SlideShare une entreprise Scribd logo
1  sur  8
Surveillance in
the Workplace
Luis Medina and Rick Lizotte
Background


•   Privacy not among Constitutional rights
•   But Fourth Amendment—right against unreasonable search and
    seizure
•   Not much law about privacy until end of the 19 th century
•   Invention of microphone and telephone—new threats to privacy
•   1890—Supreme Court Justice wants right to privacy from wiretapping,
    not only house searches
•   1986—Electronic Communications Privacy Act—allows employer
    right to monitor business but not personal communication
Background
•   Computer networks and
    new camera equipment
    allow better monitoring
    of the workplace
•   Employers can fire for
    any reason not covered
    by law
•   Employers often look for
    misuse of computer,
    stealing, drug use and
    alcohol use, lack of
    productivity
•   More extreme—camera
    in locker
    room/bathroom;
    contract not to smoke or
    drink at home to
    prevent use of medical
    insurance later
Background
The Controversy

• Some people believe
  electronic surveillance is good
  for security, safety, and
  productivity.
• Others believe it is a violation
  of privacy rights and should
  not be used.

•    My opinion—use of electronic
    surveillance good if only used
    to protect employees and not
    to violate privacy.

                                     From the movie 1984
Arguments For
         Workplace Surveillance

1. The use of electronic
   surveillance increases worker
   productivity
2. Helps to prevent accidents at
   work
3. Essential for the protection of
   employees
4. May prevent employee theft
   and harassment by other
   employees
5. May provide a way to make
   work evaluation objective
Arguments Against
     Workplace Surveillance

1.   Employees have the right to privacy in some
     areas of workplace

2.   Surveillance creates a hostile environment
     which makes employees fearful and unhappy

3.   Employers don’t know how to separate the
     public from the private—what is in the
     workplace from what is in the home

4.   Surveillance provides an opportunity for
     sexual harassment by employer or security
     personnel
My Conclusion
•   Electronic surveillance
    may be necessary to
    secure safety and
    productivity

•   However, electronic
    surveillance must never
    violate the employees’
    rights to privacy and
    cause bad feeling in the
    workplace

•   Workers need to be
    notified of surveillance

•   Finally, where does the
    employers right to
    monitor us stop?

Contenu connexe

Tendances

Privacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyPrivacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyRica Young
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018Fizaril Amzari Omar
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Securitymtvvvv
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 
INTERNET OF THINGS PPT
INTERNET OF THINGS PPTINTERNET OF THINGS PPT
INTERNET OF THINGS PPTHarsh Kumar
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
11 Rules of Technology Success & Social Media 101
11 Rules of Technology Success & Social Media 10111 Rules of Technology Success & Social Media 101
11 Rules of Technology Success & Social Media 101Ramon Ray
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student workJorge Arturo Ortiz
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 

Tendances (20)

Privacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyPrivacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational Technology
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
INTERNET OF THINGS PPT
INTERNET OF THINGS PPTINTERNET OF THINGS PPT
INTERNET OF THINGS PPT
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
11 Rules of Technology Success & Social Media 101
11 Rules of Technology Success & Social Media 10111 Rules of Technology Success & Social Media 101
11 Rules of Technology Success & Social Media 101
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student work
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 

En vedette

Visión y misión de la universidad nacional de cajamarca
Visión y misión de  la universidad nacional de cajamarcaVisión y misión de  la universidad nacional de cajamarca
Visión y misión de la universidad nacional de cajamarca996483919
 
Emendas ao pl 4921 relatório final do policarpo.
Emendas ao pl 4921   relatório final do policarpo.Emendas ao pl 4921   relatório final do policarpo.
Emendas ao pl 4921 relatório final do policarpo.Tenente Poliglota
 
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995Kevin Caballero Marin
 
2.3. fundamento epistemológicos da medicna - problemas fundamentais do conh...
2.3. fundamento epistemológicos da medicna -   problemas fundamentais do conh...2.3. fundamento epistemológicos da medicna -   problemas fundamentais do conh...
2.3. fundamento epistemológicos da medicna - problemas fundamentais do conh...Luiz-Salvador Miranda-Sa
 
Artigo: Resolução de problemas associado à comunicação
Artigo: Resolução de problemas associado à comunicaçãoArtigo: Resolução de problemas associado à comunicação
Artigo: Resolução de problemas associado à comunicaçãoMiguel de Carvalho
 
Metodología pacie-dokeos
Metodología pacie-dokeosMetodología pacie-dokeos
Metodología pacie-dokeosIsbelia Pelayo
 
Metalurgica fierro s
Metalurgica fierro sMetalurgica fierro s
Metalurgica fierro sFelipe Aliaga
 
Como conciliar gestão eficiente e respeito à legalidade - Mackenzie
Como conciliar gestão eficiente e respeito à legalidade - MackenzieComo conciliar gestão eficiente e respeito à legalidade - Mackenzie
Como conciliar gestão eficiente e respeito à legalidade - MackenzieAndré Laubenstein Pereira
 
María montessori proyecto modulo 2
María montessori proyecto modulo 2María montessori proyecto modulo 2
María montessori proyecto modulo 2Mayer Lozano
 
Trabajo corregido word2
Trabajo corregido word2Trabajo corregido word2
Trabajo corregido word2996483919
 
vestidos de inocencia
vestidos de inocenciavestidos de inocencia
vestidos de inocenciagramadal
 
A concorrência desleal e o crime de falsa alegação de
A concorrência desleal e o crime de falsa alegação deA concorrência desleal e o crime de falsa alegação de
A concorrência desleal e o crime de falsa alegação deVerlaine Costa
 

En vedette (20)

Visión y misión de la universidad nacional de cajamarca
Visión y misión de  la universidad nacional de cajamarcaVisión y misión de  la universidad nacional de cajamarca
Visión y misión de la universidad nacional de cajamarca
 
Emendas ao pl 4921 relatório final do policarpo.
Emendas ao pl 4921   relatório final do policarpo.Emendas ao pl 4921   relatório final do policarpo.
Emendas ao pl 4921 relatório final do policarpo.
 
Derechos de autor
Derechos de autorDerechos de autor
Derechos de autor
 
Símbolos patrios del perú
Símbolos patrios del  perúSímbolos patrios del  perú
Símbolos patrios del perú
 
Proyecto final
Proyecto finalProyecto final
Proyecto final
 
Exposicionpereiravibra
ExposicionpereiravibraExposicionpereiravibra
Exposicionpereiravibra
 
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995
 
5. etapas do proc conhec
5. etapas do proc conhec5. etapas do proc conhec
5. etapas do proc conhec
 
2.3. fundamento epistemológicos da medicna - problemas fundamentais do conh...
2.3. fundamento epistemológicos da medicna -   problemas fundamentais do conh...2.3. fundamento epistemológicos da medicna -   problemas fundamentais do conh...
2.3. fundamento epistemológicos da medicna - problemas fundamentais do conh...
 
Artigo: Resolução de problemas associado à comunicação
Artigo: Resolução de problemas associado à comunicaçãoArtigo: Resolução de problemas associado à comunicação
Artigo: Resolução de problemas associado à comunicação
 
5 videos
5 videos5 videos
5 videos
 
Metodología pacie-dokeos
Metodología pacie-dokeosMetodología pacie-dokeos
Metodología pacie-dokeos
 
Metalurgica fierro s
Metalurgica fierro sMetalurgica fierro s
Metalurgica fierro s
 
Como conciliar gestão eficiente e respeito à legalidade - Mackenzie
Como conciliar gestão eficiente e respeito à legalidade - MackenzieComo conciliar gestão eficiente e respeito à legalidade - Mackenzie
Como conciliar gestão eficiente e respeito à legalidade - Mackenzie
 
María montessori proyecto modulo 2
María montessori proyecto modulo 2María montessori proyecto modulo 2
María montessori proyecto modulo 2
 
Trabajo corregido word2
Trabajo corregido word2Trabajo corregido word2
Trabajo corregido word2
 
vestidos de inocencia
vestidos de inocenciavestidos de inocencia
vestidos de inocencia
 
A concorrência desleal e o crime de falsa alegação de
A concorrência desleal e o crime de falsa alegação deA concorrência desleal e o crime de falsa alegação de
A concorrência desleal e o crime de falsa alegação de
 
Caso chile
Caso chileCaso chile
Caso chile
 
sexualidad humana
sexualidad humanasexualidad humana
sexualidad humana
 

Similaire à Surveillance in the_workplace_highcontrast_ppt

Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challengesCRM
 
Unit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptxUnit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptxCallplanetsDeveloper
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacyG&A Partners
 
Internet monitoring
Internet monitoringInternet monitoring
Internet monitoringCorrje
 
Surveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsSurveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsDLA Piper (Canada) LLP
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxAmandaWeaver21
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet SafetyCharina Mostierra
 
New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issueslgarib
 
Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...Niki Avraam
 
Employees and Internet Use - Legal Perspective
Employees and Internet Use - Legal PerspectiveEmployees and Internet Use - Legal Perspective
Employees and Internet Use - Legal PerspectiveDarius Whelan
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Case IQ
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsDan Michaluk
 
Are Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- SpaffordAre Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- SpaffordMia Eaker
 

Similaire à Surveillance in the_workplace_highcontrast_ppt (20)

Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
Unit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptxUnit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptx
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacy
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Information security
Information securityInformation security
Information security
 
Internet monitoring
Internet monitoringInternet monitoring
Internet monitoring
 
Surveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsSurveillance of Your Electronic Systems
Surveillance of Your Electronic Systems
 
code of conduct
code of conductcode of conduct
code of conduct
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptx
 
1 ictl-ethics
1 ictl-ethics1 ictl-ethics
1 ictl-ethics
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet Safety
 
New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issues
 
Unit 14 LO2
Unit 14 LO2Unit 14 LO2
Unit 14 LO2
 
Unit 14 LO2
Unit 14 LO2Unit 14 LO2
Unit 14 LO2
 
Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...
 
Employees and Internet Use - Legal Perspective
Employees and Internet Use - Legal PerspectiveEmployees and Internet Use - Legal Perspective
Employees and Internet Use - Legal Perspective
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
 
Are Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- SpaffordAre Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- Spafford
 

Dernier

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 

Dernier (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

Surveillance in the_workplace_highcontrast_ppt

  • 1. Surveillance in the Workplace Luis Medina and Rick Lizotte
  • 2. Background • Privacy not among Constitutional rights • But Fourth Amendment—right against unreasonable search and seizure • Not much law about privacy until end of the 19 th century • Invention of microphone and telephone—new threats to privacy • 1890—Supreme Court Justice wants right to privacy from wiretapping, not only house searches • 1986—Electronic Communications Privacy Act—allows employer right to monitor business but not personal communication
  • 3. Background • Computer networks and new camera equipment allow better monitoring of the workplace • Employers can fire for any reason not covered by law • Employers often look for misuse of computer, stealing, drug use and alcohol use, lack of productivity • More extreme—camera in locker room/bathroom; contract not to smoke or drink at home to prevent use of medical insurance later
  • 5. The Controversy • Some people believe electronic surveillance is good for security, safety, and productivity. • Others believe it is a violation of privacy rights and should not be used. • My opinion—use of electronic surveillance good if only used to protect employees and not to violate privacy. From the movie 1984
  • 6. Arguments For Workplace Surveillance 1. The use of electronic surveillance increases worker productivity 2. Helps to prevent accidents at work 3. Essential for the protection of employees 4. May prevent employee theft and harassment by other employees 5. May provide a way to make work evaluation objective
  • 7. Arguments Against Workplace Surveillance 1. Employees have the right to privacy in some areas of workplace 2. Surveillance creates a hostile environment which makes employees fearful and unhappy 3. Employers don’t know how to separate the public from the private—what is in the workplace from what is in the home 4. Surveillance provides an opportunity for sexual harassment by employer or security personnel
  • 8. My Conclusion • Electronic surveillance may be necessary to secure safety and productivity • However, electronic surveillance must never violate the employees’ rights to privacy and cause bad feeling in the workplace • Workers need to be notified of surveillance • Finally, where does the employers right to monitor us stop?