SlideShare a Scribd company logo
1 of 13
Code of Conduct
• A Code of Conduct is an agreement that is
made between an employer and an employee
which outlines the rules and procedures that
the employee must comply to in the process
of their job.
• Code of Conduct is read and signed by an
employee, on an induction day or prior to the
beginning of their employment.
The reasons Code of Conducts contract are used;
1. Creates a positive working environment where
social norms are adhered to and every
employee is respected
2. Binding contract which can be used to discipline
an employee (including dismissal). Can be used
in a defence for ‘unfair dismissal’ if it comes
before the courts.
3. Can be used as a reference for employees to
refer back to if required.
4. Can help to educate new employees of the
expected behaviours.
What goes in a Code of Conduct?
Internet Use –
• This would be a significant section of the Code
of Conduct and would outline what an
employee can and can’t use the internet for in
the workplace.
• It would stipulate the use of social network
sites and the types of websites that would be
deemed innapropriate for the workplace
(porn, online gambling, youtube etc).
Employee Emails
There wil be rules regarding the type of
information that can be sent from this email.
In particular the use of the company email for
personal emails or emails that might contain
information which goes against the companies
policies regarding privacy, security of classified
information, cyber bullying or inapropriate
humour.
Employee Privacy
These will includerules regarding the
distribution and collection of private
information of other employees or customers.
• For example rules regarding giving out other
staff members personal information like
mobile numbers, address etc.
• Monitoring of Staff – The Code of Conduct might
stipulate the ways management might monitor
users computer use.
• Some of this monitoring might include work
emails, internet usage (websites and download
amounts) and computer activities during the
working day.
The organisation might stipulate that all emails sent
from the company will be monitored for
inapropriate messgages.
• Working at Home –
When staff work from home, the rules change.
There will need to be a section which allows for;
1. Hours of Work - Focus on amount of work
completed rather than office hours as this
could vary according to the employees home
situation (kids, sick relative)
2. Security – Staff might be accessing the work
server through a VPN. Rules regarding
passwords, locked office, computer
passwords.
3. Employee and Internet Monitoring – This
might be reduced in a working from home
situation as often staff will be using their own
computer/laptop (Employee personal privacy
issues).
What is employee surveillance?
• Monitoring the employee/s actions during
the working period and/or using business
owned technology.
What equipment is used to monitor
employees?
• Video camera surveillance
• Key logging software
• Other workers that observe employees
• Desktop monitoring software – remotely
connect to employees PC and even
control it etc
• Log files – leave a record of all the
activities that took place on the PC
• Phone recording
Advantages of Employee
Surveillance
Advantages:
• Maintaining or increasing companies
productivity
• It can save time and money
• Reduces possibility of liability
• Increase security on your network
Disadvantages of Employee
Surveillance
• It is intrusive and may impact the privacy of
employees
• Mistrust issues between employer and
employee
• Cost of set-up and maintenance
• Can increase stress amongst employees
resulting in sickness
• Management may target employees unfairly
(bullying)
• Some data gathered may be used in an
unauthorised or illegal manner

More Related Content

What's hot

Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information SystemSatya P. Joshi
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3David Sweigert
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)Biswajit Bhattacharjee
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy Dguest34b014
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information systemOnline
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...Zara Nawaz
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015Jeffery Brown
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and youArt Ocain
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a SciencePankaj Rane
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidentsbelsis
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security controlCheng Olayvar
 
Information Security Basics for Businesses and Individuals
Information Security Basics for Businesses and IndividualsInformation Security Basics for Businesses and Individuals
Information Security Basics for Businesses and IndividualsJosh Moulin, MSISA,CISSP
 

What's hot (20)

Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3NIST Patch Management SP 800-40 Rev 3
NIST Patch Management SP 800-40 Rev 3
 
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
SECURITY & CONTROL OF INFORMATION SYSTEM (Management Information System)
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
 
Security & control in management information system
Security & control in management information systemSecurity & control in management information system
Security & control in management information system
 
information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...information security (Audit mechanism, intrusion detection, password manageme...
information security (Audit mechanism, intrusion detection, password manageme...
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
Overview of Information Security & Privacy
Overview of Information Security & PrivacyOverview of Information Security & Privacy
Overview of Information Security & Privacy
 
Internet safety and you
Internet safety and youInternet safety and you
Internet safety and you
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
Topic11
Topic11Topic11
Topic11
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidents
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Information system and security control
Information system and security controlInformation system and security control
Information system and security control
 
Information Security Basics for Businesses and Individuals
Information Security Basics for Businesses and IndividualsInformation Security Basics for Businesses and Individuals
Information Security Basics for Businesses and Individuals
 

Similar to code of conduct

Internet monitoring
Internet monitoringInternet monitoring
Internet monitoringCorrje
 
performance management- work place stress.pptx
performance management- work place stress.pptxperformance management- work place stress.pptx
performance management- work place stress.pptxAnitha Ishu
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesNapier University
 
How workplace surveillance works katrina hunos
How workplace surveillance works katrina hunosHow workplace surveillance works katrina hunos
How workplace surveillance works katrina hunoskat_hunos
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policygfair3
 
ISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGTISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGTcheyennedaisy
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulationsmrmwood
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEUsman Ahmed
 
Security Standards, Policies, and Procedures Manual TemplateInstru.docx
Security Standards, Policies, and Procedures Manual TemplateInstru.docxSecurity Standards, Policies, and Procedures Manual TemplateInstru.docx
Security Standards, Policies, and Procedures Manual TemplateInstru.docxjeffreye3
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposalDale White
 
MONITORING EMPLOYEES ON NETWORKS
MONITORING EMPLOYEES ON NETWORKSMONITORING EMPLOYEES ON NETWORKS
MONITORING EMPLOYEES ON NETWORKSSinuSaji1
 
How workplace surveillance works
How workplace surveillance worksHow workplace surveillance works
How workplace surveillance worksfavour0123
 
Surveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsSurveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsDLA Piper (Canada) LLP
 
Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Kielentot Martinez
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network designnephtalie
 

Similar to code of conduct (20)

Internet monitoring
Internet monitoringInternet monitoring
Internet monitoring
 
performance management- work place stress.pptx
performance management- work place stress.pptxperformance management- work place stress.pptx
performance management- work place stress.pptx
 
Presentation 2
Presentation  2Presentation  2
Presentation 2
 
PACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other DocumentsPACE-IT: Security Policies and Other Documents
PACE-IT: Security Policies and Other Documents
 
Hiring and firing in the digital age
Hiring and firing in the digital ageHiring and firing in the digital age
Hiring and firing in the digital age
 
DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
How workplace surveillance works katrina hunos
How workplace surveillance works katrina hunosHow workplace surveillance works katrina hunos
How workplace surveillance works katrina hunos
 
Acceptable use policy
Acceptable use policyAcceptable use policy
Acceptable use policy
 
ISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGTISSP on Fair Use of Organizational Technology for CGT
ISSP on Fair Use of Organizational Technology for CGT
 
Rules of Behavior
Rules of BehaviorRules of Behavior
Rules of Behavior
 
3.6 legislation and regulations
3.6 legislation and regulations3.6 legislation and regulations
3.6 legislation and regulations
 
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACEMemorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
Memorandum POLICIES FOR INTERNET & TECHNOLOGY USE IN THE WORKPLACE
 
Case study 10
Case study 10Case study 10
Case study 10
 
Security Standards, Policies, and Procedures Manual TemplateInstru.docx
Security Standards, Policies, and Procedures Manual TemplateInstru.docxSecurity Standards, Policies, and Procedures Manual TemplateInstru.docx
Security Standards, Policies, and Procedures Manual TemplateInstru.docx
 
ISStateGovtProposal
ISStateGovtProposalISStateGovtProposal
ISStateGovtProposal
 
MONITORING EMPLOYEES ON NETWORKS
MONITORING EMPLOYEES ON NETWORKSMONITORING EMPLOYEES ON NETWORKS
MONITORING EMPLOYEES ON NETWORKS
 
How workplace surveillance works
How workplace surveillance worksHow workplace surveillance works
How workplace surveillance works
 
Surveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsSurveillance of Your Electronic Systems
Surveillance of Your Electronic Systems
 
Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 

code of conduct

  • 2. • A Code of Conduct is an agreement that is made between an employer and an employee which outlines the rules and procedures that the employee must comply to in the process of their job. • Code of Conduct is read and signed by an employee, on an induction day or prior to the beginning of their employment.
  • 3. The reasons Code of Conducts contract are used; 1. Creates a positive working environment where social norms are adhered to and every employee is respected 2. Binding contract which can be used to discipline an employee (including dismissal). Can be used in a defence for ‘unfair dismissal’ if it comes before the courts. 3. Can be used as a reference for employees to refer back to if required. 4. Can help to educate new employees of the expected behaviours.
  • 4. What goes in a Code of Conduct? Internet Use – • This would be a significant section of the Code of Conduct and would outline what an employee can and can’t use the internet for in the workplace. • It would stipulate the use of social network sites and the types of websites that would be deemed innapropriate for the workplace (porn, online gambling, youtube etc).
  • 5. Employee Emails There wil be rules regarding the type of information that can be sent from this email. In particular the use of the company email for personal emails or emails that might contain information which goes against the companies policies regarding privacy, security of classified information, cyber bullying or inapropriate humour.
  • 6. Employee Privacy These will includerules regarding the distribution and collection of private information of other employees or customers. • For example rules regarding giving out other staff members personal information like mobile numbers, address etc.
  • 7. • Monitoring of Staff – The Code of Conduct might stipulate the ways management might monitor users computer use. • Some of this monitoring might include work emails, internet usage (websites and download amounts) and computer activities during the working day. The organisation might stipulate that all emails sent from the company will be monitored for inapropriate messgages.
  • 8. • Working at Home – When staff work from home, the rules change. There will need to be a section which allows for; 1. Hours of Work - Focus on amount of work completed rather than office hours as this could vary according to the employees home situation (kids, sick relative) 2. Security – Staff might be accessing the work server through a VPN. Rules regarding passwords, locked office, computer passwords.
  • 9. 3. Employee and Internet Monitoring – This might be reduced in a working from home situation as often staff will be using their own computer/laptop (Employee personal privacy issues).
  • 10. What is employee surveillance? • Monitoring the employee/s actions during the working period and/or using business owned technology.
  • 11. What equipment is used to monitor employees? • Video camera surveillance • Key logging software • Other workers that observe employees • Desktop monitoring software – remotely connect to employees PC and even control it etc • Log files – leave a record of all the activities that took place on the PC • Phone recording
  • 12. Advantages of Employee Surveillance Advantages: • Maintaining or increasing companies productivity • It can save time and money • Reduces possibility of liability • Increase security on your network
  • 13. Disadvantages of Employee Surveillance • It is intrusive and may impact the privacy of employees • Mistrust issues between employer and employee • Cost of set-up and maintenance • Can increase stress amongst employees resulting in sickness • Management may target employees unfairly (bullying) • Some data gathered may be used in an unauthorised or illegal manner