SlideShare a Scribd company logo
1 of 13
Code of Conduct
• A Code of Conduct is an agreement that is
made between an employer and an employee
which outlines the rules and procedures that
the employee must comply to in the process
of their job.
• Code of Conduct is read and signed by an
employee, on an induction day or prior to the
beginning of their employment.
The reasons Code of Conducts contract are used;
1. Creates a positive working environment where
social norms are adhered to and every
employee is respected
2. Binding contract which can be used to discipline
an employee (including dismissal). Can be used
in a defence for ‘unfair dismissal’ if it comes
before the courts.
3. Can be used as a reference for employees to
refer back to if required.
4. Can help to educate new employees of the
expected behaviours.
What goes in a Code of Conduct?
Internet Use –
• This would be a significant section of the Code
of Conduct and would outline what an
employee can and can’t use the internet for in
the workplace.
• It would stipulate the use of social network
sites and the types of websites that would be
deemed innapropriate for the workplace
(porn, online gambling, youtube etc).
Employee Emails
There wil be rules regarding the type of
information that can be sent from this email.
In particular the use of the company email for
personal emails or emails that might contain
information which goes against the companies
policies regarding privacy, security of classified
information, cyber bullying or inapropriate
humour.
Employee Privacy
These will includerules regarding the
distribution and collection of private
information of other employees or customers.
• For example rules regarding giving out other
staff members personal information like
mobile numbers, address etc.
• Monitoring of Staff – The Code of Conduct might
stipulate the ways management might monitor
users computer use.
• Some of this monitoring might include work
emails, internet usage (websites and download
amounts) and computer activities during the
working day.
The organisation might stipulate that all emails sent
from the company will be monitored for
inapropriate messgages.
• Working at Home –
When staff work from home, the rules change.
There will need to be a section which allows for;
1. Hours of Work - Focus on amount of work
completed rather than office hours as this
could vary according to the employees home
situation (kids, sick relative)
2. Security – Staff might be accessing the work
server through a VPN. Rules regarding
passwords, locked office, computer
passwords.
3. Employee and Internet Monitoring – This
might be reduced in a working from home
situation as often staff will be using their own
computer/laptop (Employee personal privacy
issues).
What is employee surveillance?
• Monitoring the employee/s actions during
the working period and/or using business
owned technology.
What equipment is used to monitor
employees?
• Video camera surveillance
• Key logging software
• Other workers that observe employees
• Desktop monitoring software – remotely
connect to employees PC and even
control it etc
• Log files – leave a record of all the
activities that took place on the PC
• Phone recording
Advantages of Employee
Surveillance
Advantages:
• Maintaining or increasing companies
productivity
• It can save time and money
• Reduces possibility of liability
• Increase security on your network
Disadvantages of Employee
Surveillance
• It is intrusive and may impact the privacy of
employees
• Mistrust issues between employer and
employee
• Cost of set-up and maintenance
• Can increase stress amongst employees
resulting in sickness
• Management may target employees unfairly
(bullying)
• Some data gathered may be used in an
unauthorised or illegal manner

More Related Content

What's hot

Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
Atlantic Training, LLC.
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
Biswajit Bhattacharjee
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
guest34b014
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
Cheng Olayvar
 

What's hot (20)

Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
Topic11
Topic11Topic11
Topic11
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidents
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 
Information Security Basics for Businesses and Individuals
Information Security Basics for Businesses and IndividualsInformation Security Basics for Businesses and Individuals
Information Security Basics for Businesses and Individuals
 

Similar to code of conduct

performance management- work place stress.pptx
performance management- work place stress.pptxperformance management- work place stress.pptx
performance management- work place stress.pptx
Anitha Ishu
 
How workplace surveillance works katrina hunos
How workplace surveillance works katrina hunosHow workplace surveillance works katrina hunos
How workplace surveillance works katrina hunos
kat_hunos
 
ISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGTISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGT
cheyennedaisy
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulations
mrmwood
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Usman Ahmed
 
Security Standards, Policies, and Procedures Manual TemplateInstru.docx
Security Standards, Policies, and Procedures Manual TemplateInstru.docxSecurity Standards, Policies, and Procedures Manual TemplateInstru.docx
Security Standards, Policies, and Procedures Manual TemplateInstru.docx
jeffreye3
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
Dale White
 
Surveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsSurveillance of Your Electronic Systems
Surveillance of Your Electronic Systems
DLA Piper (Canada) LLP
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
nephtalie
 

Similar to code of conduct (20)

Internet monitoring
Internet monitoringInternet monitoring
Internet monitoring
 
performance management- work place stress.pptx
performance management- work place stress.pptxperformance management- work place stress.pptx
performance management- work place stress.pptx
 
Presentation 2
Presentation  2Presentation  2
Presentation 2
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
 
Hiring and firing in the digital age
Hiring and firing in the digital ageHiring and firing in the digital age
Hiring and firing in the digital age
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
How workplace surveillance works katrina hunos
How workplace surveillance works katrina hunosHow workplace surveillance works katrina hunos
How workplace surveillance works katrina hunos
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
ISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGTISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGT
 
Rules of Behavior
Rules of BehaviorRules of Behavior
Rules of Behavior
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulations
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
 
Case study 10
Case study 10Case study 10
Case study 10
 
Security Standards, Policies, and Procedures Manual TemplateInstru.docx
Security Standards, Policies, and Procedures Manual TemplateInstru.docxSecurity Standards, Policies, and Procedures Manual TemplateInstru.docx
Security Standards, Policies, and Procedures Manual TemplateInstru.docx
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
 
MONITORING EMPLOYEES ON NETWORKS
MONITORING EMPLOYEES ON NETWORKSMONITORING EMPLOYEES ON NETWORKS
MONITORING EMPLOYEES ON NETWORKS
 
How workplace surveillance works
How workplace surveillance worksHow workplace surveillance works
How workplace surveillance works
 
Surveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsSurveillance of Your Electronic Systems
Surveillance of Your Electronic Systems
 
Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

code of conduct

  • 2. • A Code of Conduct is an agreement that is made between an employer and an employee which outlines the rules and procedures that the employee must comply to in the process of their job. • Code of Conduct is read and signed by an employee, on an induction day or prior to the beginning of their employment.
  • 3. The reasons Code of Conducts contract are used; 1. Creates a positive working environment where social norms are adhered to and every employee is respected 2. Binding contract which can be used to discipline an employee (including dismissal). Can be used in a defence for ‘unfair dismissal’ if it comes before the courts. 3. Can be used as a reference for employees to refer back to if required. 4. Can help to educate new employees of the expected behaviours.
  • 4. What goes in a Code of Conduct? Internet Use – • This would be a significant section of the Code of Conduct and would outline what an employee can and can’t use the internet for in the workplace. • It would stipulate the use of social network sites and the types of websites that would be deemed innapropriate for the workplace (porn, online gambling, youtube etc).
  • 5. Employee Emails There wil be rules regarding the type of information that can be sent from this email. In particular the use of the company email for personal emails or emails that might contain information which goes against the companies policies regarding privacy, security of classified information, cyber bullying or inapropriate humour.
  • 6. Employee Privacy These will includerules regarding the distribution and collection of private information of other employees or customers. • For example rules regarding giving out other staff members personal information like mobile numbers, address etc.
  • 7. • Monitoring of Staff – The Code of Conduct might stipulate the ways management might monitor users computer use. • Some of this monitoring might include work emails, internet usage (websites and download amounts) and computer activities during the working day. The organisation might stipulate that all emails sent from the company will be monitored for inapropriate messgages.
  • 8. • Working at Home – When staff work from home, the rules change. There will need to be a section which allows for; 1. Hours of Work - Focus on amount of work completed rather than office hours as this could vary according to the employees home situation (kids, sick relative) 2. Security – Staff might be accessing the work server through a VPN. Rules regarding passwords, locked office, computer passwords.
  • 9. 3. Employee and Internet Monitoring – This might be reduced in a working from home situation as often staff will be using their own computer/laptop (Employee personal privacy issues).
  • 10. What is employee surveillance? • Monitoring the employee/s actions during the working period and/or using business owned technology.
  • 11. What equipment is used to monitor employees? • Video camera surveillance • Key logging software • Other workers that observe employees • Desktop monitoring software – remotely connect to employees PC and even control it etc • Log files – leave a record of all the activities that took place on the PC • Phone recording
  • 12. Advantages of Employee Surveillance Advantages: • Maintaining or increasing companies productivity • It can save time and money • Reduces possibility of liability • Increase security on your network
  • 13. Disadvantages of Employee Surveillance • It is intrusive and may impact the privacy of employees • Mistrust issues between employer and employee • Cost of set-up and maintenance • Can increase stress amongst employees resulting in sickness • Management may target employees unfairly (bullying) • Some data gathered may be used in an unauthorised or illegal manner