Download VTU MBA 4th Sem 16MBAHR402-Work Place Ethics WPE Chapter 4 -Important Notes

Download VTU (Visvesvaraya Technological University) MBA 4th Semester (Fourth Semester) 16MBAHR402-Work Place Ethics WPE Chapter 4 Important Lecture Notes (MBA Study Material Notes)

We rely on ads to keep our content free. Please consider disabling your ad blocker or whitelisting our site. Thank you for your support!

WORKPLACE PRIVACY & ETHICS
MODULE 4
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems?
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems?
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
Death of privacy
? Digital footprints- to track what employees do;
delivery records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record people
passing time in vehicle without stopping them
? Cell phones- monthly bill can be reviewed
? Even location from where the calls were record or
made could be traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems?
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
Death of privacy
? Digital footprints- to track what employees do;
delivery records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record people
passing time in vehicle without stopping them
? Cell phones- monthly bill can be reviewed
? Even location from where the calls were record or
made could be traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems?
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
Death of privacy
? Digital footprints- to track what employees do;
delivery records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record people
passing time in vehicle without stopping them
? Cell phones- monthly bill can be reviewed
? Even location from where the calls were record or
made could be traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defence of employee privacy rights
? employers not to intrude employees personal
life, choices, background, habits etc.
? Without considering the employees interest
not to be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When employee not trusted he/she would no
longer see any incentive in being productive
/efficient
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems?
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
Death of privacy
? Digital footprints- to track what employees do;
delivery records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record people
passing time in vehicle without stopping them
? Cell phones- monthly bill can be reviewed
? Even location from where the calls were record or
made could be traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defence of employee privacy rights
? employers not to intrude employees personal
life, choices, background, habits etc.
? Without considering the employees interest
not to be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When employee not trusted he/she would no
longer see any incentive in being productive
/efficient
? Increased surveillance leaves no room for
employee self control and self monitoring
? With data security and other organisational
interests becoming paramount, the employee
rights for privacy and freedom is curtailed
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems?
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
Death of privacy
? Digital footprints- to track what employees do;
delivery records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record people
passing time in vehicle without stopping them
? Cell phones- monthly bill can be reviewed
? Even location from where the calls were record or
made could be traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defence of employee privacy rights
? employers not to intrude employees personal
life, choices, background, habits etc.
? Without considering the employees interest
not to be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When employee not trusted he/she would no
longer see any incentive in being productive
/efficient
? Increased surveillance leaves no room for
employee self control and self monitoring
? With data security and other organisational
interests becoming paramount, the employee
rights for privacy and freedom is curtailed
Breaching employee privacy
? During recruitment process - confidential info like pay,
family background etc- if relevant but to be kept
confidential in co records
? During performance tracking - to check work habits and
client management to find causes for poor performance
etc
? During electronic surveillance - necessary to keep a
check on the work space activities
? Electronically stored e/e data- getting access to wrong
people- personal and professional data must be kept
confidential.

FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems?
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
Death of privacy
? Digital footprints- to track what employees do;
delivery records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record people
passing time in vehicle without stopping them
? Cell phones- monthly bill can be reviewed
? Even location from where the calls were record or
made could be traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defence of employee privacy rights
? employers not to intrude employees personal
life, choices, background, habits etc.
? Without considering the employees interest
not to be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When employee not trusted he/she would no
longer see any incentive in being productive
/efficient
? Increased surveillance leaves no room for
employee self control and self monitoring
? With data security and other organisational
interests becoming paramount, the employee
rights for privacy and freedom is curtailed
Breaching employee privacy
? During recruitment process - confidential info like pay,
family background etc- if relevant but to be kept
confidential in co records
? During performance tracking - to check work habits and
client management to find causes for poor performance
etc
? During electronic surveillance - necessary to keep a
check on the work space activities
? Electronically stored e/e data- getting access to wrong
people- personal and professional data must be kept
confidential.

Guidelines to defend employee privacy
? Let there be a clear policy- taking consent and making them
aware of what is pvt and what is not
? Only on legal grounds-no other utility of the monitoring
tools
? Do not have unnecessary harsh policies- result in attrition.
? No electronic harassment ? offensive emails/dirty jokes
take enough care
? Use of internet only for business
? Use of all electronic tools for business or professional
purpose
? In-house privacy controller- for large orgtns can be hired ?
rep for data protection and use of techno in the orgtn
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems?
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
Death of privacy
? Digital footprints- to track what employees do;
delivery records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record people
passing time in vehicle without stopping them
? Cell phones- monthly bill can be reviewed
? Even location from where the calls were record or
made could be traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defence of employee privacy rights
? employers not to intrude employees personal
life, choices, background, habits etc.
? Without considering the employees interest
not to be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When employee not trusted he/she would no
longer see any incentive in being productive
/efficient
? Increased surveillance leaves no room for
employee self control and self monitoring
? With data security and other organisational
interests becoming paramount, the employee
rights for privacy and freedom is curtailed
Breaching employee privacy
? During recruitment process - confidential info like pay,
family background etc- if relevant but to be kept
confidential in co records
? During performance tracking - to check work habits and
client management to find causes for poor performance
etc
? During electronic surveillance - necessary to keep a
check on the work space activities
? Electronically stored e/e data- getting access to wrong
people- personal and professional data must be kept
confidential.

Guidelines to defend employee privacy
? Let there be a clear policy- taking consent and making them
aware of what is pvt and what is not
? Only on legal grounds-no other utility of the monitoring
tools
? Do not have unnecessary harsh policies- result in attrition.
? No electronic harassment ? offensive emails/dirty jokes
take enough care
? Use of internet only for business
? Use of all electronic tools for business or professional
purpose
? In-house privacy controller- for large orgtns can be hired ?
rep for data protection and use of techno in the orgtn
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice

This post was last modified on 18 February 2020