Download VTU (Visvesvaraya Technological University) MBA 4th Semester (Fourth Semester) 16MBAHR402-Work Place Ethics WPE Module 4 Important Lecture Notes (MBA Study Material Notes)
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace plagiarism
Types
? Using others? images
? Taking credit fr an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effects
? Damage reputation negative
impact on e/e career
? Legal consequences-
copyrights violation
? Company goodwill harmed
? Fairness to peers
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace plagiarism
Types
? Using others? images
? Taking credit fr an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effects
? Damage reputation negative
impact on e/e career
? Legal consequences-
copyrights violation
? Company goodwill harmed
? Fairness to peers
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Employee privacy and ethics (imp)
? e/e privacy- freedom for the e/e s from
unauthorised intrusion from e/rs
? A controversial and legal issue
? e/rs-allowed to monitor their e/e s
communications within reasonable limits
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy.
? Tough task-to decide how much monitoring is
necessary?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace plagiarism
Types
? Using others? images
? Taking credit fr an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effects
? Damage reputation negative
impact on e/e career
? Legal consequences-
copyrights violation
? Company goodwill harmed
? Fairness to peers
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Employee privacy and ethics (imp)
? e/e privacy- freedom for the e/e s from
unauthorised intrusion from e/rs
? A controversial and legal issue
? e/rs-allowed to monitor their e/e s
communications within reasonable limits
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy.
? Tough task-to decide how much monitoring is
necessary?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace plagiarism
Types
? Using others? images
? Taking credit fr an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effects
? Damage reputation negative
impact on e/e career
? Legal consequences-
copyrights violation
? Company goodwill harmed
? Fairness to peers
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Employee privacy and ethics (imp)
? e/e privacy- freedom for the e/e s from
unauthorised intrusion from e/rs
? A controversial and legal issue
? e/rs-allowed to monitor their e/e s
communications within reasonable limits
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy.
? Tough task-to decide how much monitoring is
necessary?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Convenient methods that kills privacy..
? Digital footprints- to track what e/e s do; delivery
records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record ppl
passing time in vehicle without stopping them
? Cell phones- monthly bill cn be reviewed
? Even location from where the calls were recd or
made could b traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace plagiarism
Types
? Using others? images
? Taking credit fr an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effects
? Damage reputation negative
impact on e/e career
? Legal consequences-
copyrights violation
? Company goodwill harmed
? Fairness to peers
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Employee privacy and ethics (imp)
? e/e privacy- freedom for the e/e s from
unauthorised intrusion from e/rs
? A controversial and legal issue
? e/rs-allowed to monitor their e/e s
communications within reasonable limits
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy.
? Tough task-to decide how much monitoring is
necessary?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Convenient methods that kills privacy..
? Digital footprints- to track what e/e s do; delivery
records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record ppl
passing time in vehicle without stopping them
? Cell phones- monthly bill cn be reviewed
? Even location from where the calls were recd or
made could b traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace plagiarism
Types
? Using others? images
? Taking credit fr an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effects
? Damage reputation negative
impact on e/e career
? Legal consequences-
copyrights violation
? Company goodwill harmed
? Fairness to peers
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Employee privacy and ethics (imp)
? e/e privacy- freedom for the e/e s from
unauthorised intrusion from e/rs
? A controversial and legal issue
? e/rs-allowed to monitor their e/e s
communications within reasonable limits
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy.
? Tough task-to decide how much monitoring is
necessary?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Convenient methods that kills privacy..
? Digital footprints- to track what e/e s do; delivery
records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record ppl
passing time in vehicle without stopping them
? Cell phones- monthly bill cn be reviewed
? Even location from where the calls were recd or
made could b traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace plagiarism
Types
? Using others? images
? Taking credit fr an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effects
? Damage reputation negative
impact on e/e career
? Legal consequences-
copyrights violation
? Company goodwill harmed
? Fairness to peers
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Employee privacy and ethics (imp)
? e/e privacy- freedom for the e/e s from
unauthorised intrusion from e/rs
? A controversial and legal issue
? e/rs-allowed to monitor their e/e s
communications within reasonable limits
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy.
? Tough task-to decide how much monitoring is
necessary?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Convenient methods that kills privacy..
? Digital footprints- to track what e/e s do; delivery
records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record ppl
passing time in vehicle without stopping them
? Cell phones- monthly bill cn be reviewed
? Even location from where the calls were recd or
made could b traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defending e/e privacy rights
? e/r not to intrude e/e personal life, choices,
background, habits etc
? Without considering the e/e s interest not to
be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When e/e not trusted he/she would no longer
see any incentive in being productive
/efficient.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace plagiarism
Types
? Using others? images
? Taking credit fr an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effects
? Damage reputation negative
impact on e/e career
? Legal consequences-
copyrights violation
? Company goodwill harmed
? Fairness to peers
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Employee privacy and ethics (imp)
? e/e privacy- freedom for the e/e s from
unauthorised intrusion from e/rs
? A controversial and legal issue
? e/rs-allowed to monitor their e/e s
communications within reasonable limits
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy.
? Tough task-to decide how much monitoring is
necessary?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Convenient methods that kills privacy..
? Digital footprints- to track what e/e s do; delivery
records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record ppl
passing time in vehicle without stopping them
? Cell phones- monthly bill cn be reviewed
? Even location from where the calls were recd or
made could b traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defending e/e privacy rights
? e/r not to intrude e/e personal life, choices,
background, habits etc
? Without considering the e/e s interest not to
be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When e/e not trusted he/she would no longer
see any incentive in being productive
/efficient.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Processes where privacy can b
breached?
? During hiring- confidential info like pay, family
background etc- if relevant but to be kept
confidential in co records
? During perf evaluation- to check work habits and
client mgt to find causes for poor perf etc
? During electronic surveillance- necessary to keep
a check on the work space activities
? Electronically stored e/e data- getting access to
wrong people- personal and professional data
must be kept confidential.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace plagiarism
Types
? Using others? images
? Taking credit fr an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effects
? Damage reputation negative
impact on e/e career
? Legal consequences-
copyrights violation
? Company goodwill harmed
? Fairness to peers
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Employee privacy and ethics (imp)
? e/e privacy- freedom for the e/e s from
unauthorised intrusion from e/rs
? A controversial and legal issue
? e/rs-allowed to monitor their e/e s
communications within reasonable limits
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy.
? Tough task-to decide how much monitoring is
necessary?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Convenient methods that kills privacy..
? Digital footprints- to track what e/e s do; delivery
records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record ppl
passing time in vehicle without stopping them
? Cell phones- monthly bill cn be reviewed
? Even location from where the calls were recd or
made could b traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defending e/e privacy rights
? e/r not to intrude e/e personal life, choices,
background, habits etc
? Without considering the e/e s interest not to
be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When e/e not trusted he/she would no longer
see any incentive in being productive
/efficient.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Processes where privacy can b
breached?
? During hiring- confidential info like pay, family
background etc- if relevant but to be kept
confidential in co records
? During perf evaluation- to check work habits and
client mgt to find causes for poor perf etc
? During electronic surveillance- necessary to keep
a check on the work space activities
? Electronically stored e/e data- getting access to
wrong people- personal and professional data
must be kept confidential.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace plagiarism
Types
? Using others? images
? Taking credit fr an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effects
? Damage reputation negative
impact on e/e career
? Legal consequences-
copyrights violation
? Company goodwill harmed
? Fairness to peers
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Employee privacy and ethics (imp)
? e/e privacy- freedom for the e/e s from
unauthorised intrusion from e/rs
? A controversial and legal issue
? e/rs-allowed to monitor their e/e s
communications within reasonable limits
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy.
? Tough task-to decide how much monitoring is
necessary?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Convenient methods that kills privacy..
? Digital footprints- to track what e/e s do; delivery
records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record ppl
passing time in vehicle without stopping them
? Cell phones- monthly bill cn be reviewed
? Even location from where the calls were recd or
made could b traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defending e/e privacy rights
? e/r not to intrude e/e personal life, choices,
background, habits etc
? Without considering the e/e s interest not to
be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When e/e not trusted he/she would no longer
see any incentive in being productive
/efficient.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Processes where privacy can b
breached?
? During hiring- confidential info like pay, family
background etc- if relevant but to be kept
confidential in co records
? During perf evaluation- to check work habits and
client mgt to find causes for poor perf etc
? During electronic surveillance- necessary to keep
a check on the work space activities
? Electronically stored e/e data- getting access to
wrong people- personal and professional data
must be kept confidential.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Guidelines(imp)
? Let there be a clear policy- taking consent and making
them aware of what is pvt and what is not
? Only on legal grounds-no other utility of the
monitoring tools
? Do not have unnecessary harsh policies- result in
attrition.
? No electronic harrassment ? offensive emails/dirty
jokes take enough care
? Use of internet only for business
? Use of all electronic tools for business or professional
purpose
? In-house privacy controller- for large orgtns can be
hired ? rep for data protection and use of techno in the
orgtn
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace plagiarism
Types
? Using others? images
? Taking credit fr an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effects
? Damage reputation negative
impact on e/e career
? Legal consequences-
copyrights violation
? Company goodwill harmed
? Fairness to peers
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Employee privacy and ethics (imp)
? e/e privacy- freedom for the e/e s from
unauthorised intrusion from e/rs
? A controversial and legal issue
? e/rs-allowed to monitor their e/e s
communications within reasonable limits
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy.
? Tough task-to decide how much monitoring is
necessary?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Convenient methods that kills privacy..
? Digital footprints- to track what e/e s do; delivery
records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record ppl
passing time in vehicle without stopping them
? Cell phones- monthly bill cn be reviewed
? Even location from where the calls were recd or
made could b traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defending e/e privacy rights
? e/r not to intrude e/e personal life, choices,
background, habits etc
? Without considering the e/e s interest not to
be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When e/e not trusted he/she would no longer
see any incentive in being productive
/efficient.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Processes where privacy can b
breached?
? During hiring- confidential info like pay, family
background etc- if relevant but to be kept
confidential in co records
? During perf evaluation- to check work habits and
client mgt to find causes for poor perf etc
? During electronic surveillance- necessary to keep
a check on the work space activities
? Electronically stored e/e data- getting access to
wrong people- personal and professional data
must be kept confidential.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Guidelines(imp)
? Let there be a clear policy- taking consent and making
them aware of what is pvt and what is not
? Only on legal grounds-no other utility of the
monitoring tools
? Do not have unnecessary harsh policies- result in
attrition.
? No electronic harrassment ? offensive emails/dirty
jokes take enough care
? Use of internet only for business
? Use of all electronic tools for business or professional
purpose
? In-house privacy controller- for large orgtns can be
hired ? rep for data protection and use of techno in the
orgtn
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace plagiarism
Types
? Using others? images
? Taking credit fr an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effects
? Damage reputation negative
impact on e/e career
? Legal consequences-
copyrights violation
? Company goodwill harmed
? Fairness to peers
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Employee privacy and ethics (imp)
? e/e privacy- freedom for the e/e s from
unauthorised intrusion from e/rs
? A controversial and legal issue
? e/rs-allowed to monitor their e/e s
communications within reasonable limits
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy.
? Tough task-to decide how much monitoring is
necessary?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Convenient methods that kills privacy..
? Digital footprints- to track what e/e s do; delivery
records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record ppl
passing time in vehicle without stopping them
? Cell phones- monthly bill cn be reviewed
? Even location from where the calls were recd or
made could b traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defending e/e privacy rights
? e/r not to intrude e/e personal life, choices,
background, habits etc
? Without considering the e/e s interest not to
be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When e/e not trusted he/she would no longer
see any incentive in being productive
/efficient.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Processes where privacy can b
breached?
? During hiring- confidential info like pay, family
background etc- if relevant but to be kept
confidential in co records
? During perf evaluation- to check work habits and
client mgt to find causes for poor perf etc
? During electronic surveillance- necessary to keep
a check on the work space activities
? Electronically stored e/e data- getting access to
wrong people- personal and professional data
must be kept confidential.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Guidelines(imp)
? Let there be a clear policy- taking consent and making
them aware of what is pvt and what is not
? Only on legal grounds-no other utility of the
monitoring tools
? Do not have unnecessary harsh policies- result in
attrition.
? No electronic harrassment ? offensive emails/dirty
jokes take enough care
? Use of internet only for business
? Use of all electronic tools for business or professional
purpose
? In-house privacy controller- for large orgtns can be
hired ? rep for data protection and use of techno in the
orgtn
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace plagiarism
Types
? Using others? images
? Taking credit fr an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effects
? Damage reputation negative
impact on e/e career
? Legal consequences-
copyrights violation
? Company goodwill harmed
? Fairness to peers
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Employee privacy and ethics (imp)
? e/e privacy- freedom for the e/e s from
unauthorised intrusion from e/rs
? A controversial and legal issue
? e/rs-allowed to monitor their e/e s
communications within reasonable limits
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy.
? Tough task-to decide how much monitoring is
necessary?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Convenient methods that kills privacy..
? Digital footprints- to track what e/e s do; delivery
records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record ppl
passing time in vehicle without stopping them
? Cell phones- monthly bill cn be reviewed
? Even location from where the calls were recd or
made could b traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defending e/e privacy rights
? e/r not to intrude e/e personal life, choices,
background, habits etc
? Without considering the e/e s interest not to
be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When e/e not trusted he/she would no longer
see any incentive in being productive
/efficient.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Processes where privacy can b
breached?
? During hiring- confidential info like pay, family
background etc- if relevant but to be kept
confidential in co records
? During perf evaluation- to check work habits and
client mgt to find causes for poor perf etc
? During electronic surveillance- necessary to keep
a check on the work space activities
? Electronically stored e/e data- getting access to
wrong people- personal and professional data
must be kept confidential.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Guidelines(imp)
? Let there be a clear policy- taking consent and making
them aware of what is pvt and what is not
? Only on legal grounds-no other utility of the
monitoring tools
? Do not have unnecessary harsh policies- result in
attrition.
? No electronic harrassment ? offensive emails/dirty
jokes take enough care
? Use of internet only for business
? Use of all electronic tools for business or professional
purpose
? In-house privacy controller- for large orgtns can be
hired ? rep for data protection and use of techno in the
orgtn
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace plagiarism
Types
? Using others? images
? Taking credit fr an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effects
? Damage reputation negative
impact on e/e career
? Legal consequences-
copyrights violation
? Company goodwill harmed
? Fairness to peers
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Employee privacy and ethics (imp)
? e/e privacy- freedom for the e/e s from
unauthorised intrusion from e/rs
? A controversial and legal issue
? e/rs-allowed to monitor their e/e s
communications within reasonable limits
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy.
? Tough task-to decide how much monitoring is
necessary?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Convenient methods that kills privacy..
? Digital footprints- to track what e/e s do; delivery
records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record ppl
passing time in vehicle without stopping them
? Cell phones- monthly bill cn be reviewed
? Even location from where the calls were recd or
made could b traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defending e/e privacy rights
? e/r not to intrude e/e personal life, choices,
background, habits etc
? Without considering the e/e s interest not to
be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When e/e not trusted he/she would no longer
see any incentive in being productive
/efficient.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Processes where privacy can b
breached?
? During hiring- confidential info like pay, family
background etc- if relevant but to be kept
confidential in co records
? During perf evaluation- to check work habits and
client mgt to find causes for poor perf etc
? During electronic surveillance- necessary to keep
a check on the work space activities
? Electronically stored e/e data- getting access to
wrong people- personal and professional data
must be kept confidential.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Guidelines(imp)
? Let there be a clear policy- taking consent and making
them aware of what is pvt and what is not
? Only on legal grounds-no other utility of the
monitoring tools
? Do not have unnecessary harsh policies- result in
attrition.
? No electronic harrassment ? offensive emails/dirty
jokes take enough care
? Use of internet only for business
? Use of all electronic tools for business or professional
purpose
? In-house privacy controller- for large orgtns can be
hired ? rep for data protection and use of techno in the
orgtn
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace plagiarism
Types
? Using others? images
? Taking credit fr an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effects
? Damage reputation negative
impact on e/e career
? Legal consequences-
copyrights violation
? Company goodwill harmed
? Fairness to peers
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Employee privacy and ethics (imp)
? e/e privacy- freedom for the e/e s from
unauthorised intrusion from e/rs
? A controversial and legal issue
? e/rs-allowed to monitor their e/e s
communications within reasonable limits
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy.
? Tough task-to decide how much monitoring is
necessary?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Convenient methods that kills privacy..
? Digital footprints- to track what e/e s do; delivery
records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record ppl
passing time in vehicle without stopping them
? Cell phones- monthly bill cn be reviewed
? Even location from where the calls were recd or
made could b traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defending e/e privacy rights
? e/r not to intrude e/e personal life, choices,
background, habits etc
? Without considering the e/e s interest not to
be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When e/e not trusted he/she would no longer
see any incentive in being productive
/efficient.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Processes where privacy can b
breached?
? During hiring- confidential info like pay, family
background etc- if relevant but to be kept
confidential in co records
? During perf evaluation- to check work habits and
client mgt to find causes for poor perf etc
? During electronic surveillance- necessary to keep
a check on the work space activities
? Electronically stored e/e data- getting access to
wrong people- personal and professional data
must be kept confidential.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Guidelines(imp)
? Let there be a clear policy- taking consent and making
them aware of what is pvt and what is not
? Only on legal grounds-no other utility of the
monitoring tools
? Do not have unnecessary harsh policies- result in
attrition.
? No electronic harrassment ? offensive emails/dirty
jokes take enough care
? Use of internet only for business
? Use of all electronic tools for business or professional
purpose
? In-house privacy controller- for large orgtns can be
hired ? rep for data protection and use of techno in the
orgtn
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
WORKPLACE PRIVACY & ETHICS
MODULE 4
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace monitoring
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
? Monitoring- routine part ? e/r e/e relationship
? Checks on quantity and quality
? More controversial forms- staff email, internet
use, phone calls, CCTV
? Almost everything e/e do on the office system
can be monitored.
? Invading e/e?s privacy- norm of the workplace
? Concern over litigation
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Need?
? Employee/ customer safety
? Liability & investigations-harrassments,thefts
? Network and system perf.:protection against
virus, avoiding network slowdown etc
? e/r ?s right to know- what is going on
? To check procedures are followed
? To prevent/detect crime
? In the interest of national security
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Types of WP monitoring
Hardware monitoring ? Audio surveillance- misuse
of phones/ leak info/ legal
needs/training needs
? Video surveillance-misuse of
property/work perf check
? Magstripe cards- integrated
to e/e ids
? Infrared badges
Software monitoring
? Not yet regulated by govt
? Used w/o e/e awareness
Types:
? Electronic surveillance
? Spyware- user keystrokes,
email copies, IM copies
? Screen, data and idle time
monitoring- pearl tool
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Advantages
? Reduce mistakes
? Supporting strengths
? e/e safety
? Violation of policies
prevented
? Unbiased perf evaluation
Disadvantages
? Prevents efficiency-being
too intrusive
? Expensive- equipmt/staff
? Drops e/rs into false sense
of security
? Hurts morale of teams
? Encourage competition
among e/es than team to
achieve common goals
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crimes
? Type of fraud where computers are used
? Ex.:
- unlawful use or access- hacking(without
permission)
- access for fraud
- Data theft- use/ copy/damage/ alter info w/w
permission
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Computer crime at workplace
? Methods/types:
- Software theft-unlicensed copying
- Hardware theft- microprocessors, laptops,
hard disk drives etc
? How to prevent?
- e/r based: firewalls, training, audits, etc
- e/e based: rewards fr reporting, ISO
agreements, virus protection prgms etc
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Workplace plagiarism
Types
? Using others? images
? Taking credit fr an idea
? Failing to list a source
? Stealing blog content
? Reproducing an e-book
Effects
? Damage reputation negative
impact on e/e career
? Legal consequences-
copyrights violation
? Company goodwill harmed
? Fairness to peers
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Employee privacy and ethics (imp)
? e/e privacy- freedom for the e/e s from
unauthorised intrusion from e/rs
? A controversial and legal issue
? e/rs-allowed to monitor their e/e s
communications within reasonable limits
? Other pvt spaces- lockers/ drawers- e/rs
should not violate worker?s privacy.
? Tough task-to decide how much monitoring is
necessary?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
No privacy but convenience..
A debate?
? Would you like to have complete privacy in ur
workplace but accept the risk of potential
abuse/ other problems??
? Are you ready to give away ur privacy for the
benefit of avoiding any problems?
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Convenient methods that kills privacy..
? Digital footprints- to track what e/e s do; delivery
records, travel logs, expense reporting,
productivity reporting etc
? Electronic toll collection tags- to record ppl
passing time in vehicle without stopping them
? Cell phones- monthly bill cn be reviewed
? Even location from where the calls were recd or
made could b traced- transmission towers etc
? GPS- should not track e/e s location after work
hours-unfair to do so. (global positioning system)
Use all the above with legitimate business reasons.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Defending e/e privacy rights
? e/r not to intrude e/e personal life, choices,
background, habits etc
? Without considering the e/e s interest not to
be disclose/discussed in public
? Ex.: pvt msgs in inbox, checking purses/wallets
in public
? When e/e not trusted he/she would no longer
see any incentive in being productive
/efficient.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Processes where privacy can b
breached?
? During hiring- confidential info like pay, family
background etc- if relevant but to be kept
confidential in co records
? During perf evaluation- to check work habits and
client mgt to find causes for poor perf etc
? During electronic surveillance- necessary to keep
a check on the work space activities
? Electronically stored e/e data- getting access to
wrong people- personal and professional data
must be kept confidential.
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
Guidelines(imp)
? Let there be a clear policy- taking consent and making
them aware of what is pvt and what is not
? Only on legal grounds-no other utility of the
monitoring tools
? Do not have unnecessary harsh policies- result in
attrition.
? No electronic harrassment ? offensive emails/dirty
jokes take enough care
? Use of internet only for business
? Use of all electronic tools for business or professional
purpose
? In-house privacy controller- for large orgtns can be
hired ? rep for data protection and use of techno in the
orgtn
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
By Ms. Divya Prabhu P., Asst. Prof.@ MITE,
Moodbidri
FirstRanker.com - FirstRanker's Choice
This post was last modified on 18 February 2020