, And high level thinking questions.
Electronic Use Policies.   Social Media  Internet.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
Class 6 Internet Privacy Law Social Media Privacy.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
Employee Guidelines for Acceptable Use of Technology Resources.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Indecent Exposure – Are Your Private Parts Truly Private? (Privacy and Technology) Barbara Buckett Barbara Buckett & Associates 27 August 2008.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Ethics and Privacy in Cyberspace Lesson 20. Privacy and Other Personal Rights Thomas J. Watson, Chairman of the Board for IBM, once stated: Today the.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Monitoring Employees on Networks: Unethical or Good Business?
Mrs.. Taylor Cedar High School Business Web Page Design.
Web is public space. So, when we are connected to it we have to follow some rules. What is illegal Offline is illegal Online!!! Internet gives us opportunities.
Privacy & Confidentiality
PROGRAMMING JAVA Mrs. Taylor Top Ten Best Careers for College Students Mind2it.com 1. Software Engineer 1. Software Engineer 5. Computer Systems.
Chapter 8 Ethics and Technology
"Share Our Pride" Our Mission Statement "To educate students for the future through collaborative efforts of students, families, staff and community."
Lee County’s intent is to provide free and equal access to resources via the internet. All school rules for appropriate use of technology also apply.
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
By: Christina Anderson EDTC 630. AUP stands for Acceptable Use Policy  The AUP is an outline of procedures/rules to inform all students and employees.
INTERNET SAFETY.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Woodland Hills School District Computer Network Acceptable Use Policy.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
OCR Nationals - Unit 8 E-commerce – go to slide 11.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Moral, Ethical, legal and cultural issues How technical innovation leads to moral, ethical, legal and cultural issues How our own moral and ethical beliefs.
Acceptable Use Policy.
Chapter 9: Internet Law, Social Media, and Privacy
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
To spy or not to spy; that is the question
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
– Communication Technology in a Changing World
COMPUTER ETHICS: Gender Effects and Employee Internet Misuse
Presentation transcript:

COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University

Daryl Nord, Tiption McCubbins, and Jeretta Nord Communications of the ACM, August, 2006

Big Brother is Here Workplace Monitoring and Surveillance Survey of 2001 conducted by the AMA 75% of major US employers record and/or review: – – Telephone – Internnet – Computer files Twice the 1997 rate

Privacy What does the term mean? Webster: – A) The quality or state of being apart from company or observation – B) freedom from unauthorized intrusion One has a right to privacy in their home Do they have the same in the work place?

Employer’s Have Real Concerns 2002 stat: 62% of US workers went online at work for personal reasons 78% of employers report blatant abuse of organizational internet policies: – Downloading pirated s/w, pornography – Shopping online – Personal , inappropriate – Surfing the web, watch videos, playing games 10% of US companies have received legal threats because of employee Many companies sued for employee actions

Employer’s Are Taking Action Monitoring employee’s computer and internet use – see table at top of page : – Over 52% of employers monitor – 22% have terminated employees for violations of policy

So what is your right to privacy in the work place? Constitution / Bill of rights ensures this? In US rights to privacy in constitution pertain only to state action – not private company work scenarios Rights to privacy come from Fed legislation and State common law

Electronic Comm. Privacy Act (ECPA) Covers broad interests of privacy, but limits expectations of employees with respect to employers: – Provider exception – company provides, then the information is theirs – Ordinary course of business exception – the employer has the right to monitor quality control and unauthorized use or misuse of equipment Can persona voice and be monitored in the US? – Consent exception – if either party in a conversation consents to use of info – it is OK

State / Provincial Case Law Employees have tried to use invasion of privacy as a protection in the workplace Generally two problems: – Employee must have a reasonable expectation of privacy – McLaren v. Microsoft (see p.55) – Intrusion must be highly offensive to a reasonable person Social Media Policies: Media/social-media-a-facebook-policies.html Media/social-media-a-facebook-policies.html

Monitoring H/W and S/W Employers have an extensive arsenal of technology they can pay to use See last page of article: – Multiple employee machines can be simultaneously monitored ( , chat, forums) – Local files can be copied and changes to them logged – Commands to employee computers can be execute remotely (scary!!)

Org. Electronic Comm. Policy Signed by employees should contain statements that: – Comm. equipment is owned by company – Have the right to monitor – Right to know & keep copies of passwords – Inappropriate comm. are prohibited, including access a website with offensive content – Employees should not voice personal opinions using company comm. technology

Assignment #2 In Nova Scotia, what is a person’s right to privacy in the work place. Please investigate and report major findings. Do you feel that the provisions are adequate so as to protect both the workers and the organizations. Provide all references Keep your response to no more than 1.5 pages PROOF READ BEFOR SUBMITTING