Indecent Exposure – Are Your Private Parts Truly Private? (Privacy and Technology) Barbara Buckett Barbara Buckett & Associates 27 August 2008.

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
SO WHAT DOES THE AUP MEAN FOR ME…??? A Presentation for Students in Grades 3-5.
POSSIBLE THREATS TO DATA
Christina Gilleland Jonathan Carrasco Sam Peterson Thomas McIntyre.
BYOD: Privacy and Security Andrew Paterson, Senior Technology Officer.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
13.1 Chapter 13 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Policing the Internet: Higher Education Law and Policy Rodney Petersen, Policy Analyst Wendy Wigen, Policy Analyst EDUCAUSE.
Data Retention LIS 550 Winter 2010 Unsworth Tuesday, March 02, 2010.
Ethical Behavior 7-12 Conforming to moral standards or conforming to standards of conduct of profession or group Conforming to moral standards or conforming.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
The role of the Office of the Privacy Commissioner in telecommunications Andrew Solomon Director, Policy.
© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.
Free speech in the United States: Expression vs. Hostility Seeking a Balance: Enhancing the First Amendment Challenges.
Chapter 14: Ethics, Justice and Fair Treatment at Work
Taking Steps to Protect Privacy A presentation to Hamilton-area Physiotherapy Managers by Bob Spence Communications Co-ordinator Office of the Ontario.
Privacy in Computing Legal & Ethical Issues in Computer …Security Information Security Management …and Security Controls Week-9.
Protecting information rights –­ advancing information policy Privacy law reform for APP entities (organisations)
FSCPC1 Privacy in the workplace Chris Connolly Director Financial Services Consumer Policy Centre.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
Privacy After Nixon's resignation, the govt took control of all of his presidential records, including the tapes, in the Presidential Recordings and Materials.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.
(Edited) WORKPLACE PRIVACY.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Police ANPR Systems Surveillance camera Code of Practice An overview Presented by:Bill Mandeville Date:23 rd October 2013.
Privacy 2. Digital Dossier The data shadow The digital dossier Your own diary of recordable events.
CS 306 Unit 3 Work and The Workplace. CS 306 A guest worker program that provides seasonal and hard-to-find-labor is in the news. What are the pros and.
BUSINESS B1 Information Security.
PRIVACY Britt, Beattie and Amy. What are the issues regarding privacy on the internet? Privacy issues arise everyday. Examples of when privacy becomes.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Chapter 12 by Lisa Reeves Bertin Securing Information in a Network.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Dating at Wal-Mart Dating relation between a married associate is prohibited Maintain businesslike relations and avoid turmoils of extra marital affairs.
Privacy Professional Practice for Computer Science Guest Lecture, 05 March 2007 Philippa Lawson Director, Canadian Internet Policy & Public Interest Clinic.
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
Identity Crisis: Global Challenges of Identity Protection in a Networked World Alison Knight.
Risk assessment of science experiments: the logic and the process Phillip Crisp and Eva Crisp.
14.1 Chapter 14 Privacy © 2003 by West Legal Studies in Business/A Division of Thomson Learning.
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
…refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected and stored.
PRESENTATION ON SURVELLANCE Introduction It is the monitoring of the behavior, activities, or other changing information, usually of people. It is sometimes.
Configuring Electronic Health Records Privacy and Security in the US Lecture a This material (Comp11_Unit7a) was developed by Oregon Health & Science University.
Monitoring By Krystal Thousand. What is Monitoring in the Workplace? record and review their employees' communications and activities on the job, including.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Unit 32 – Networked Systems Security
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
Copyright © 2009 by The McGraw-Hill Companies, Inc. All Rights Reserved. McGraw-Hill/Irwin Chapter 6 The Privacy and Security of Electronic Health Information.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
Judicial Training on Data Protection and Privacy Rights
Explaining strategies to ensure compliance with workplace legislation
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
Internet law Business law.
SURVEILLANCE IN THE WORKPLACE: WHAT YOU SHOULD KNOW
April 7, 1999 Privacy in Transition -- and What’s Next? Alan F. Westin Professor of Public Law & Government Emeritus,
Handout 9: Organisational policies and procedures
Privacy and Data Mining
Privacy and Data Mining
Presentation transcript:

Indecent Exposure – Are Your Private Parts Truly Private? (Privacy and Technology) Barbara Buckett Barbara Buckett & Associates 27 August 2008

Conflict – Between the Person and the Workplace Has the privacy legislation lost its effectiveness in the workplace with the advancement in things “cyber”? Should there be regulatory control over the access of personal information through online searches and social networking sites, such as Bebo, Facebook etc? Should an organisation have a right to know you?

The Balance What constitutes a balance between privacy and other social interests in the workplace? Has the pendulum swung too far in favour of the workplace? Is the current legislation effective in regulating workplace intrusions into the personal?

Drug Testing in the Workplace Electronic Monitoring –Search engines, internet, , GPS devices, recording phone calls, radio frequency identification devices (RFID) Workplace Surveillance –Video cameras, voice recording, key loggers, bugs, internet logs Pre-employment Enquiries –Psychometric testing, job applications, references Regulatory Compliance Authenticity of Information Privacy Challenges: Topical Issues Blurring the Demarcation

Pre-employment Enquiries –Limited protection, very little discourse on what constitutes “necessary and reasonable” –Low threshold which is not difficult for an organisation or employer to satisfy Video Surveillance –The Privacy Act 1993 does not limit the use of Monitoring , Internet and Search Engines –The Privacy Act 1993 has not been active in these situations –No control Drug and Alcohol Testing –The powers under the privacy legislation to limit such testing is dubious The Privacy Act 1993

Resolution of the Conflict More control of information Minimal intrusion Greater protection from misuse

What do Individuals Need to Protect their Personal Information? Freedom from intrusion Control of personal information Freedom from unsolicited monitoring Protection from misuse

The Road Ahead… Do nothing and face the consequences Rely on employment law to redress any imbalance in the workplace Recognise the threat posed by modern technology Reform the old Act to align with developments in technology science and human rights Amend the legislation to ensure personal information is not misused Introduce privacy codes (minimum standards) Bring New Zealand laws in line with other countries policies and legislation Maintain the Status QuoConsider Alternative Approaches