Presented by Beang Tong ENGL393, Spring’03

Slides:



Advertisements
Similar presentations
/0403 © 2004 Business & Legal Reports, Inc. BLRs Training Presentations Privacy Issues in the Workplace.
Advertisements

Substance Abuse In the Workplace What Supervisors Need to Know.
What’s New in HR? Presented by Kellie Boysen, MBA, PHR From Alternative HR.
4/00/ © 2000 Business & Legal Reports, Inc. BLR’s Human Resources Training Presentations Workplace Safety 101.
Supervisor Orientation for Student Employment 2010 – 2011 Academic Year Office of Student Employment Utica College Fall 2010.
The Legal Series: Employment Law I. Objectives Upon the completion of training, you will be able to: Understand the implications of Title VI Know what.
Employee Handbook / Personnel Policies Doug Scott, Industrial Steel Treating Co.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Things To Consider  If you were an employer would you condone the use of personal electronics?  Would screening s that come through the work.
What Should You Do If OSHA Knocks Mark McDaniel, INSafe Consultant.
PRIVACY & SECURITY HOW MUCH DO YOU KNOW ABOUT PRIVACY AND SECURITY?
Kusserow: “The Government Needs Comp Matching …” Published in the same journal as Shattuck. Comp matching ensures taxpayers’ money is safeguarded without.
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
© 2004 West Legal Studies in Business A Division of Thomson Learning 1 Chapter 33 Labor and Employment Law Chapter 33 Labor and Employment Law.
Progressive Discipline. © Business & Legal Reports, Inc Session Objectives Apply progressive discipline steps fairly and consistently Identify laws.
1 Spring 2008 Employee Relations Issues Policies, procedures, rules Employee discipline Grievances Employee rights.
MIRMA SPRING TRAINING 2014 PRESENTED BY JANE DRUMMOND WAGE AND HOUR LAWS EMPLOYMENT PRACTICS UPDATE.
Monitoring employee telephone communication Allow monitoring of number of phone calls, duration of calls, numbers to which calls are placed –Such monitoring.
The laws Organizations are covered by lots of different laws
WE PUT YOU BACK IN CONTROL OF YOUR BUSINESS. SACS CONSULTING & INVESTIGATIVE SERVICES.
"Can I give this out?" What Frontline Staff Need to Know About FOI and Privacy 2010 LGMA Administrative Professionals' Conference Paul Hancock, City of.
Staying Healthy and Safe Make Safety Your Business
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Introduction to Fraud Examination. Discount Plus Company has been concerned for some time about its cash flows. Since the company began five years ago,
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
Landline and Mobile Phones Trixie Francisco. What is Wiretapping? Wiretapping is the monitoring of telephone or Internet conversations by a third party,
Module 3 1x1 Class Mock Interview  Structured Interview ◦ Uses a set of standardized questions asked of all job applicants. ◦ Useful for initial.
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
Internet Safety Part II CyberBullying. Judson Independent School District … strives to provide a safe, positive learning environment for students in our.
(Start of Slide) (Press Shift+F5 to begin Slide Show) (Click mouse once to begin)
(Edited) WORKPLACE PRIVACY.
Electronic Use Policies.   Social Media  Internet.
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Contributions by: Adam Kent, Josiah Meurer, Jessica Weber, Hillary Nagy and Michael Doyle.
Monitoring Employees , Social Media, Phones, & GPS Tracking GROUP 4 Peter Rankin, Kayla Roache, Derrick Fulton, Pam Goulais Janet Lavoie, Eric Annala,
Dating at Wal-Mart Dating relation between a married associate is prohibited Maintain businesslike relations and avoid turmoils of extra marital affairs.
Business Communication, 14 th edition by Lehman and DuFrene  Copyright 2005 by South-Western, a division of Thomson Learning Chapter 5 Communicating Electronically.
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
The Best Identity Protection
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
Chapter 40 Labor and Employment Law. 2  What is the employment at will doctrine? When and why are exceptions made?  What federal statutes govern working.
©2001 West Legal Studies in Business. All Rights Reserved. 1 Chapter 21: Employment Relationships.
Is monitoring employee’s internet usage moral? By: Brittany Tindall and Hannah Tyson.
DATA PROTECTION ISSUES PERFORMING VIDEO SURVEILLANCE XIV Case Handling Workshop Athens, November 2006.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 9 Ethics and Information Technology Understanding Business Ethics Stanwick.
 Make a list of things you did today. From the time you got up until now.  Who you talked to? How you communicated?  What you did before you came to.
“How Technology Is Changing Privacy Issues In The Workplace” By Catherine Clarke.
Hayes/Ninemeier: Foundations of Lodging Management. (C) 2006 Pearson Education, Upper Saddle River, NJ All Rights Reserved. Safety and Security.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Welcome to the ICT Department Unit 3_4 Code of Conduct.
LEGAL AND MORAL ISSUES – CODE OF CONDUCT Year 13.
Car Insurance- Why car insurance? It is the LAW Why car insurance? It is the LAW.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
Unit 2- Privacy and Cyberspace Kaizen MIDTERM Definition of Terms How is Technology eroding our privacy and anonymity? Protecting privacy online.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
Health, Safety and Privacy in the Workplace OSHA Worker’s Compensation Polygraph Protection Act Electronic Communications Privacy Act.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
Bringing Human Rights to the Workplace Avoiding Unpleasant Encounters with Civil Rights Lawyers Lewis Maltby President National Workrights Institute.
Privacy Group 1 Gerson De Conti II Robert Rhyne Chris Glasnapp
Chapter 20: Employment Relationships
Chapter 10 Cyberlaw, Social Media, and Privacy
To spy or not to spy; that is the question
Data Protection Act and Other Laws
Health and Safety! By jack Hughes.
How would you define media? Give an example
Presentation transcript:

Presented by Beang Tong ENGL393, Spring’03 “How Technology Is Changing Privacy Issues in the Workplace” -By Julie Cook Presented by Beang Tong ENGL393, Spring’03

Introduction How the technology is changing The idea of a government spying is nothing new The technology has made the intrusions much easier and more ubiquitous Spying is a lot easier than it used to be: An employer had to hire a private investigator for eavesdropping on employee’s phone call Employer can eavesdrop just with the push of a button on the phone

Introduction (cont.) The number of employees subject to some form of surveillance in the workplace has been increased from 8 million to 30 million Americans on surveillance within 1991 and 1999

Yes, you are being watched! More than 89 percent of Americans fear being watched in their workplace 35 percent of companies monitor their employees during working hours More employers are using devices of reviewing, videotaping, or eavesdropping on their workplace There is no federal law designed to protect their employees’ privacy while at work

No legal precedence…yet Companies are hesitant to monitor employees in workplace because of the fear of lawsuits and employment law revolution A company has to consult with a lawyer on some policy or method of surveillance Monitoring polices are useful in different situation: To be clear about the use and misuse of company property To inspect and monitor as needed when employees are using company property

The obvious, up-front approach Avoid lawsuits by taking the hidden surveillance approach to employee monitoring Guess Inc. has videotaped actions of the company employees for more than five years The cameras were put into place to prevent, but are useful in many ways Provide more protection or safety in employees environment Discover worker’s compensation fraud Catch employees using illegal substances on their lunch hour

Caught in the act Lessened the percentage of employees committing worker’s compensation fraud Guess Inc. has saved approximately $20 million in worker’s compensation claims Decreased workplace theft Improved safety record Employer should wait until a situation arises to monitor employees actions rather than having surveillance devises permanently in place

The security check is in the mail 62 percent of companies prepare written e-mail polices 83 percent of those written polices prohibit sexual or other inappropriate e-mails 67 percent defined disciplinary procedures for those who disregard policy guidelines More companies may develop written polices, but without controls in place to monitor or screen the e-mails going or out, policies are still worthless

A warning that works Notify employees that they are not allowed to send personal email by using company resources during business time A Premium Financing Specialists in Kansas city, Missouri, was sending 50 to 70 personal messages every Friday afternoon Employees were told not to get mail from their friends or communicate with their parents Get your own Internet account at home!

Conclusion I prefer companies using videotaping or monitoring employees at workplace.

The end