E-Mail Privacy at Johnson and Dresser By: Anuj Ghai & Ubaid Khan.

Slides:



Advertisements
Similar presentations
A Reliable and Secure Network TM105: ESTABLISHING SANE TECHNOLOGY POLICIES FOR YOUR PROGRAM.
Advertisements

Developed by Technology Services 1:1 Laptop Initiative
M. Guymon Pleasant Grove High School Spring 2003 Ethics & Computer Technology Day 18.
Computer Technology Day 18
Little brother is watching you
School of Risk Control Excellence Employee Use of Social Media The Impact of the Virtual World on Disciplining and Firing Employees Laura Lapidus, Esq.
By Corinne Vassallo, Melody Lu, Natalie Severson, Michael Ghormley, Stephanie Mao.
BUSINESSES AND THEIR EMPLOYEES 11 April. Employers survey, track, or record all or certain aspects of employee’s behavior or performance Workplace Monitoring.
Ethics in a Computing Culture
 IT pro’s work raises ethical issues involves privacy. Ex: Should company have right to monitoring employees’ ? Should company have right to log.
Business Plug-In B7 Ethics.
Workplace Monitoring Store & review messages (keyword search): 46.5% Store & review computer files (keyword search): 36.1% Monitor Internet connections:
Use the Internet to Find a Job Presented by Highland College Placement Office.
© 2005 by Nelson, a division of Thomson Canada Limited. 1 Business Ethics and Technology Search the Web If you are interested in ethics conversations.
Format Scandisk Defragmentation Antivirus Compression Software
 This presentation is not a implication, accusation or insinuation of GPC’s policy and procedures for monitoring employees.  This presentation is for.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Jared Cinque Section 6.  Internet tracking is the process of following internet activity backwards from recipient to user through a special type of software.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
Internet Safety By Megan Wilkinson. Viruses If your computer haves a viruses on it, it will show one of them or a different one. All commuters have different.
Melissa Harrigan. Podcasts Podcasts are mini-broadcasts that can be viewed on the internet or downloaded to MP3 players It’s the new way to watch TV or.
PowerPoint Presentation by Charlie Cook The University of West Alabama CHAPTER 14 Student Version © 2010 Cengage Learning. All Rights Reserved. May not.
Methods of communication
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
CPS Acceptable Use Policy Day 2 – Technology Session.
(Edited) WORKPLACE PRIVACY.
Ethics & Computer Technology. Ethics are…  A set of principles of right conduct.  A theory or a system of moral values.  The rules or standards.
Intellectual Property, Nondisclosure agreements, Electronically Monitored Workplaces, And high level thinking questions.
Electronic Use Policies.   Social Media  Internet.
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 2: Privacy.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
The Advantages And Disadvantages Of Monitoring At Work
Monitoring Employees on Networks: Unethical or Good Business?
ETHICAL ISSUES SURROUND ELECTRONIC COMMUNICATIONS Unit 3.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
LITTLE BROTHER IS WATCHING YOU The legal and ethical issue of employer’s looking over the shoulder of their employees. Jeff Linton.
MODULE 17 COMMUNICATION “Listening can be the key to understanding” What is communication and when is it effective? How can we improve communication with.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 9 Ethics and Information Technology Understanding Business Ethics Stanwick.
R. Stewart Fayetteville High School Ethics & Computer Technology Day 18.
. There are 2 ways in which Cable Ties can use the technicians smartphone to track their current location. 1. GPS – uses satellites to triangulate the.
Chapter 2Administrative Office Management, 13th Ed1 ADMINISTRATIVE OFFICE MANAGEMENT Chapter 2 Handling Administrative Management Challenges.
Privacy Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
A Gift of Fire Fourth edition Sara Baase
DATA ACCURACY- one of the issues of computer ethics. Providing inaccurate data input results in erroneous information & decision making. Information on.
HART RESEARCH ASSOTESCIA Key findings from telephone survey of parents of children who access the Internet, conducted for Who Needs Parental Controls?
Virus Assignment JESS D. How viruses affect people and businesses  What is a virus? A computer virus is a code or a program that is loaded onto your.
Monitoring Employees on Networks
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
 Information privacy involves the protection of an individual’s personally identifiable information. Such information can include health records, criminal.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
 Nick Michalak & Kelsey Bretz.  Introduction  Amendment Rights  New Technologies  Surveillance  New Legislation  Case Studies  Conclusion.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
HR: Leading People, Leading Organizations © 2006 SHRM SHRM Weekly Online Survey: September 29, 2006 Workplace Privacy Sample comprised of 442 randomly.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Privacy Issues at Work Training for Supervisors. ©SHRM Introduction More than 50 years ago, George Orwell wrote the novel Nineteen Eight- Four.In.
IT Monitoring in the Workplace
To spy or not to spy; that is the question
Computers: Tools for an Information Age
MICROSOFT OUTLOOK and Outlook service Provider
Spyware. By: Katheryn L. Gaston.
IT and Society Week 6: Work.
Employee Monitoring Solution
Presentation transcript:

Privacy at Johnson and Dresser By: Anuj Ghai & Ubaid Khan

Essential conflict of workplace monitoring Employers concern Employers concern Employees concern Employees concern New Technology = Telephone, Computers, , Voice mail, internet New Technology = Telephone, Computers, , Voice mail, internet Privacy Rights Clearinghouse / UCAN: Majority employers monitor employees. Privacy Rights Clearinghouse / UCAN: Majority employers monitor employees. Evidence worth? Evidence worth? 26% of Employers have fired workers for misusing the Internet. 26% of Employers have fired workers for misusing the Internet. 25% have terminated employees for misuse. 25% have terminated employees for misuse. 6% have fired employees for misusing office phones. 6% have fired employees for misusing office phones.

Employer's window into your workspace Types of computer monitoring: Computer Software Keystroke Monitoring Time spent on computer

Don’t think your job is scrutinizing your every move? American Management Association’s findings in 2005:  Three-fourths employers monitor web site visits  65% block connections to web sites  A third track keystrokes  Half review messages

Is my employer allowed to see what is on my terminal while I am working? Employer’s property Employer’s property Limited Protection: Union contracts Limited Protection: Union contracts Fourth Amendment defends against unreasonable search and seizure Fourth Amendment defends against unreasonable search and seizure How can I tell if I am being monitored at my terminal? Employers allowed to monitor without employee’s knowledge Ways of being notified: memos, employee handbooks, union contracts, at meetings or on a sticker attached to the computer Usually find out during a performance evaluation

Johnson and Dresser Johnson and Dresser = retail brokerage Johnson and Dresser = retail brokerage John Perry worked as an Information Systems director John Perry worked as an Information Systems director Purchased and Installed Purchased and Installed Users unaware of s archived Users unaware of s archived Scandal broke out Scandal broke out s were monitored s were monitored

Johnson and Dresser Lisa Curry was responsible for following the utility industry Lisa Curry was responsible for following the utility industry She engaged in discussions with Margaret Leonard She engaged in discussions with Margaret Leonard She sent Leonard messages that conveyed the latest company gossip She sent Leonard messages that conveyed the latest company gossip Manager saw the s and Curry received a salary increment and a mixed performance review. Manager saw the s and Curry received a salary increment and a mixed performance review. Perry felt bad for Curry Perry felt bad for Curry He tried to get rid of the policy, but instead was asked to come up with a new policy He tried to get rid of the policy, but instead was asked to come up with a new policy

4 Ethical Theories Kantian Act Utilitarian Social contract Rule Utilitarian

Our opinion.. Most employers are notifying employees when they are being watched. 80% inform workers 80% inform workers 82% let employees know the company stores files 82% let employees know the company stores files 86% alert employees to monitoring 86% alert employees to monitoring 89% notify employees that their Web usage is being tracked. 89% notify employees that their Web usage is being tracked. Yet Johnson and Dresser choose not to let their employees know that their s were being archived.

Bibliography dfhttp:// dfhttp:// dfhttp:// df http:// http:// http://