LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Its more than a game, its your life…. What do you do online?
Northside I.S.D. Acceptable Use Policy
Hart District Acceptable Use Policy Acceptable Use Policy.
Woodland Hills School District Computer Network Acceptable Use Policy.
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
The Woodlands High School
Consumer Issues Chapter 28.
Top 10 Mistakes Employers Make and How to Keep from Making Them Ashley Scheer Jackson Walker L.L.P. 901 Main Street, Suite 6000 Dallas, Texas (214)
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Little brother is watching you
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
IST346: Information Ethics. Ethics  Ethics are the principles of conduct that govern a group of people.  Ethics are not morals.  Morals are the proclamation.
1 Freedom of Expression Prepared By Joseph Leung.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Group E: Brittany Caleb John & Rishi MGS 3040 section 4.
By: Brittany Hutcherson CSCI 101 Mrs. Garrison Thursday 3:30-4:45 EXTRA Points Assignment.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
INTERNET and CODE OF CONDUCT
Ethical Implications of Social Media Use in Organizations Jennifer Sawayda Program Specialist Anderson School of Management University of New Mexico Albuquerque,
For Students of Humble ISD
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn.
COMP 2903 A12 – Privacy Legislation and Surveillance Software Danny Silver JSOCS, Acadia University.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Electronic Use Policies.   Social Media  Internet.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
An Educational Computer Based Training Program CBTCBT.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
Keyloggers At Work Jason Clark. History Believed to have been first used by the government Believed that they were used in the early 1990’s Software key.
OBJECTIVE 3 ELECTRONIC COMMUNICATIONS. USES OF COMPUTING Pros Made tasks such as clerical work and computing easier and faster Buying, banking, and paying.
COMPUTER ETHICS Do you know the difference between right and wrong?
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
ARE THE FOLLOWING SITUATIONS ETHICAL?. Your new computer comes with Microsoft Office 2003 already installed on it. Included in your box of software is.
00870B2F.0/Internet%20Safety.jpg.
Fort Bend ISD Acceptable Use Policy Training Student Training.
Monitoring Employees on Networks: Unethical or Good Business?
Presented by Beang Tong ENGL393, Spring’03
Code of Conduct 344 Code of Conduct 344. Code of Conduct 344 Introduction; Do you agree with the following statements? Employers need their employees.
BEING CYBERSMART! ABOUT ONLINE SAFETY AND SECURITY AT SCHOOLS Redelivery Part 1: The AUP.
Ethics. Ethics are the principles and standards we use to decide how to act.
ACCEPTABLE INTERNET USE POLICY BY: BRANDON POLK, SUBHAN NADEEM.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Privacy at Johnson and Dresser By: Anuj Ghai & Ubaid Khan.
Is monitoring employee’s internet usage moral? By: Brittany Tindall and Hannah Tyson.
Squalicum High School Computer Network Student Use Guidelines.
It’s more than a game, it’s your life… What do you do online?
LAUSD Responsible Use Policy (RUP) BUL – Attachment A.
Technology and the Law R. Keith Booker, Ed.S Memphis East High School.
INTERNET SAFETY.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
Monitoring Employees on Networks
Woodland Hills School District Computer Network Acceptable Use Policy.
Facing Facebook: The Reality of Life in a Virtual World Maria Mancusi, Janine Bowen, Courtney Dillon, Nelly Zorilla.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
YOU’RE IN BUSINESS YOUR PEOPLE ETHICS IN BUSINESS.
Ethical dilemmas arising from information management strategies used by organisations Ethics & Information Systems.
IT Monitoring in the Workplace
To spy or not to spy; that is the question
10 MISTAKES EMPLOYEES MAKE AT WORK
Being CyberSmart! About Online Safety and Security At Schools
LAUSD Responsible Use Policy (RUP)
Internet Safety and Acceptable Use Policies.
Internet law Business law.
COMPUTER ETHICS: Gender Effects and Employee Internet Misuse
Ethics & Privacy CSCI 101.
Woodland Hills School District
Presentation transcript:

LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton

THE ISSUE  Little Brother  Database of 45,000 web sites  Employers monitor their employee’s internet usage.  Productive, nonproductive or neutral  Provides employee ratings  Block objectionable web sites  Remotely enter employee hard drives  Read employee  Find deleted s

THE LAW  1986 Electronic Communications Privacy Act,  “illegal for unauthorized individuals to look at someone else’s ,” but the Act exempts service providers from these provisions.  Santa Clara University Professor of Law Dorothy Glancy  "Often, court opinions take the point of view that when the employees are using employers' property—the employers' computers and networks—the employees' expectation of privacy is minimal.”

THE LAW  Example:  man fired for inappropriate s to his supervisor about management.  claimed his rights were violated because the company promised him his s were private.  courts ruled in the company’s favor  “ The company's interest in preventing inappropriate and unprofessional conduct outweighed the man’s privacy rights.”

CASE FOR WORKPLACE MONITORING  employers can use the software to find and delete games that employees have downloaded or installed so…..  No issue with employers expecting computers they provide for work to be used for work so…  Big deal employers look through employee internet browsing history to see if they are spending their time on work- related activities?  Nielsen Media Research:  employees at major corporations such as IBM, Apple, and AT&T logged onto the online edition of Penthouse thousands of times a month.”

CASE FOR WORKPLACE MONITORING  Employees using to steal key information from them:  The article cited a man who was caught ing his personal account $5 million bytes of company source code on company products. It was found out he was doing this to bring it to a rival company of which he was leaving to go work for!  Being sued for inappropriate work atmospheres due to inappropriate s.  Sexual / Racial Jokes  Pornography in s

CASE AGAINST WORKPLACE MONITORING  Employee writes a note to her boyfriend, puts it in an envelope, affixes her own stamp, and drops it in the outgoing mail  Fact that the pencil and paper she used belong to her employer give her boss the right to open and read the letter?  Is this so different than the employer looking into just because they own the computer?

CASE AGAINST WORKPLACE MONITORING  As long as their internet usage does not interfere with the job  The time management spends monitoring employee usage is just as much a waste of time  While employee computers are being monitored, who is monitoring management’s computers?

CAN THERE BE COMMON GROUND?  Employers:  honest up front about how much “computer privacy” employees will actually have.  Employees:  If told up front and not OK with it, go somewhere else  Survey of employees:  Most employees heard about their policy by word of mouth or were involved in the writing of the policy.

MY OPINION  No problem  Keep the big picture in mind.  If employee is looking at pornography, then yes, I deserve to have consequences.  If it is shown that employee has spent time on ESPN.com, and work is getting done, then who cares!

MY OPINION  Companies need to take a look at worker productivity in terms of the work that is assigned to employees.  If they see someone is getting their job done but has spent hours on non- work related sites, then give them more work to do, not fire them!  Management should not be allowed to look at employees’ unless it is needed in some sort of legal issue.

ARTICLE  Miriam Schulman, Santa Clara University 