ISM-473: Computing Ethics and Society. Unit 6 Work
|
|
|
- Vivien Neal
- 10 years ago
- Views:
Transcription
1 ISM-473: Computing Ethics and Society Unit 6 Work
2 AGift of Fire Fourth edition Sara Baase Chapter 6: Work Lecture 18
3 What We Will Cover Employee Communications and Monitoring
4 Book NO: Learning About Job Applicants The Web and social media provide new means of information collection on job applicants. Employers: search online newsgroups and social networks hire data-collection agencies use a variety of screening methods to efficiently reduce a large pool of applicants to a reasonable number Some job-seekers attempt to clean up their online persona.
5 Risks and Rules for Work and Personal Communications Employee monitoring is not new Employers have always monitored their employees. Degree of detail and frequency of monitoring has varied depending upon kind of work, economic factors, and available technology. (Time-clocks and logs.) Early monitoring was mostly blue-collar (factory) and pinkcollar (telephone and clerical) jobs Bosses patrolled the aisles watching workers Output counts at the end of the day Book NO:
6 Risks and Rules for Work and Personal Communications Separating or merging work and personal communications Employers often prohibit employees from using their work , computers, and other devices for personal use. What about employees using personal accounts, social media, laptops, smartphones, and other devices for work? Overhead of managing and maintaining systems to work with variety of brands and operating systems Security of company information and operations Book NO:
7 Risks and Rules for Work and Personal Communications Monitoring employer systems Roughly half of major companies in U.S. sometimes monitor the or voice mail of their employees on company systems. Most companies monitor infrequently, some routinely intercept all . Book NO:
8 Risks and Rules for Work and Personal Communications Monitoring employer systems Many major companies use software tools that provide reports on employee Web use. Employees spend time on nonwork activities on the Web Some companies block specific sites (e.g. adult content, sports sites, job search sites, social-network sites) Book NO:
9 Risks and Rules for Work and Personal Communications Monitoring employer systems Purposes of monitoring employee communications include training, measuring or increasing productivity, checking compliance with rules for communication, and detecting behavior that threatens the employer in some way. Concerns over security threats such as viruses and other malicious software Concerns about inappropriate activities by employees (e.g., harassment, unprofessional comment) Book NO:
10 Law and cases for employer systems Electronic Communications Privacy Act (ECPA) prohibits interception of and reading stored without a court order, but makes an exception for business systems Courts put heavy weight on the fact that computers, mail, and phone systems are owned by the employer who provides them for business purposes Book NO:
11 Law and cases for employer systems Courts have ruled against monitoring done to snoop on personal and union activities or to track down whistle blowers. Court decisions sometimes depend on whether an employee had a reasonable expectation of privacy. Many employers have privacy policies regarding and voice mail. The National Labor Relation Board (NLRB) sets rules and decides cases about worker-employer relations. Book NO:
12 Personal social media Basing disciplinary action on personal, nonwork social media is more controversial because it extends employer control beyond the workplace. Content in social media is often widely distributed; thus impact is stronger than that of a private conversation. Employer restrictions on nonwork social media do not violate employee s freedom of speech (unless, in some cases, when the employer is the government). Book NO:
13 Discussion Questions It is reasonable for employers to fire employees for content of their blogs, tweets, or posts on social networks? Are there good reasons for employers to be concerned about what their employees post in such places? Book NO:
14 Monitoring location and equipment usage Electronic identification badges that serve as door keys Provide increased security Allow monitoring of employee movement Book NO:
15 Book NO: Monitoring location and equipment usage GPS tracks an employee's location Used in some hospitals to track nurse locations for emergency purposes, also shows where they are at lunch or when they use the bathroom Used to track long-haul trucks to reduce theft and optimize delivery schedules, also detects driving speeds and duration of rest breaks Employees often complain of loss of privacy
16 Discussion Questions How much privacy is reasonable for an employee to expect in the workplace? Under what circumstances is it appropriate for an employer to read an employee's ? Book NO:
SAS TRUSTEE CORPORATION ( STC )
SAS TRUSTEE CORPORATION ( STC ) POLICY ON USE OF EMPLOYER COMMUNICATION DEVICES AND WORKPLACE SURVEILLANCE under the Workplace Surveillance Act 2005 File: B915 May 2011 Version 3 INDEX Policy Statement...
CITY OF SALINE CELL PHONE POLICY
CITY OF SALINE CELL PHONE POLICY Purpose The City of Saline acknowledges that to provide efficient services to its citizens some of its employees must be available either 24x7 or while they are away from
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011
City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011 Purpose and Intent The City of Boston recognizes the importance
COMPUTER USAGE - EMAIL
BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
SURVEILLANCE AND PRIVACY
info sheet 03.12 SURVEILLANCE AND PRIVACY Info Sheet 03.12 March 2012 This Information Sheet applies to Victorian state and local government organisations that are bound by the Information Privacy Act
Odessa College Use of Computer Resources Policy Policy Date: November 2010
Odessa College Use of Computer Resources Policy Policy Date: November 2010 1.0 Overview Odessa College acquires, develops, and utilizes computer resources as an important part of its physical and educational
UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources
PAGE 1 of 6 UNIVERSITY GUIDEBOOK Title of Policy: Acceptable Use of University Technology Resources Responsible Division/Office: Information Technology Approving Officer: Vice President for Finance and
Information Technology Acceptable Use Policy
Information Technology Acceptable Use Policy Overview The information technology resources of Providence College are owned and maintained by Providence College. Use of this technology is a privilege, not
Internet Acceptable Use Policy
1. Overview Quincy College provides Internet access to students, faculty, staff, and administration as part of its educational mission. When the Internet is used appropriately, it can provide a wealth
OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS. March 2010
OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS March 2010 By Anne-Marie L. Storey, Esq. Rudman & Winchell Bangor [email protected] I. USE OF INFORMATION DURING HIRING PROCESS
Information Security and Electronic Communications Acceptable Use Policy (AUP)
Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern
How To Use The Internet Safely
Administrative Procedure 140 DISTRICT-WIDE NETWORK AND INTERNET APPROPRIATE USE Background School District No.43 (Coquitlam)'s District-wide network provides data communication links among all District
Hyde School Student Computer Systems Acceptable Use Policy
Hyde School Student Computer Systems Acceptable Use Policy A. Hyde School Computer Systems and Internet Access Please read the following carefully before signing this document. This is a legally binding
APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5
PAGE 1 of 5 PURPOSE Triton College s computer and information network is a continually growing and changing resource supporting thousands of users and systems. These resources are vital for the fulfillment
Practice Resource. Sample internet and email use policy. Foreword. Policy scope. By David J. Bilinsky 1
Practice Resource Sample internet and email use policy By David J. Bilinsky 1 Foreword Use of email and the Internet can result in a huge productivity increase for a law practice. Through email, lawyers
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY
EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY This is a statement of The New York Institute for Special Education s (NYISE s) policy related to employees Computer Network and Internet
Harrisonville School District Acceptable Use Agreement for Student Laptops 2014-2015
Acceptable Use Agreement for Student Laptops 2014-2015 The student laptop that has been issued to you is the property of the Harrisonville School District. This laptop is on loan to you as a student and
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers
Electronic Communications: E-Mail, Voicemail, Telephones, Internet and Computers Key Points Put employees on notice through policies that they should have no expectation of privacy arising from their use
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
U.S. Chemical Safety and Hazard Investigation Board
BOARD ORDER 035 U.S. Chemical Safety and Hazard Investigation Board SUBJECT: Use of Government Office Equipment CONTENTS 1. Purpose...1 2. Effective Date...1 3. Scope...1 4. References...1 5. Definition...1
RECOMMENDED EXECUTIVE BRANCH MODEL POLICY/GUIDANCE ON LIMITED PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT INCLUDING INFORMATION TECHNOLOGY
RECOMMENDED EXECUTIVE BRANCH MODEL POLICY/GUIDANCE ON LIMITED PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT INCLUDING INFORMATION TECHNOLOGY Federal CIO Council General Services Administration contact: [email protected]
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.
VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE GENERAL INSTITUTION Chapter 3 Computer Use - Computer and Electronic Communication Systems AP 3720(a) Contents 1.0 Introduction...1 2.0
Social Media And the Workplace. Scott Patterson Labor and Employment Attorney Butzel Long
Social Media And the Workplace Scott Patterson Labor and Employment Attorney Butzel Long POTENTIAL ISSUES Employee productivity Harassment and discrimination Too much information Legal issues POTENTIAL
OLYMPIC COLLEGE POLICY
TITLE: Acceptable Use Policy POLICY NUMBER: OCP 200-17 REFERENCE: RCW 42.52.160, RCW 42.52.180, RCW 42.17, WAC 292-110-010, http://isb.wa.gov/policies/security.aspx, http://www.governor.wa.gov/execorders/archive.asp,
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
Acceptable Use of Information Technology
Acceptable Use of Information Technology No.: 3501 Category: Information Technology Services Approving Body: Leadership Team Executive Division: Learning and Technology Services Department Responsible:
The Whistle Blower Policy
The Whistle Blower Policy 1 WHISTLE BLOWER POLICY The Aditya Birla Group Values of Integrity, Commitment, Passion, Seamlessness, and Speed are the foundation for all actions and decisions we take. They
Marion County School District Computer Acceptable Use Policy
Marion County School District Computer Acceptable Use Policy The Marion County School District (MCSD) offers currently enrolled students, faculty and staff access to the school computer network through
Media Traps. Attorney Nilesh P. Patel
Workplace Social Media Traps Attorney Nilesh P. Patel Mahadev Law Group, LLC Human Resources & Employment Law Solutions www.mahalawgroup.com [email protected] 877-210-2499 Definition: Online forums
All Users of DCRI Computing Equipment and Network Resources
July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform
SOCIAL MEDIA AND ELECTRONIC COMMUNICATIONS THE IMPACT OF TECHNOLOGY IN THE WORKPLACE
New Jersey League of Municipalities SOCIAL MEDIA AND ELECTRONIC COMMUNICATIONS THE IMPACT OF TECHNOLOGY IN THE WORKPLACE Presented by: BRIAN W. KRONICK, ESQ. Genova, Burns & Giantomasi (973) 533-0777 November
Westmoreland Intermediate Unit Internet Acceptable Use Policy
Westmoreland Intermediate Unit Internet Acceptable Use Policy Overview: The Westmoreland Intermediate Unit provides Internet access to administrators, teachers, and students in the school districts of
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY
GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY Telecommunications is radically changing the way the world accesses information. A computer network, linked to the Internet, an international computer network
REGION 19 HEAD START. Acceptable Use Policy
REGION 19 HEAD START Acceptable Use Policy 1.0 Overview Research, Evaluation, Assessment and Information Systems (R.E.A.I.S.) intentions for publishing an Acceptable Use Policy are not to impose restrictions
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
MEDWAY PUBLIC SCHOOLS Medway, MA. Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12
MEDWAY PUBLIC SCHOOLS Medway, MA Policy #21-A Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12 The District s goal in providing computer network technology and Internet access
COMPUTER, INTERNET, & EMAIL USE POLICY
COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Student Computer Usage Policies and Procedures I. Campus Computer Usage Overview: The purpose of this document is to define the policies and procedures
BRIGHAM AND WOMEN S HOSPITAL
BRIGHAM AND WOMEN S HOSPITAL HUMAN RESOURCES POLICIES AND PROCEDURES SUBJECT: SOCIAL MEDIA, ELECTRONIC COMMUNICATION and ACCEPTABLE USE POLICY #: HR-503 EFFECTIVE DATE: January 1, 2008 POLICY This policy
Social Media In the Workplace
Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES
Page 1 of 5 Purpose This regulation implements Board policy JS by setting forth specific procedures, requirements and restrictions and conditions governing student use of District Information Technology
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
2) Switch to a personal phone and follow the guidance/procedures established by the University for the Communication Technology Allowance.
MEMO To: Extension Fiscal Staff From: Extension Fiscal Office Date: November 12, 2010 Re: Cell Phone Policy There have been many questions lately regarding the use of University owned cell phones for personal
1. Computer and Technology Use, Cell Phones. 1.1. Information Technology Policy
1. Computer and Technology Use, Cell Phones 1.1. Information Technology Policy Employees are provided with Internet access and electronic communications services (which may include, but are not limited
ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy
ATHLONE INSTITUTE OF TECHNOLOGY I.T Acceptable Usage Staff Policy Table of Contents 1. Purpose... 2 2. Terminology... 2 3. Scope... 2 4. Acceptable Usage Policy... 3 5. Policy Acceptance... 6 6. Policy
13.19 ETHICS REPORTING POLICY AND PROCEDURE
13.13 SOFTWARE AND COMPUTER USAGE Temple University has adopted an extensive software policy and an extensive computer usage policy that govern the usage of software, hardware, computer related equipment
Revelstoke Board of Education Policy Manual
Revelstoke Board of Education Policy Manual 3.8 Computer, Internet and BCeSIS Usage and Access This policy shall govern the use of computer equipment, software, the network, e-mail, Internet and BCeSIS
AASTMT Acceptable Use Policy
AASTMT Acceptable Use Policy Classification Information Security Version 1.0 Status Not Active Prepared Department Computer Networks and Data Center Approved Authority AASTMT Presidency Release Date 19/4/2015
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks
Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks The Valmeyer Community Unit School District #3 Board of Education supports the use of the Internet and other computer
I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property
I. Issues Surrounding Email/Computer Monitoring and Searches of an Employee's Property In recent years, employers have had to become concerned with protecting their legitimate business interests while
Whistleblower Protection in New York State. Leslie Perrin, Senior Counsel CSEA Legal Department
Whistleblower Protection in New York State Leslie Perrin, Senior Counsel CSEA Legal Department Civil Service Law Section 75-b Protects Public Employees Prohibits termination, discipline or adverse personnel
Acceptable Use Policy
Acceptable Use Policy 1. Overview Nicholas Financial Inc. s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Nicholas Financial s established culture
Virginia Commonwealth University Police Department
Virginia Commonwealth University Police Department NUMBER SECTION CHIEF OF POLICE EFFECTIVE REVIEW DATE 2 9 1/2013 2/2013 SUBJECT SOCIAL MEDIA GENERAL The department endorses the secure use of social media
Clear Creek ISD 084910 CQ (REGULATION) Business and Support Services: Electronic Communications
Clear Creek ISD 084910 CQ (REGULATION) SCOPE CONSENT REQUIREMENTS CHIEF TECHNOLOGY OFFICER RESPONSIBILITIES The Superintendent or designee will oversee the District s electronic communications system.
Guidelines for Setting up Security Measures to Stop Domestic Violence in the Workplace
Guidelines for Setting up Security Measures to Stop Domestic Violence in the Workplace As of June 15, 2010, all employers in Ontario are responsible for protecting workers when domestic violence follows
Acceptable Use of Computing and Information Technology Resources
Acceptable Use of Computing and Information Technology Resources Version 1.0, February2, 2010 General Statement As part of its educational mission, Hocking College acquires, develops, and maintains computers,
Acceptable Use Policy
1. Overview The Information Technology (IT) department s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to Quincy College s established culture of openness,
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy
Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy This policy is for internal use only and does not enlarge an employee s civil liability in any way. The policy
MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY
MEMORANDUM TO: FROM: RE: Employee Human Resources MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY Please find attached the above referenced policy that is being issued to each
UNIVERSITY OF ST ANDREWS. EMAIL POLICY November 2005
UNIVERSITY OF ST ANDREWS EMAIL POLICY November 2005 I Introduction 1. Email is an important method of communication for University business, and carries the same weight as paper-based communications. The
How To Use Your Cell Phone At Renaissance Academy Charter School
Renaissance Academy Charter School Bring Your Own Device (BYOD) Board Policy PURPOSE The Renaissance Academy School Board values technology and seeks to increase student access and use when it will enhance
Coastal Horizons Centers, Inc. Agency Employee Policies Table of Contents
Coastal Horizons Centers, Inc. Agency Employee Policies Table of Contents Section 1 Administration Page Welcome to Coastal Horizons Center 1 Administration 2 Coastal Horizon Center Mission 2 Code of Ethics
