FirstRanker Logo

FirstRanker.com - FirstRanker's Choice is a hub of Question Papers & Study Materials for B-Tech, B.E, M-Tech, MCA, M.Sc, MBBS, BDS, MBA, B.Sc, Degree, B.Sc Nursing, B-Pharmacy, D-Pharmacy, MD, Medical, Dental, Engineering students. All services of FirstRanker.com are FREE

Get the MBBS Question Bank Android App

Access previous years' papers, solved question papers, notes, and more on the go!

Install From Play Store

Get the Nursing Question Bank Android App

Access 10+ years of Question Papers with answers, notes for B.Sc Nursing on the go!

Install From Play Store

Download VTU MBA 4th Sem 16MBAHR402-Work Place Ethics WPE Chapter 4 -Important Notes

Download VTU (Visvesvaraya Technological University) MBA 4th Semester (Fourth Semester) 16MBAHR402-Work Place Ethics WPE Chapter 4 Important Lecture Notes (MBA Study Material Notes)

This post was last modified on 18 February 2020

VTU MBA Lecture Notes - 1st Sem, 2nd Sem, 3rd Sem and 4th Sem || Visvesvaraya Technological University


FirstRanker.com


WORKPLACE PRIVACY & ETHICS

MODULE 4

--- Content provided by‍ FirstRanker.com ---


Workplace monitoring

  • Keeping an eye on employees
  • Monitoring will be done on quantity and quality of work produced by their employees
  • Employees have some degree of privacy in the workplace.
  • Excessive, routine and unnecessary monitoring is a breach of data protection laws
  • --- Content provided by​ FirstRanker.com ---


Need of workplace monitoring

  • Employee or customer safety
  • Liability & investigations - harassments, theft
  • Network and system performance: protection against virus, avoiding network slowdown etc.
  • Right to know for employers: legitimate protection
  • --- Content provided by‌ FirstRanker.com ---

  • To check the procedure are following
  • To prevent or detect crime
  • In the interest of national interest

Types of workplace monitoring

  • Hardware monitoring
  • --- Content provided by​ FirstRanker.com ---

  • Software monitoring

Hardware monitoring

  • Audio surveillance
  • Video surveillance
  • Infrared badges at work
  • --- Content provided by‌ FirstRanker.com ---

  • Mega stripe cards

Software monitoring

  • Electronic surveillance
  • Spyware
  • Screen, data, idle time monitoring
  • --- Content provided by‌ FirstRanker.com ---


Advantages

  • Reduce mistake
  • Employee safety
  • Unbiased performance evaluation
  • Violation of policies prevented
  • --- Content provided by​ FirstRanker.com ---


Disadvantages

  • Prevents efficiency - being too intrusive
  • Expensive instrument
  • Devious employees
  • Too much monitoring leads to high infighting and competition rather than team competition
  • --- Content provided by​ FirstRanker.com ---

  • Too much monitoring leads to discomfort of the employee

Computer crime

  • Type of fraud where computers are used
  • It is an act performed by a knowledgeable user.
  • Ex: unlawful use or access - hacking (without permission)
  • --- Content provided by‌ FirstRanker.com ---

  • Access for fraud
  • Data theft - use/ copy/ damage/ alter information without permission

Computer crime at workplace

  • Computer crime is increasing in the workplace
  • Use of authorization to get sensitive data, change it or sell it to make more money
  • --- Content provided by⁠ FirstRanker.com ---

  • Most fraud is not committed by employees

Types of computer crimes at workplace

  • Software theft - theft-unlicensed copying
  • Hardware theft - microprocessors, laptops, hard disk drives etc.
  • Hardware theft is the most common fraud
  • --- Content provided by‌ FirstRanker.com ---


Preventing computer crimes at workplace

  • Tactics such as encryption, firewalls, employee training and awareness, routine audit, physical surveillance, appointing security personnel
  • Reward system for employees for reporting, employee initiated audit, updating computer virus program, ISO agreements etc.

Workplace plagiarism

  • Act of fraud
  • --- Content provided by​ FirstRanker.com ---

  • Involves both stealing someone's work and lying about it afterward

Types of workplace plagiarism

  • Using others' images & work
  • Taking credit for an idea
  • Failing to list a source
  • --- Content provided by‌ FirstRanker.com ---

  • Stealing blog content
  • Reproducing an e-book

Effect of workplace plagiarism

  • Personal integrity
  • Legal consequences
  • --- Content provided by​ FirstRanker.com ---

  • Company reputation
  • Fairness to colleagues

Employee privacy and ethics

  • Freedom for employees from unauthorized intrusion from employers
  • Describes the context to which employers monitor and collect information on the activities, communication, and private lives of workers.
  • --- Content provided by⁠ FirstRanker.com ---


  • A controversial and legal issue
  • Employers are allowed
  • Other private spaces - lockers/ drawers - should not violate worker's privacy
  • Tough task - to decide how much monitoring is necessary?

No privacy but convenience

--- Content provided by‍ FirstRanker.com ---

A debate...

  • Would you like to have complete privacy in the workplace but accept the risk of potential abuse/ other problems?
  • Are you ready to give away your privacy for the benefit of avoiding any problems?

Death of privacy

  • Digital footprints - to track what employees do: delivery records, travel logs, expense reports, productivity reporting etc.
  • --- Content provided by⁠ FirstRanker.com ---

  • Electronic toll collection tags - to record passing time in vehicle without stopping the toll.
  • Cell phones - monthly bill can be reviewed
  • Even location from where the calls were received/made could be traced - transmission towers
  • GPS - should not track employee's location after working hours - unfair to do so. (global positioning system)
  • Use all the above with legitimate business reasons.
  • --- Content provided by‍ FirstRanker.com ---


Defence of employee privacy rights

  • Employers not to intrude employees' personal life, choices, background, habits etc.
  • Without considering the employees' interests, not to be disclosed/discussed in public.
  • Ex.: private messages in inbox, checking purses/wallets in public
  • When an employee is not trusted, he/she would no longer see any incentive in being productive/efficient.
  • --- Content provided by‌ FirstRanker.com ---


  • Increased surveillance leaves no room for employee self-control and self-monitoring.
  • With data security and other organizational interests becoming paramount, the employee's rights for privacy and freedom are curtailed.

Breaching employee privacy

  • During recruitment process - confidential info like family background etc. - if relevant but to be kept confidential in company records.
  • During performance tracking - to check work habits, client management to find causes for poor performance etc.
  • --- Content provided by‍ FirstRanker.com ---

  • During electronic surveillance - necessary to keep a check on the workspace activities.
  • Electronically stored employee data - getting access to other people - personal and professional data must be confidential.

Guidelines to defend employee privacy

  • Let there be a clear policy - taking consent and making employees aware of what is private and what is not.
  • Only on legal grounds - no other utility of the monitoring tools.
  • --- Content provided by‌ FirstRanker.com ---

  • Do not have unnecessary harsh policies - result in attrition.
  • No electronic harassment - offensive emails/dirty jokes - take enough care.
  • Use of internet only for business.
  • Use of all electronic tools for business or professional purpose.
  • In-house privacy controller - for large organizations can be a representative for data protection and use of technology in the organization.
  • --- Content provided by FirstRanker.com ---




This download link is referred from the post: VTU MBA Lecture Notes - 1st Sem, 2nd Sem, 3rd Sem and 4th Sem || Visvesvaraya Technological University

--- Content provided by​ FirstRanker.com ---