Surveillance of Your Electronic Systems

756 views

Published on

Published in: Business, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
756
On SlideShare
0
From Embeds
0
Number of Embeds
367
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Surveillance of Your Electronic Systems

  1. 1. IS THAT SOLITAIRE ON YOUR SCREEN?!SURVEILLANCE OF YOUR ELECTRONIC SYSTEMS Tania da Silva May 24, 2012
  2. 2. INTRODUCTIONUse of the Internet at work and its advantages:1. Quicker and more efficient communications to optimize productivity;2. Important research and consultation tools;3. Better visibility on the market;4. Better relationships with clients and business partners.
  3. 3. THE LEGAL RISKS1. Defamatory, harassing, offensive or illegal content;2. Intellectual property infringement;3. Damage to the company’s reputation;4. Failure to protect the company’s privileged or confidential information;5. Harassment;6. Loss of time and diminished employee productivity;7. Risks to network security.
  4. 4. DOES THE EMPLOYER HAVE A RIGHT TO MONITOR?WHY?YES, because of:• Its powers of management and control to ensure that the company functions properly;• Its disciplinary powers;• Its powers to create standards and regulations;• Its contractual rights.• What of its property rights?
  5. 5. WHAT ARE THE LIMITS OF THE EMPLOYER’S RIGHTTO MONITOR?The laws that protect privacy:1. Federal laws regarding personal information;2. Quebec’s Charter of human rights and freedoms;3. The Civil Code of Quebec;4. Quebec laws regarding personal information.
  6. 6. EXPECTATION OF PRIVACY• What is an expectation of privacy?• How can the level of employees’ expectation of privacy with respect to the use of computer systems at work be determined?
  7. 7. EXPECTATION OF PRIVACY (continued)• Factors to consider: 1. Are the employees aware of the monitoring? 2. Was the consent with respect to the monitoring? 3. The vulnerable nature of Internet communications; 4. The work environment;
  8. 8. PRACTICAL METHODS FOR REDUCING EMPLOYEES’EXPECTATION OF PRIVACY• Create a written policy regarding the use of the company’s information technology, which, amongst other things, should include a list of activities/uses which are not authorized;• Have the policy signed upon hiring;• Provide reminder of the policy upon use of information technology with warning messages or require a password to access sites which are blocked by the company;• Use progressive disciplinary measures when the policy is not respected;
  9. 9. QUESTIONS?
  10. 10. THANK YOU!

×