SlideShare une entreprise Scribd logo
1  sur  20
You Are Being Watched

          Surveillance at
            workplace
General principles for surveillance
 policies

1. Openness
2. Consent
3. Consultation
4. Private spaces
5. Proportionality
Types of surveillance

  Overt surveillance

  Covert Surveillance
Methods of Surveillance

Telephone surveillance


 Telephone tapping



 Video facility



 To collect location data
Biometric surveillance


Technologies that measure and analyze human
  physical and/or behavioral characteristics for
  authentication, identification, or screening purposes.
 physical characteristics -fingerprints, DNA
 behavioral characteristics - a person's manner of
  walking or voice
Corporate surveillance

Monitoring of activities within a business or within the
        industry associated with that business.
  Monitoring of a person or group's behavior by a
                       corporation
Methods of Surveillance

 Internet Surveillance


        This surveillance monitor the employee internet
 activities. For this most of companies use spy ware
 & cookies.
 Video Surveillance


 Through this surveillance monitor the employee
  workplace activities.
In here video cameras connecting
With recording device use. There are
Many uses of these surveillance.
 Computer Surveillance


             This surveillance monitor the data and e
 maila through a softwares such as the FBI's Magic
 Lantern and CIPAV.
There are uses of this surveillance such as,
 Preventing excessive personal use of
 computers, Protecting security of computer
 system from external threats,Blocking Spam e-
 mails.
The way in which Workplace Surveillance is
regulated.

 Sri Lankan Situation.


 Regulations in other countries.
   ‘Workplace video surveillance Act’ 1998
    in New South Wales.
   ‘Workplace Privacy Act’ 2011 in
    Australia.

 Regulatory requirements.
 Covert Surveillance.
   Reasonable suspicion.
   Unlawful Activity.
   Should exclude the areas where there is a heightened
   expectation of privacy (rest rooms, wash rooms, bed
   rooms etc.)


 Violation of the rules in the act by an employer is a
 ‘Criminal Offence’
 Tracking employees inside the workplace.
   Access cards.
   Optical surveillance devices.
   Internet, email tracking.
   Telephone tracking.


 Tracking employees outside the workplace.
   Vehicle tracking (GPS).
   Mobile phone tracking.
Advantages of workplace
    surveillance
 Increase productivity
 Ensure workplace safety and security
 Ensure implementing smoothly
 Reducing exposure to liability risk
 control the cost.
 Eliminate leaking of confidential
Disadvantages of workplace
surveillance

 Distrust and resentment.

 High cost
 Difficult to protect Employee privacy
Where we use surveillance at
workplace


Practical examples from
Examples from Logiwiz
 Telephone calls Monitoring




 E-Mail Monitoring




 CCTV Monitoring
Examples from Logiwiz - Cont
 Web Browsing Limitations



 Location Monitoring



 Monthly Night work Roster
Practical Issues of surveillance
 Mass surveillance limited personal, social, political
  freedoms.
 surveillance create in everyone a feeling of always
  being watched
 Civil rights groups and privacy groups oppose
  surveillance as a violation of people's right to
  privacy.
How HR Manager can intervene in surveillance


                   Reduce
                   conflicts



        Create                 Develop a
                      HR
       awarenes     Manager    Surveillan
          s                    ce Policy


                   Create a
                  protective
                  atmospher
                      e
Thank You

Contenu connexe

Tendances

9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption Prevention9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption Prevention
Kendal Peterson
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
Blackbaud
 
International Anti-corruption day 2022, ppt
International Anti-corruption day 2022, pptInternational Anti-corruption day 2022, ppt
International Anti-corruption day 2022, ppt
BEMDEVI
 
Concepts of Intelligence Led Policing
Concepts of Intelligence Led PolicingConcepts of Intelligence Led Policing
Concepts of Intelligence Led Policing
groundskeeper20
 

Tendances (20)

Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption Prevention9-22-11 Anti-Bribery and Corruption Prevention
9-22-11 Anti-Bribery and Corruption Prevention
 
Cybercrime convention
Cybercrime conventionCybercrime convention
Cybercrime convention
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
Managing confidential data
Managing confidential dataManaging confidential data
Managing confidential data
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
Sexual Assault and Harassment Slideshare Version
Sexual Assault and Harassment Slideshare VersionSexual Assault and Harassment Slideshare Version
Sexual Assault and Harassment Slideshare Version
 
Human resources: protecting confidentiality
Human resources: protecting confidentiality Human resources: protecting confidentiality
Human resources: protecting confidentiality
 
Admissibility of electronic evidence in india
Admissibility of electronic evidence in indiaAdmissibility of electronic evidence in india
Admissibility of electronic evidence in india
 
International Anti-corruption day 2022, ppt
International Anti-corruption day 2022, pptInternational Anti-corruption day 2022, ppt
International Anti-corruption day 2022, ppt
 
Types of Crime presentation
Types of Crime presentationTypes of Crime presentation
Types of Crime presentation
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Internet Privacy
Internet PrivacyInternet Privacy
Internet Privacy
 
Cyber stalking
Cyber stalking Cyber stalking
Cyber stalking
 
Gender and crime SOCIOLOGY
Gender and crime SOCIOLOGYGender and crime SOCIOLOGY
Gender and crime SOCIOLOGY
 
Criminal Investigations (Part One)
Criminal Investigations (Part One)Criminal Investigations (Part One)
Criminal Investigations (Part One)
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Concepts of Intelligence Led Policing
Concepts of Intelligence Led PolicingConcepts of Intelligence Led Policing
Concepts of Intelligence Led Policing
 
Bullying And Harassment
Bullying And HarassmentBullying And Harassment
Bullying And Harassment
 
Anti-sexual harassment law: Sample sensitisation presentation
Anti-sexual harassment law: Sample sensitisation presentationAnti-sexual harassment law: Sample sensitisation presentation
Anti-sexual harassment law: Sample sensitisation presentation
 

Similaire à Workplace Surveillance

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
UMaine
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
PECB
 
Whistleblower presentation
Whistleblower presentationWhistleblower presentation
Whistleblower presentation
Mustapha Mugisa
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
UMaine
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
Md. Sajjat Hossain
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
ambersalomon88660
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
musicalworld14
 

Similaire à Workplace Surveillance (20)

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...
A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...
A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...
 
Whistleblower presentation
Whistleblower presentationWhistleblower presentation
Whistleblower presentation
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
UK Legal Framework (2003)
UK Legal Framework (2003)UK Legal Framework (2003)
UK Legal Framework (2003)
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 

Plus de Sampath (20)

Professional Judgment and expertise in Auditing
Professional Judgment and expertise in AuditingProfessional Judgment and expertise in Auditing
Professional Judgment and expertise in Auditing
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
 
TQM in HR
TQM in HRTQM in HR
TQM in HR
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
 
Conflict management
Conflict managementConflict management
Conflict management
 
Hr audit
Hr auditHr audit
Hr audit
 
Hr audit
Hr auditHr audit
Hr audit
 
Human Resource Development.
Human Resource Development.Human Resource Development.
Human Resource Development.
 
Presentation team mgt
Presentation team mgtPresentation team mgt
Presentation team mgt
 
Strategic+management+3
Strategic+management+3Strategic+management+3
Strategic+management+3
 
Strategic+management+2
Strategic+management+2Strategic+management+2
Strategic+management+2
 
Strategic strategic capabilitiies 2003
Strategic strategic capabilitiies 2003Strategic strategic capabilitiies 2003
Strategic strategic capabilitiies 2003
 
Strategic management 12
Strategic management 12Strategic management 12
Strategic management 12
 
Strategic management 8
Strategic management 8Strategic management 8
Strategic management 8
 
Led session4 presentation
Led session4 presentationLed session4 presentation
Led session4 presentation
 
Ethics+lesson+2
Ethics+lesson+2Ethics+lesson+2
Ethics+lesson+2
 
Ethics lesson 4
Ethics lesson 4Ethics lesson 4
Ethics lesson 4
 
Ethics & stakeholders
Ethics & stakeholdersEthics & stakeholders
Ethics & stakeholders
 
Diversity management
Diversity managementDiversity management
Diversity management
 
Descriptive+strategic+management+process
Descriptive+strategic+management+processDescriptive+strategic+management+process
Descriptive+strategic+management+process
 

Dernier

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Dernier (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 

Workplace Surveillance

  • 1. You Are Being Watched Surveillance at workplace
  • 2. General principles for surveillance policies 1. Openness 2. Consent 3. Consultation 4. Private spaces 5. Proportionality
  • 3. Types of surveillance  Overt surveillance  Covert Surveillance
  • 4. Methods of Surveillance Telephone surveillance  Telephone tapping  Video facility  To collect location data
  • 5. Biometric surveillance Technologies that measure and analyze human physical and/or behavioral characteristics for authentication, identification, or screening purposes.  physical characteristics -fingerprints, DNA  behavioral characteristics - a person's manner of walking or voice
  • 6. Corporate surveillance Monitoring of activities within a business or within the industry associated with that business. Monitoring of a person or group's behavior by a corporation
  • 7. Methods of Surveillance  Internet Surveillance This surveillance monitor the employee internet activities. For this most of companies use spy ware & cookies.
  • 8.  Video Surveillance Through this surveillance monitor the employee workplace activities. In here video cameras connecting With recording device use. There are Many uses of these surveillance.
  • 9.  Computer Surveillance This surveillance monitor the data and e maila through a softwares such as the FBI's Magic Lantern and CIPAV. There are uses of this surveillance such as, Preventing excessive personal use of computers, Protecting security of computer system from external threats,Blocking Spam e- mails.
  • 10. The way in which Workplace Surveillance is regulated.  Sri Lankan Situation.  Regulations in other countries.  ‘Workplace video surveillance Act’ 1998 in New South Wales.  ‘Workplace Privacy Act’ 2011 in Australia.  Regulatory requirements.
  • 11.  Covert Surveillance.  Reasonable suspicion.  Unlawful Activity.  Should exclude the areas where there is a heightened expectation of privacy (rest rooms, wash rooms, bed rooms etc.)  Violation of the rules in the act by an employer is a ‘Criminal Offence’
  • 12.  Tracking employees inside the workplace.  Access cards.  Optical surveillance devices.  Internet, email tracking.  Telephone tracking.  Tracking employees outside the workplace.  Vehicle tracking (GPS).  Mobile phone tracking.
  • 13. Advantages of workplace surveillance  Increase productivity  Ensure workplace safety and security  Ensure implementing smoothly  Reducing exposure to liability risk  control the cost.  Eliminate leaking of confidential
  • 14. Disadvantages of workplace surveillance  Distrust and resentment.  High cost  Difficult to protect Employee privacy
  • 15. Where we use surveillance at workplace Practical examples from
  • 16. Examples from Logiwiz  Telephone calls Monitoring  E-Mail Monitoring  CCTV Monitoring
  • 17. Examples from Logiwiz - Cont  Web Browsing Limitations  Location Monitoring  Monthly Night work Roster
  • 18. Practical Issues of surveillance  Mass surveillance limited personal, social, political freedoms.  surveillance create in everyone a feeling of always being watched  Civil rights groups and privacy groups oppose surveillance as a violation of people's right to privacy.
  • 19. How HR Manager can intervene in surveillance Reduce conflicts Create Develop a HR awarenes Manager Surveillan s ce Policy Create a protective atmospher e