SlideShare a Scribd company logo
1 of 8
Surveillance in
the Workplace
Luis Medina and Rick Lizotte
Background


•   Privacy not among Constitutional rights
•   But Fourth Amendment—right against unreasonable search and
    seizure
•   Not much law about privacy until end of the 19 th century
•   Invention of microphone and telephone—new threats to privacy
•   1890—Supreme Court Justice wants right to privacy from wiretapping,
    not only house searches
•   1986—Electronic Communications Privacy Act—allows employer
    right to monitor business but not personal communication
Background
•   Computer networks and
    new camera equipment
    allow better monitoring
    of the workplace
•   Employers can fire for
    any reason not covered
    by law
•   Employers often look for
    misuse of computer,
    stealing, drug use and
    alcohol use, lack of
    productivity
•   More extreme—camera
    in locker
    room/bathroom;
    contract not to smoke or
    drink at home to
    prevent use of medical
    insurance later
Background
The Controversy

• Some people believe
  electronic surveillance is good
  for security, safety, and
  productivity.
• Others believe it is a violation
  of privacy rights and should
  not be used.

•    My opinion—use of electronic
    surveillance good if only used
    to protect employees and not
    to violate privacy.

                                     From the movie 1984
Arguments For
         Workplace Surveillance

1. The use of electronic
   surveillance increases worker
   productivity
2. Helps to prevent accidents at
   work
3. Essential for the protection of
   employees
4. May prevent employee theft
   and harassment by other
   employees
5. May provide a way to make
   work evaluation objective
Arguments Against
     Workplace Surveillance

1.   Employees have the right to privacy in some
     areas of workplace

2.   Surveillance creates a hostile environment
     which makes employees fearful and unhappy

3.   Employers don’t know how to separate the
     public from the private—what is in the
     workplace from what is in the home

4.   Surveillance provides an opportunity for
     sexual harassment by employer or security
     personnel
My Conclusion
•   Electronic surveillance
    may be necessary to
    secure safety and
    productivity

•   However, electronic
    surveillance must never
    violate the employees’
    rights to privacy and
    cause bad feeling in the
    workplace

•   Workers need to be
    notified of surveillance

•   Finally, where does the
    employers right to
    monitor us stop?

More Related Content

What's hot

Privacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyPrivacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyRica Young
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018Fizaril Amzari Omar
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Securitymtvvvv
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 
INTERNET OF THINGS PPT
INTERNET OF THINGS PPTINTERNET OF THINGS PPT
INTERNET OF THINGS PPTHarsh Kumar
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
11 Rules of Technology Success & Social Media 101
11 Rules of Technology Success & Social Media 10111 Rules of Technology Success & Social Media 101
11 Rules of Technology Success & Social Media 101Ramon Ray
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student workJorge Arturo Ortiz
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 

What's hot (20)

Privacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyPrivacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational Technology
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
INTERNET OF THINGS PPT
INTERNET OF THINGS PPTINTERNET OF THINGS PPT
INTERNET OF THINGS PPT
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
11 Rules of Technology Success & Social Media 101
11 Rules of Technology Success & Social Media 10111 Rules of Technology Success & Social Media 101
11 Rules of Technology Success & Social Media 101
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student work
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 

Viewers also liked

Visión y misión de la universidad nacional de cajamarca
Visión y misión de  la universidad nacional de cajamarcaVisión y misión de  la universidad nacional de cajamarca
Visión y misión de la universidad nacional de cajamarca996483919
 
Emendas ao pl 4921 relatório final do policarpo.
Emendas ao pl 4921   relatório final do policarpo.Emendas ao pl 4921   relatório final do policarpo.
Emendas ao pl 4921 relatório final do policarpo.Tenente Poliglota
 
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995Kevin Caballero Marin
 
2.3. fundamento epistemológicos da medicna - problemas fundamentais do conh...
2.3. fundamento epistemológicos da medicna -   problemas fundamentais do conh...2.3. fundamento epistemológicos da medicna -   problemas fundamentais do conh...
2.3. fundamento epistemológicos da medicna - problemas fundamentais do conh...Luiz-Salvador Miranda-Sa
 
Artigo: Resolução de problemas associado à comunicação
Artigo: Resolução de problemas associado à comunicaçãoArtigo: Resolução de problemas associado à comunicação
Artigo: Resolução de problemas associado à comunicaçãoMiguel de Carvalho
 
Metodología pacie-dokeos
Metodología pacie-dokeosMetodología pacie-dokeos
Metodología pacie-dokeosIsbelia Pelayo
 
Metalurgica fierro s
Metalurgica fierro sMetalurgica fierro s
Metalurgica fierro sFelipe Aliaga
 
Como conciliar gestão eficiente e respeito à legalidade - Mackenzie
Como conciliar gestão eficiente e respeito à legalidade - MackenzieComo conciliar gestão eficiente e respeito à legalidade - Mackenzie
Como conciliar gestão eficiente e respeito à legalidade - MackenzieAndré Laubenstein Pereira
 
María montessori proyecto modulo 2
María montessori proyecto modulo 2María montessori proyecto modulo 2
María montessori proyecto modulo 2Mayer Lozano
 
Trabajo corregido word2
Trabajo corregido word2Trabajo corregido word2
Trabajo corregido word2996483919
 
vestidos de inocencia
vestidos de inocenciavestidos de inocencia
vestidos de inocenciagramadal
 
A concorrência desleal e o crime de falsa alegação de
A concorrência desleal e o crime de falsa alegação deA concorrência desleal e o crime de falsa alegação de
A concorrência desleal e o crime de falsa alegação deVerlaine Costa
 

Viewers also liked (20)

Visión y misión de la universidad nacional de cajamarca
Visión y misión de  la universidad nacional de cajamarcaVisión y misión de  la universidad nacional de cajamarca
Visión y misión de la universidad nacional de cajamarca
 
Emendas ao pl 4921 relatório final do policarpo.
Emendas ao pl 4921   relatório final do policarpo.Emendas ao pl 4921   relatório final do policarpo.
Emendas ao pl 4921 relatório final do policarpo.
 
Derechos de autor
Derechos de autorDerechos de autor
Derechos de autor
 
Símbolos patrios del perú
Símbolos patrios del  perúSímbolos patrios del  perú
Símbolos patrios del perú
 
Proyecto final
Proyecto finalProyecto final
Proyecto final
 
Exposicionpereiravibra
ExposicionpereiravibraExposicionpereiravibra
Exposicionpereiravibra
 
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995
 
5. etapas do proc conhec
5. etapas do proc conhec5. etapas do proc conhec
5. etapas do proc conhec
 
2.3. fundamento epistemológicos da medicna - problemas fundamentais do conh...
2.3. fundamento epistemológicos da medicna -   problemas fundamentais do conh...2.3. fundamento epistemológicos da medicna -   problemas fundamentais do conh...
2.3. fundamento epistemológicos da medicna - problemas fundamentais do conh...
 
Artigo: Resolução de problemas associado à comunicação
Artigo: Resolução de problemas associado à comunicaçãoArtigo: Resolução de problemas associado à comunicação
Artigo: Resolução de problemas associado à comunicação
 
5 videos
5 videos5 videos
5 videos
 
Metodología pacie-dokeos
Metodología pacie-dokeosMetodología pacie-dokeos
Metodología pacie-dokeos
 
Metalurgica fierro s
Metalurgica fierro sMetalurgica fierro s
Metalurgica fierro s
 
Como conciliar gestão eficiente e respeito à legalidade - Mackenzie
Como conciliar gestão eficiente e respeito à legalidade - MackenzieComo conciliar gestão eficiente e respeito à legalidade - Mackenzie
Como conciliar gestão eficiente e respeito à legalidade - Mackenzie
 
María montessori proyecto modulo 2
María montessori proyecto modulo 2María montessori proyecto modulo 2
María montessori proyecto modulo 2
 
Trabajo corregido word2
Trabajo corregido word2Trabajo corregido word2
Trabajo corregido word2
 
vestidos de inocencia
vestidos de inocenciavestidos de inocencia
vestidos de inocencia
 
A concorrência desleal e o crime de falsa alegação de
A concorrência desleal e o crime de falsa alegação deA concorrência desleal e o crime de falsa alegação de
A concorrência desleal e o crime de falsa alegação de
 
Caso chile
Caso chileCaso chile
Caso chile
 
sexualidad humana
sexualidad humanasexualidad humana
sexualidad humana
 

Similar to Surveillance in the_workplace_highcontrast_ppt

Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challengesCRM
 
Unit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptxUnit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptxCallplanetsDeveloper
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacyG&A Partners
 
Internet monitoring
Internet monitoringInternet monitoring
Internet monitoringCorrje
 
Surveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsSurveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsDLA Piper (Canada) LLP
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxAmandaWeaver21
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet SafetyCharina Mostierra
 
New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issueslgarib
 
Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...Niki Avraam
 
Employees and Internet Use - Legal Perspective
Employees and Internet Use - Legal PerspectiveEmployees and Internet Use - Legal Perspective
Employees and Internet Use - Legal PerspectiveDarius Whelan
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Case IQ
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsDan Michaluk
 
Are Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- SpaffordAre Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- SpaffordMia Eaker
 

Similar to Surveillance in the_workplace_highcontrast_ppt (20)

Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
Unit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptxUnit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptx
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacy
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Information security
Information securityInformation security
Information security
 
Internet monitoring
Internet monitoringInternet monitoring
Internet monitoring
 
Surveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsSurveillance of Your Electronic Systems
Surveillance of Your Electronic Systems
 
code of conduct
code of conductcode of conduct
code of conduct
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptx
 
1 ictl-ethics
1 ictl-ethics1 ictl-ethics
1 ictl-ethics
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet Safety
 
New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issues
 
Unit 14 LO2
Unit 14 LO2Unit 14 LO2
Unit 14 LO2
 
Unit 14 LO2
Unit 14 LO2Unit 14 LO2
Unit 14 LO2
 
Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...
 
Employees and Internet Use - Legal Perspective
Employees and Internet Use - Legal PerspectiveEmployees and Internet Use - Legal Perspective
Employees and Internet Use - Legal Perspective
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
 
Are Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- SpaffordAre Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- Spafford
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...PsychoTech Services
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Recently uploaded (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
IGNOU MSCCFT and PGDCFT Exam Question Pattern: MCFT003 Counselling and Family...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Surveillance in the_workplace_highcontrast_ppt

  • 1. Surveillance in the Workplace Luis Medina and Rick Lizotte
  • 2. Background • Privacy not among Constitutional rights • But Fourth Amendment—right against unreasonable search and seizure • Not much law about privacy until end of the 19 th century • Invention of microphone and telephone—new threats to privacy • 1890—Supreme Court Justice wants right to privacy from wiretapping, not only house searches • 1986—Electronic Communications Privacy Act—allows employer right to monitor business but not personal communication
  • 3. Background • Computer networks and new camera equipment allow better monitoring of the workplace • Employers can fire for any reason not covered by law • Employers often look for misuse of computer, stealing, drug use and alcohol use, lack of productivity • More extreme—camera in locker room/bathroom; contract not to smoke or drink at home to prevent use of medical insurance later
  • 5. The Controversy • Some people believe electronic surveillance is good for security, safety, and productivity. • Others believe it is a violation of privacy rights and should not be used. • My opinion—use of electronic surveillance good if only used to protect employees and not to violate privacy. From the movie 1984
  • 6. Arguments For Workplace Surveillance 1. The use of electronic surveillance increases worker productivity 2. Helps to prevent accidents at work 3. Essential for the protection of employees 4. May prevent employee theft and harassment by other employees 5. May provide a way to make work evaluation objective
  • 7. Arguments Against Workplace Surveillance 1. Employees have the right to privacy in some areas of workplace 2. Surveillance creates a hostile environment which makes employees fearful and unhappy 3. Employers don’t know how to separate the public from the private—what is in the workplace from what is in the home 4. Surveillance provides an opportunity for sexual harassment by employer or security personnel
  • 8. My Conclusion • Electronic surveillance may be necessary to secure safety and productivity • However, electronic surveillance must never violate the employees’ rights to privacy and cause bad feeling in the workplace • Workers need to be notified of surveillance • Finally, where does the employers right to monitor us stop?