Download VTU MBA 4th Sem 16MBAHR402-Work Place Ethics WPE Chapter 4 -Important Notes

Download VTU (Visvesvaraya Technological University) MBA 4th Semester (Fourth Semester) 16MBAHR402-Work Place Ethics WPE Chapter 4 Important Lecture Notes (MBA Study Material Notes)

WORKPLACE PRIVACY & ETHICS
MODULE 4
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
Death of privacy
? Digital footprints- to track what employees do;
delivery records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record people
passing time in vehicle without stopping them
? Cell phones- monthly bill can be reviewed
? Even location from where the calls were record or
made could be traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
Death of privacy
? Digital footprints- to track what employees do;
delivery records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record people
passing time in vehicle without stopping them
? Cell phones- monthly bill can be reviewed
? Even location from where the calls were record or
made could be traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
Death of privacy
? Digital footprints- to track what employees do;
delivery records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record people
passing time in vehicle without stopping them
? Cell phones- monthly bill can be reviewed
? Even location from where the calls were record or
made could be traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defence of employee privacy rights
? employers not to intrude employees personal
life, choices, background, habits etc.
? Without considering the employees interest
not to be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When employee not trusted he/she would no
longer see any incentive in being productive
/efficient
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
Death of privacy
? Digital footprints- to track what employees do;
delivery records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record people
passing time in vehicle without stopping them
? Cell phones- monthly bill can be reviewed
? Even location from where the calls were record or
made could be traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defence of employee privacy rights
? employers not to intrude employees personal
life, choices, background, habits etc.
? Without considering the employees interest
not to be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When employee not trusted he/she would no
longer see any incentive in being productive
/efficient
? Increased surveillance leaves no room for
employee self control and self monitoring
? With data security and other organisational
interests becoming paramount, the employee
rights for privacy and freedom is curtailed
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
Death of privacy
? Digital footprints- to track what employees do;
delivery records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record people
passing time in vehicle without stopping them
? Cell phones- monthly bill can be reviewed
? Even location from where the calls were record or
made could be traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defence of employee privacy rights
? employers not to intrude employees personal
life, choices, background, habits etc.
? Without considering the employees interest
not to be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When employee not trusted he/she would no
longer see any incentive in being productive
/efficient
? Increased surveillance leaves no room for
employee self control and self monitoring
? With data security and other organisational
interests becoming paramount, the employee
rights for privacy and freedom is curtailed
Breaching employee privacy
? During recruitment process - confidential info like pay,
family background etc- if relevant but to be kept
confidential in co records
? During performance tracking - to check work habits and
client management to find causes for poor performance
etc
? During electronic surveillance - necessary to keep a
check on the work space activities
? Electronically stored e/e data- getting access to wrong
people- personal and professional data must be kept
confidential.

FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
Death of privacy
? Digital footprints- to track what employees do;
delivery records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record people
passing time in vehicle without stopping them
? Cell phones- monthly bill can be reviewed
? Even location from where the calls were record or
made could be traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defence of employee privacy rights
? employers not to intrude employees personal
life, choices, background, habits etc.
? Without considering the employees interest
not to be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When employee not trusted he/she would no
longer see any incentive in being productive
/efficient
? Increased surveillance leaves no room for
employee self control and self monitoring
? With data security and other organisational
interests becoming paramount, the employee
rights for privacy and freedom is curtailed
Breaching employee privacy
? During recruitment process - confidential info like pay,
family background etc- if relevant but to be kept
confidential in co records
? During performance tracking - to check work habits and
client management to find causes for poor performance
etc
? During electronic surveillance - necessary to keep a
check on the work space activities
? Electronically stored e/e data- getting access to wrong
people- personal and professional data must be kept
confidential.

Guidelines to defend employee privacy
? Let there be a clear policy- taking consent and making them
aware of what is pvt and what is not
? Only on legal grounds-no other utility of the monitoring
tools
? Do not have unnecessary harsh policies- result in attrition.
? No electronic harassment ? offensive emails/dirty jokes
take enough care
? Use of internet only for business
? Use of all electronic tools for business or professional
purpose
? In-house privacy controller- for large orgtns can be hired ?
rep for data protection and use of techno in the orgtn
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
Work place monitoring
? Keeping an eye on employees
? Monitoring will be done on quantity and
quality of work produced by their employee
? Employees has some degree of privacy in the
workplace.
? Excessive, routine and unnecessary monitoring
is a breach of data protection laws
Need of workplace monitoring
? Employee or customer safety
? Liability & investigations- harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? Right to know for employers: legitimate process
? To check the procedure are following
? To prevent or detect crime
? In the interest of national interest
Types of work place monitoring
? Hardware monitoring
? Software monitoring
Hardware monitoring
? Audio surveillance
? Video surveillance
? Infrared badges at work
? Mega stripe cards
Software monitoring
? Electronic surveillance
? Spyware
? Screen, data, idle time monitoring
Advantages
? Reduce mistake
? Employee safety
? Unbiased performance evaluation
? Violation of policies prevented
Disadvantages
? Prevents efficiency-being too intrusive
? Expensive instrument
? Devious employees
? Too much monitoring lead to high infidel
competition rather than team competition
? Too much monitoring lead discomfort of
employee
Computer crime
? Type of fraud where computers are used
? It is a an act performed by a knowledgeable
user.
- Ex: unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
Computer crime at workplace
? Computer crime in increasing in workplace.
? Use of authorisation to get a sensitive data,
change it or sell it to make more money
? Most fraud are not committed employees only
?
Types of computer crimes at
workplace
? Software theft - theft-unlicensed copying
? Hardware theft - microprocessors, laptops,
hard disk drives etc
? Hardware theft is most common fraud
Preventing computer crimes at
workplace
? Tactic such as encryption, firewalls, employee
training and awareness, routine audit, physical
surveillance, appointing security personnel.
? Reward system for employees for reporting,
employee initiated audit, updating computer
virus program, ISO agreements etc
Workplace plagiarism
? Act of fraud
? Involves both stealing someone?s work and
lying about it afterward
Types of workplace plagiarism
? Using others? images & work
? Taking credit for an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effect of workplace plagarism
? Personal integrity
? Legal consequences
? Company reputation
? Fairness to colleagues
Employee privacy and ethics (imp)
? Freedom for employee from unauthorised
intrusion from employers
? Describes the context to which employers
monitor ad collect information on the
activities, communication, and private lives of
workers.
? A controversial and legal issue
? Employers are allowed
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy
? Tough task-to decide how much monitoring is
necessary?
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
Death of privacy
? Digital footprints- to track what employees do;
delivery records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record people
passing time in vehicle without stopping them
? Cell phones- monthly bill can be reviewed
? Even location from where the calls were record or
made could be traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defence of employee privacy rights
? employers not to intrude employees personal
life, choices, background, habits etc.
? Without considering the employees interest
not to be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When employee not trusted he/she would no
longer see any incentive in being productive
/efficient
? Increased surveillance leaves no room for
employee self control and self monitoring
? With data security and other organisational
interests becoming paramount, the employee
rights for privacy and freedom is curtailed
Breaching employee privacy
? During recruitment process - confidential info like pay,
family background etc- if relevant but to be kept
confidential in co records
? During performance tracking - to check work habits and
client management to find causes for poor performance
etc
? During electronic surveillance - necessary to keep a
check on the work space activities
? Electronically stored e/e data- getting access to wrong
people- personal and professional data must be kept
confidential.

Guidelines to defend employee privacy
? Let there be a clear policy- taking consent and making them
aware of what is pvt and what is not
? Only on legal grounds-no other utility of the monitoring
tools
? Do not have unnecessary harsh policies- result in attrition.
? No electronic harassment ? offensive emails/dirty jokes
take enough care
? Use of internet only for business
? Use of all electronic tools for business or professional
purpose
? In-house privacy controller- for large orgtns can be hired ?
rep for data protection and use of techno in the orgtn
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice

This post was last modified on 18 February 2020