SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
IS THAT SOLITAIRE ON YOUR SCREEN?!
SURVEILLANCE OF YOUR ELECTRONIC SYSTEMS



                             Tania da Silva
                             May 24, 2012
INTRODUCTION
Use of the Internet at work and its advantages:
1. Quicker and more efficient communications to optimize
   productivity;
2. Important research and consultation tools;
3. Better visibility on the market;
4. Better relationships with clients and business partners.
THE LEGAL RISKS
1. Defamatory, harassing, offensive or illegal content;
2. Intellectual property infringement;
3. Damage to the company’s reputation;
4. Failure to protect the company’s privileged or confidential
   information;
5. Harassment;
6. Loss of time and diminished employee productivity;
7. Risks to network security.
DOES THE EMPLOYER HAVE A RIGHT TO MONITOR?
WHY?
YES, because of:
• Its powers of management and control to ensure that
  the company functions properly;
• Its disciplinary powers;
• Its powers to create standards and regulations;
• Its contractual rights.

•   What of its property rights?
WHAT ARE THE LIMITS OF THE EMPLOYER’S RIGHT
TO MONITOR?
The laws that protect privacy:

1.   Federal laws regarding personal information;
2.   Quebec’s Charter of human rights and freedoms;
3.   The Civil Code of Quebec;
4.   Quebec laws regarding personal information.
EXPECTATION OF PRIVACY
•   What is an expectation of privacy?

•   How can the level of employees’ expectation of privacy
    with respect to the use of computer systems at work be
    determined?
EXPECTATION OF PRIVACY (continued)
•   Factors to consider:

       1. Are the employees aware of the monitoring?
       2. Was the consent with respect to the monitoring?
       3. The vulnerable nature of Internet
          communications;
       4. The work environment;
PRACTICAL METHODS FOR REDUCING EMPLOYEES’
EXPECTATION OF PRIVACY
•   Create a written policy regarding the use of the company’s
    information technology, which, amongst other things, should
    include a list of activities/uses which are not authorized;
•   Have the policy signed upon hiring;
•   Provide reminder of the policy upon use of information technology
    with warning messages or require a password to access sites
    which are blocked by the company;
•   Use progressive disciplinary measures when the policy is not
    respected;
QUESTIONS?
THANK YOU!

Contenu connexe

Tendances

Compliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulationsCompliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulationsSherWeb
 
Ethical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of ITEthical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of ITDr. Rosemarie Sibbaluca-Guirre
 
OLD - altOS Secure Mobile Platform - Public
OLD - altOS Secure Mobile Platform - PublicOLD - altOS Secure Mobile Platform - Public
OLD - altOS Secure Mobile Platform - PublicSimon Hartley
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkBlue Coat
 
Implementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring ProgramImplementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring ProgramVeriato
 
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...Segun Ebenezer Olaniyan
 
Smartphone and mobile device safety & security
Smartphone and mobile device safety & securitySmartphone and mobile device safety & security
Smartphone and mobile device safety & securityAlbanMichael
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 
Safeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare DataSafeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare DataBitglass
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College WorkshopRahul Nayan
 
CYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTIONCYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTIONshanueduthoughts
 
La1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsLa1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsCma Mohd
 
Four ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographicFour ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographicCheapest SSLs
 
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSSStop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSSChad Gilles
 

Tendances (20)

Compliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulationsCompliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulations
 
Ethical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of ITEthical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of IT
 
OLD - altOS Secure Mobile Platform - Public
OLD - altOS Secure Mobile Platform - PublicOLD - altOS Secure Mobile Platform - Public
OLD - altOS Secure Mobile Platform - Public
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
IT Policy
IT PolicyIT Policy
IT Policy
 
IoT_Implemented
IoT_ImplementedIoT_Implemented
IoT_Implemented
 
Implementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring ProgramImplementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring Program
 
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
 
Smartphone and mobile device safety & security
Smartphone and mobile device safety & securitySmartphone and mobile device safety & security
Smartphone and mobile device safety & security
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Safeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare DataSafeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare Data
 
Administrative safeguards
Administrative safeguardsAdministrative safeguards
Administrative safeguards
 
Data security
Data securityData security
Data security
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 
CYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTIONCYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTION
 
La1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsLa1 Malaysia Cyber Laws
La1 Malaysia Cyber Laws
 
Four ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographicFour ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographic
 
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSSStop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
 

En vedette (6)

U3 t1aa1
U3 t1aa1U3 t1aa1
U3 t1aa1
 
TESTS
TESTSTESTS
TESTS
 
Drilling down to the core: collaborative core content creation - Karen Fisher...
Drilling down to the core: collaborative core content creation - Karen Fisher...Drilling down to the core: collaborative core content creation - Karen Fisher...
Drilling down to the core: collaborative core content creation - Karen Fisher...
 
UX in 10 Minutes - Usability Testing - Presented at SEMPO
UX in 10 Minutes - Usability Testing - Presented at SEMPOUX in 10 Minutes - Usability Testing - Presented at SEMPO
UX in 10 Minutes - Usability Testing - Presented at SEMPO
 
Digital Nirvana
Digital NirvanaDigital Nirvana
Digital Nirvana
 
Avoiding Resume Pitfalls
Avoiding Resume PitfallsAvoiding Resume Pitfalls
Avoiding Resume Pitfalls
 

Similaire à Surveillance of Your Electronic Systems

DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesNapier University
 
Are You Prepared For a Data Breach
Are You Prepared For a Data BreachAre You Prepared For a Data Breach
Are You Prepared For a Data BreachBrian Heidelberger
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsTrustArc
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyResilient Systems
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy ProgramDaniel Ayala
 
Don't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint heartedDon't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint heartedIRIS
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...acemindia
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016centralohioissa
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksNicole Garton
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!SparkPost
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilienceRishi Kant
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacyCenter.cloud
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredPrecisely
 
HIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewHIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewClearDATACloud
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 

Similaire à Surveillance of Your Electronic Systems (20)

DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
Are You Prepared For a Data Breach
Are You Prepared For a Data BreachAre You Prepared For a Data Breach
Are You Prepared For a Data Breach
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Don't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint heartedDon't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint hearted
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the Risks
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilience
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User Data
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
HIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewHIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An Overview
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 

Plus de DLA Piper (Canada) LLP

Consumer Protection: Recent Developments and Trends
Consumer Protection: Recent Developments and TrendsConsumer Protection: Recent Developments and Trends
Consumer Protection: Recent Developments and TrendsDLA Piper (Canada) LLP
 
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...Latest Developments in Advertising and Marketing Law and Their Impact on Cana...
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...DLA Piper (Canada) LLP
 
The Need to Know Legalities of Marketing Sponsorships
The Need to Know Legalities of Marketing SponsorshipsThe Need to Know Legalities of Marketing Sponsorships
The Need to Know Legalities of Marketing SponsorshipsDLA Piper (Canada) LLP
 
The Importance of Documentation in an Employment Relationship
The Importance of Documentation in an Employment RelationshipThe Importance of Documentation in an Employment Relationship
The Importance of Documentation in an Employment RelationshipDLA Piper (Canada) LLP
 
Operational Information as "Personal Information"
Operational Information as "Personal Information"Operational Information as "Personal Information"
Operational Information as "Personal Information"DLA Piper (Canada) LLP
 
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...DLA Piper (Canada) LLP
 
Anatomy of a Failed Termination Process
Anatomy of a Failed Termination ProcessAnatomy of a Failed Termination Process
Anatomy of a Failed Termination ProcessDLA Piper (Canada) LLP
 
Maternity and Parental Leave: Current Issues
Maternity and Parental Leave: Current IssuesMaternity and Parental Leave: Current Issues
Maternity and Parental Leave: Current IssuesDLA Piper (Canada) LLP
 
Mental Health as a Safety Issue in the Workplace
Mental Health as a Safety Issue in the WorkplaceMental Health as a Safety Issue in the Workplace
Mental Health as a Safety Issue in the WorkplaceDLA Piper (Canada) LLP
 
Employing Contractors and Contracting Employees
Employing Contractors and Contracting EmployeesEmploying Contractors and Contracting Employees
Employing Contractors and Contracting EmployeesDLA Piper (Canada) LLP
 
What to Do When Regulators Come A-knocking
What to Do When Regulators Come A-knockingWhat to Do When Regulators Come A-knocking
What to Do When Regulators Come A-knockingDLA Piper (Canada) LLP
 
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...DLA Piper (Canada) LLP
 
To Disclaim or Not and How? Very Big Questions. A Primer for Marketers
To Disclaim or Not and How? Very Big Questions. A Primer for MarketersTo Disclaim or Not and How? Very Big Questions. A Primer for Marketers
To Disclaim or Not and How? Very Big Questions. A Primer for MarketersDLA Piper (Canada) LLP
 
Notre ami, Anton Piller (l’ordonnance d’injonction)
Notre ami, Anton Piller (l’ordonnance d’injonction)Notre ami, Anton Piller (l’ordonnance d’injonction)
Notre ami, Anton Piller (l’ordonnance d’injonction)DLA Piper (Canada) LLP
 
Our Friend, Anton Piller (The Injunction)
Our Friend, Anton Piller (The Injunction)Our Friend, Anton Piller (The Injunction)
Our Friend, Anton Piller (The Injunction)DLA Piper (Canada) LLP
 
La surveillance de vos systèmes informatiques
La surveillance de vos systèmes informatiquesLa surveillance de vos systèmes informatiques
La surveillance de vos systèmes informatiquesDLA Piper (Canada) LLP
 

Plus de DLA Piper (Canada) LLP (20)

Current Issues in Employment Law
Current Issues in Employment LawCurrent Issues in Employment Law
Current Issues in Employment Law
 
Consumer Protection: Recent Developments and Trends
Consumer Protection: Recent Developments and TrendsConsumer Protection: Recent Developments and Trends
Consumer Protection: Recent Developments and Trends
 
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...Latest Developments in Advertising and Marketing Law and Their Impact on Cana...
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...
 
The Need to Know Legalities of Marketing Sponsorships
The Need to Know Legalities of Marketing SponsorshipsThe Need to Know Legalities of Marketing Sponsorships
The Need to Know Legalities of Marketing Sponsorships
 
The Importance of Documentation in an Employment Relationship
The Importance of Documentation in an Employment RelationshipThe Importance of Documentation in an Employment Relationship
The Importance of Documentation in an Employment Relationship
 
Operational Information as "Personal Information"
Operational Information as "Personal Information"Operational Information as "Personal Information"
Operational Information as "Personal Information"
 
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...
 
Anatomy of a Failed Termination Process
Anatomy of a Failed Termination ProcessAnatomy of a Failed Termination Process
Anatomy of a Failed Termination Process
 
Maternity and Parental Leave: Current Issues
Maternity and Parental Leave: Current IssuesMaternity and Parental Leave: Current Issues
Maternity and Parental Leave: Current Issues
 
Mental Health as a Safety Issue in the Workplace
Mental Health as a Safety Issue in the WorkplaceMental Health as a Safety Issue in the Workplace
Mental Health as a Safety Issue in the Workplace
 
Disclaimer in Ads - Resting Not Dead?
Disclaimer in Ads - Resting Not Dead?Disclaimer in Ads - Resting Not Dead?
Disclaimer in Ads - Resting Not Dead?
 
Employing Contractors and Contracting Employees
Employing Contractors and Contracting EmployeesEmploying Contractors and Contracting Employees
Employing Contractors and Contracting Employees
 
Breaking Up Is Hard to Do!
Breaking Up Is Hard to Do!Breaking Up Is Hard to Do!
Breaking Up Is Hard to Do!
 
What to Do When Regulators Come A-knocking
What to Do When Regulators Come A-knockingWhat to Do When Regulators Come A-knocking
What to Do When Regulators Come A-knocking
 
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...
 
To Disclaim or Not and How? Very Big Questions. A Primer for Marketers
To Disclaim or Not and How? Very Big Questions. A Primer for MarketersTo Disclaim or Not and How? Very Big Questions. A Primer for Marketers
To Disclaim or Not and How? Very Big Questions. A Primer for Marketers
 
How to Make Litigation Pay
How to Make Litigation PayHow to Make Litigation Pay
How to Make Litigation Pay
 
Notre ami, Anton Piller (l’ordonnance d’injonction)
Notre ami, Anton Piller (l’ordonnance d’injonction)Notre ami, Anton Piller (l’ordonnance d’injonction)
Notre ami, Anton Piller (l’ordonnance d’injonction)
 
Our Friend, Anton Piller (The Injunction)
Our Friend, Anton Piller (The Injunction)Our Friend, Anton Piller (The Injunction)
Our Friend, Anton Piller (The Injunction)
 
La surveillance de vos systèmes informatiques
La surveillance de vos systèmes informatiquesLa surveillance de vos systèmes informatiques
La surveillance de vos systèmes informatiques
 

Dernier

Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insightsseribangash
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsApsara Of India
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 

Dernier (20)

Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Understanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key InsightsUnderstanding the Pakistan Budgeting Process: Basics and Key Insights
Understanding the Pakistan Budgeting Process: Basics and Key Insights
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call GirlsCash Payment 9602870969 Escort Service in Udaipur Call Girls
Cash Payment 9602870969 Escort Service in Udaipur Call Girls
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 

Surveillance of Your Electronic Systems

  • 1. IS THAT SOLITAIRE ON YOUR SCREEN?! SURVEILLANCE OF YOUR ELECTRONIC SYSTEMS Tania da Silva May 24, 2012
  • 2. INTRODUCTION Use of the Internet at work and its advantages: 1. Quicker and more efficient communications to optimize productivity; 2. Important research and consultation tools; 3. Better visibility on the market; 4. Better relationships with clients and business partners.
  • 3. THE LEGAL RISKS 1. Defamatory, harassing, offensive or illegal content; 2. Intellectual property infringement; 3. Damage to the company’s reputation; 4. Failure to protect the company’s privileged or confidential information; 5. Harassment; 6. Loss of time and diminished employee productivity; 7. Risks to network security.
  • 4. DOES THE EMPLOYER HAVE A RIGHT TO MONITOR? WHY? YES, because of: • Its powers of management and control to ensure that the company functions properly; • Its disciplinary powers; • Its powers to create standards and regulations; • Its contractual rights. • What of its property rights?
  • 5. WHAT ARE THE LIMITS OF THE EMPLOYER’S RIGHT TO MONITOR? The laws that protect privacy: 1. Federal laws regarding personal information; 2. Quebec’s Charter of human rights and freedoms; 3. The Civil Code of Quebec; 4. Quebec laws regarding personal information.
  • 6. EXPECTATION OF PRIVACY • What is an expectation of privacy? • How can the level of employees’ expectation of privacy with respect to the use of computer systems at work be determined?
  • 7. EXPECTATION OF PRIVACY (continued) • Factors to consider: 1. Are the employees aware of the monitoring? 2. Was the consent with respect to the monitoring? 3. The vulnerable nature of Internet communications; 4. The work environment;
  • 8. PRACTICAL METHODS FOR REDUCING EMPLOYEES’ EXPECTATION OF PRIVACY • Create a written policy regarding the use of the company’s information technology, which, amongst other things, should include a list of activities/uses which are not authorized; • Have the policy signed upon hiring; • Provide reminder of the policy upon use of information technology with warning messages or require a password to access sites which are blocked by the company; • Use progressive disciplinary measures when the policy is not respected;