Download presentation
Presentation is loading. Please wait.
Published byCalvin York Modified over 9 years ago
1
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn
2
Web WatcherSpector ProSpy AgentPc Pandora http://top-monitoring-software.com/
5
Key Stroke Monitoring Time Stamped Internet Connection HTTP, FTP, SMTP, POP3, TCP/UDP, IP, & Messaging. Application Monitoring
6
Remote Surveillance More restrictive E-mail Forwarding Interception of Messages SMTP, POP3 Filter/Block Content Remote freeze/lock up
7
Based on an American Management Association survey 75% of companies monitor website surfing. 50 % retain and review emails 30% track keystrokes 80% of employers disclose their monitoring policies to their employees.
8
In 1990 an employee (Lori Eaton) of Nissan was conducting a training session demonstrating the use of their email system. Lori Eaton randomly selected an email to show how it worked, and the Email that was viewed was of an employee named Burke. This email contained personal, sexual nature dialogue and not business related. Eaton Reported the Incident to her supervisor who then with managements authorization reviewed the Email messages for the entire workgroup. Nissan found a substantial amount of emails that contained many sexual messages between Bourke and Hall.
9
Nissan issued warnings for use of it’s computer systems for personal use. Bourke was eventually fired and sued Nissan Corporation on the following grounds: – Common Law Invasion of Privacy – Violation of Constitutional Right to Privacy – Violation of Criminal wiretapping and eavesdropping statutes – Wrongful Discharge in violation of public policy
10
The court ruled in favor of Nissan Motor Corporation based on two grounds: – Based on the undisputed facts, plaintiffs had no reasonable expectations to privacy in their E-mail messages being sent on the company’s network and computers. – Plaintiffs failed to submit a separate statement meeting the requirements of Code of Civil Procedure section 437c.
11
Coverage for both public and private sector employees. That employees should have notice of data collection processes. That data should be collected and used lawfully and fairly. That employers should collect the minimum necessary data required for employment. That data should only be collected from the employee, absent consent. That data should only be used for reasons directly relevant to employment, and only for the purposes for which the data were originally collected. That data should be held securely. That workers should have access to data. That data should not be transferred to third parties absent consent or to comply with a legal requirement. That workers cannot waive their privacy rights. That medical data is confidential. That certain data, such as sex life and political and religious beliefs, should not be collected. That certain collection techniques, such as polygraph testing, should be prohibited.
12
High stress levels Low employee morale Depression Other nervous disorders Loss of trust Low productivity More sick days Low self respect -These problems lead to loss of revenue and efficiency in the workplace
13
Economic Loss Employees being denied the right to conduct a few personal matters at work often leave early to take care of them Managers and supervisors that spend more time monitoring employees are cutting back on their own efficiency and productivity Less time working means less revenue
14
"Employees are autonomous moral agents. Among other things, that means they have independent moral status defined by some set of rights, not the least of which is the right NOT to be used by others only as a means to increase overall welfare or profits. If a boss were to monitor every conversation or move, most of us would think of such an environment as more like a prison than a humane workplace.” SCU professor of philosophy Michael J. Meyer on privacy
15
Professor William Parent- points for determining whether an invasion of privacy is justifiable 1. For what purpose is the undocumented personal knowledge sought? 2. Is this purpose a legitimate and important one? 3. Is the knowledge sought through invasion of privacy relevant to its justifying purpose? 4. Is invasion of privacy the only or the least offensive means of obtaining the knowledge? 5. What restrictions or procedural restraints have been placed on the privacy-invading techniques? 6. How will the personal knowledge be protected once it has been acquired?
16
News report: Workplace Privacy
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.