ISM-473: Computing Ethics and Society. Unit 6 Work

Similar documents
Questions And Answers. Electron ic Monitoring in the Workplace

Social Networking Issues in the Workplace

SAS TRUSTEE CORPORATION ( STC )

CORPORATE. Tab Authority Subject Related Policies POLICY STATEMENT PURPOSE

Westwood Baptist Church Computer use Policy

EMPLOYEE COMPUTER USE POLICY

CITY OF SALINE CELL PHONE POLICY

City of Boston Department of Innovation and Technology Policy Title: Information Technology Resource Use Policy Effective Date: April 1, 2011

COMPUTER USAGE -

Employee Internet Usage February 15, 2007

Corporate Reputation Management Vs. Employee Privacy

Social Media in the Workplace

DIOCESE OF DALLAS. Computer Internet Policy

University of Maryland Baltimore Information Technology Acceptable Use Policy

SURVEILLANCE AND PRIVACY

BOARD OF EDUCATION REGULATION EMPLOYEE COMPUTER, NETWORK, INTERNET, AND USE RULES

LE.201 Employee Privacy Rights in the Electronic/Social Media Age

Odessa College Use of Computer Resources Policy Policy Date: November 2010

UNIVERSITY GUIDEBOOK. Title of Policy: Acceptable Use of University Technology Resources

Information Technology Acceptable Use Policy

Internet Acceptable Use Policy

OVERVIEW OF LEGAL ISSUES WITH ELECTRONIC COMMUNICATIONS FOR EMPLOYERS. March 2010

Information Security and Electronic Communications Acceptable Use Policy (AUP)

How To Use The Internet Safely

Social Networking, Privacy, and Employee Speech in the Workplace

Hyde School Student Computer Systems Acceptable Use Policy

APPROPRIATE USE OF INFORMATION POLICY 3511 TECHNOLOGY RESOURCES ADOPTED: 06/17/08 PAGE 1 of 5

Practice Resource. Sample internet and use policy. Foreword. Policy scope. By David J. Bilinsky 1

Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.

EMPLOYEE COMPUTER NETWORK AND INTERNET ACCEPTABLE USAGE POLICY

Harrisonville School District Acceptable Use Agreement for Student Laptops

Electronic Communications: , Voic , Telephones, Internet and Computers

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

U.S. Chemical Safety and Hazard Investigation Board

Superintendent Policy Code: 4185 Page 1 of 7 EMPLOYEE USE OF COMPUTERS, THE INTERNET AND ELECTRONIC COMMUNICATIONS

RECOMMENDED EXECUTIVE BRANCH MODEL POLICY/GUIDANCE ON LIMITED PERSONAL USE OF GOVERNMENT OFFICE EQUIPMENT INCLUDING INFORMATION TECHNOLOGY

VICTOR VALLEY COMMUNITY COLLEGE DISTRICT ADMINISTRATIVE PROCEDURE. Computer Use - Computer and Electronic Communication Systems.

Social Media And the Workplace. Scott Patterson Labor and Employment Attorney Butzel Long

The Resource Newsletter for Home and Hospice Care March Home Care The Law

Bluewater District School Board ADMINISTRATIVE PROCEDURE AP 2312-D Administration Page 1. Network Resources - Limited Personal Use

OLYMPIC COLLEGE POLICY

MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT

Acceptable Use of Information Technology

West Lothian College. and Computer Network Responsible Use Policy. September 2011

The Whistle Blower Policy

Marion County School District Computer Acceptable Use Policy

Social Networking Risks and Rewards

Media Traps. Attorney Nilesh P. Patel

All Users of DCRI Computing Equipment and Network Resources

SOCIAL MEDIA AND ELECTRONIC COMMUNICATIONS THE IMPACT OF TECHNOLOGY IN THE WORKPLACE

Westmoreland Intermediate Unit Internet Acceptable Use Policy

GUILFORD PUBLIC SCHOOLS ACCEPTABLE USE POLICY

Consult with your Attorney

REGION 19 HEAD START. Acceptable Use Policy

Acceptable Use of ICT Policy For Staff

MEDWAY PUBLIC SCHOOLS Medway, MA. Acceptable Use Policy for School Network, Internet, and Equipment Grades 7-12

COMPUTER, INTERNET, & USE POLICY

Caldwell Community College and Technical Institute

BRIGHAM AND WOMEN S HOSPITAL

Social Media In the Workplace

Pride Academy Charter School

Human Resources Policy and Procedure Manual

Rocklin Unified School District Employee Authorized Network, Internet Usage, and Privacy Agreement

51 JS-R STUDENT USE OF INFORMATION TECHNOLOGY RESOURCES

SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY

2) Switch to a personal phone and follow the guidance/procedures established by the University for the Communication Technology Allowance.

1. Computer and Technology Use, Cell Phones Information Technology Policy

ATHLONE INSTITUTE OF TECHNOLOGY. I.T Acceptable Usage Staff Policy

Chicago State University Computer Usage Policy

Pitfalls of Social Media in the Workplace

13.19 ETHICS REPORTING POLICY AND PROCEDURE

Revelstoke Board of Education Policy Manual

AASTMT Acceptable Use Policy

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

Valmeyer Community Unit School District #3 Acceptable Use Of Computers and Networks

I. Issues Surrounding /Computer Monitoring and Searches of an Employee's Property

Senior School 1 PURPOSE 2 SCOPE 3 SCHOOL RESPONSIBILITIES

Whistleblower Protection in New York State. Leslie Perrin, Senior Counsel CSEA Legal Department

TITLE: SCCD ELECTRONIC INFORMATION RESOURCES

Social Networking and its Implications on your Data Security

Acceptable Use Policy

CAMBRIDGE ELEMENTARY CONSENT CHECKLIST

Virginia Commonwealth University Police Department

Clear Creek ISD CQ (REGULATION) Business and Support Services: Electronic Communications

Guidelines for Setting up Security Measures to Stop Domestic Violence in the Workplace

PRELIMINARY STATEMENT. The Employers Association of New Jersey ("EANJ")^ respectfully submits this Letter Brief

Social Media: Privacy & Security

Acceptable Use of Computing and Information Technology Resources

Acceptable Use Policy

Computing and Communication Policy on Acceptable Use of Electronic Resources

Policy # Related Policies: Computer, Electronic Communications, and Internet Usage Policy

Friending and Tweeting in the Workplace: The Impact of Social Media on Corporate America

MISSISSIPPI DEPARTMENT OF HEALTH COMPUTER NETWORK AND INTERNET ACCESS POLICY

Board Adopted Policy

TYPE: INFORMATIONAL & INSTRUCTIONAL TECHNOLOGY. POLICY TITLE: Technology Use Policy

UNIVERSITY OF ST ANDREWS. POLICY November 2005

How To Use Your Cell Phone At Renaissance Academy Charter School

Coastal Horizons Centers, Inc. Agency Employee Policies Table of Contents

PURPOSE APPROVAL SCOPE UNIVERSITY PROPERTY AUTHORIZED USAGE NAME OF POLICY:

Regulating the Medical Workplace in the World of Web 2.0 Policies for Facebook, Twitter, Blogs and Other Social Media Postings are a Must

Transcription:

ISM-473: Computing Ethics and Society Unit 6 Work

AGift of Fire Fourth edition Sara Baase Chapter 6: Work Lecture 18

What We Will Cover Employee Communications and Monitoring

Book NO: 293-296 Learning About Job Applicants The Web and social media provide new means of information collection on job applicants. Employers: search online newsgroups and social networks hire data-collection agencies use a variety of screening methods to efficiently reduce a large pool of applicants to a reasonable number Some job-seekers attempt to clean up their online persona.

Risks and Rules for Work and Personal Communications Employee monitoring is not new Employers have always monitored their employees. Degree of detail and frequency of monitoring has varied depending upon kind of work, economic factors, and available technology. (Time-clocks and logs.) Early monitoring was mostly blue-collar (factory) and pinkcollar (telephone and clerical) jobs Bosses patrolled the aisles watching workers Output counts at the end of the day Book NO: 296-297

Risks and Rules for Work and Personal Communications Separating or merging work and personal communications Employers often prohibit employees from using their work email, computers, and other devices for personal use. What about employees using personal email accounts, social media, laptops, smartphones, and other devices for work? Overhead of managing and maintaining systems to work with variety of brands and operating systems Security of company information and operations Book NO: 297-298

Risks and Rules for Work and Personal Communications Monitoring employer systems Roughly half of major companies in U.S. sometimes monitor the email or voice mail of their employees on company systems. Most companies monitor infrequently, some routinely intercept all email. Book NO: 298-299

Risks and Rules for Work and Personal Communications Monitoring employer systems Many major companies use software tools that provide reports on employee Web use. Employees spend time on nonwork activities on the Web Some companies block specific sites (e.g. adult content, sports sites, job search sites, social-network sites) Book NO: 298-299

Risks and Rules for Work and Personal Communications Monitoring employer systems Purposes of monitoring employee communications include training, measuring or increasing productivity, checking compliance with rules for communication, and detecting behavior that threatens the employer in some way. Concerns over security threats such as viruses and other malicious software Concerns about inappropriate activities by employees (e.g., harassment, unprofessional comment) Book NO: 298-300

Law and cases for employer systems Electronic Communications Privacy Act (ECPA) prohibits interception of email and reading stored email without a court order, but makes an exception for business systems Courts put heavy weight on the fact that computers, mail, and phone systems are owned by the employer who provides them for business purposes Book NO: 300-302

Law and cases for employer systems Courts have ruled against monitoring done to snoop on personal and union activities or to track down whistle blowers. Court decisions sometimes depend on whether an employee had a reasonable expectation of privacy. Many employers have privacy policies regarding email and voice mail. The National Labor Relation Board (NLRB) sets rules and decides cases about worker-employer relations. Book NO: 300-302

Personal social media Basing disciplinary action on personal, nonwork social media is more controversial because it extends employer control beyond the workplace. Content in social media is often widely distributed; thus impact is stronger than that of a private conversation. Employer restrictions on nonwork social media do not violate employee s freedom of speech (unless, in some cases, when the employer is the government). Book NO: 302-303

Discussion Questions It is reasonable for employers to fire employees for content of their blogs, tweets, or posts on social networks? Are there good reasons for employers to be concerned about what their employees post in such places? Book NO: 302-303

Monitoring location and equipment usage Electronic identification badges that serve as door keys Provide increased security Allow monitoring of employee movement Book NO: 303-304

Book NO: 303-304 Monitoring location and equipment usage GPS tracks an employee's location Used in some hospitals to track nurse locations for emergency purposes, also shows where they are at lunch or when they use the bathroom Used to track long-haul trucks to reduce theft and optimize delivery schedules, also detects driving speeds and duration of rest breaks Employees often complain of loss of privacy

Discussion Questions How much privacy is reasonable for an employee to expect in the workplace? Under what circumstances is it appropriate for an employer to read an employee's email? Book NO: 293-304