SlideShare a Scribd company logo
1 of 7
Work Place Privacy
• Work place Privacy can be defined as “Freedom for employees from
unauthorized intrusion from the employers’ or the general right of the
Individual to be let alone”.
• Privacy at home or at our place is of course different from the one at our work
place.
• Work place is common to many other people and obviously owned and
controlled by other people. But still, there is a level of privacy the employees
has to maintain, in order to perform their job in an effective manner.
The major issues of work place privacy and its violations are as follows:
• Electronic surveillance and Video Monitoring of employees at work place
• Monitoring of emails (including personal emails) of the employees through
the office server system
• Tapping of phone calls of employees during office hours
• Credit check on employees
• Seeking personal information of employees
•In USA, invasion of privacy is considered to be a major infringement
of individual rights.
•In India, the MNCs and industries with western ties like BPOs, KPOs
and Software companies are the major users of softwares to monitors
the employees.
•The popular softwares like “spector soft” and “VPI empower suite”
are available in the market which are specially designed to monitor the
desktops and phone calls of employees in the organisation.
On the other side of the coin, employers justify the surveillance or monitoring by
stating the following reasons:
• Monitoring employees helps identifying genuine and honest employees
• Surveillance improves productivity
• It helps in keeping a check on thefts in the organisation –may it be materialistic or
knowledge data base
• When employees know that they are under observation, they try to act cordial and
amicable to co-workers and conflicts are reduced
• Cuts out the misuse of internet facilities & Cuts our computer slack time
• Keeps the misuse of company resources
• we cannot say altogether that monitoring the employees is wrong.
• As in the present scenario, where technology rules and day- by- day new
softwares are invented to do millions of things from your desk top, the
concern over the sustainability and reputation of the organisation becomes
vital.
• The employees, particularly those who have negative thoughts about the
organisation, may misuse the organisations possessions or name to damage
them. For instance, let us imagine a scenario.
• An employee who is in cash transactions of a financial company may use the
company email id to create a rumour about funds manipulation in the
company.
• There may be investigations later, may be the culprit gets punishment, but
the damage done will be irrevocable. Once the goodwill and the reputation
of the financial company gone, it’s gone forever.
• If there is a surveillance system to monitor the emails, this problem would
have been stopped before happening.
• Apart from the data base security concerns, the work time wastedin
internet surfing is also a major issue in work place monitoring.
• An article from IIM, Bangalore mentions that approximately 8 lakh
rupees is calculated to be wasted on cyber slack time by a software
engineer in India.

More Related Content

Similar to performance management- work place stress.pptx

Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
Bhanja Kishor Samudra
 
Risk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docxRisk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docx
SUBHI7
 
Case Study
Case StudyCase Study
Case Study
laze
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Vijay Dalmia
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
gemaherd
 
Group assignment 2
Group assignment 2Group assignment 2
Group assignment 2
Farah Azudin
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
ambersalomon88660
 

Similar to performance management- work place stress.pptx (20)

Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!Iconuk 2016 - IBM Connections adoption Worst practices!
Iconuk 2016 - IBM Connections adoption Worst practices!
 
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesProtecting Corporate Data When an Employee Leaves: Survey and Best Practices
Protecting Corporate Data When an Employee Leaves: Survey and Best Practices
 
EthoSay
EthoSayEthoSay
EthoSay
 
Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
 
code of conduct
code of conductcode of conduct
code of conduct
 
Risk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docxRisk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docx
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Case Study
Case StudyCase Study
Case Study
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
Executive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdfExecutive Directors Chat:It's easy to stay safe online.pdf
Executive Directors Chat:It's easy to stay safe online.pdf
 
TACOM 2014: Back To Basics
TACOM 2014: Back To BasicsTACOM 2014: Back To Basics
TACOM 2014: Back To Basics
 
Five moral dimensions of information systems pdf
Five moral dimensions of information systems pdfFive moral dimensions of information systems pdf
Five moral dimensions of information systems pdf
 
NameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docxNameIn this assignment, you must answer the Answer Implying .docx
NameIn this assignment, you must answer the Answer Implying .docx
 
Any of these folks work with you?
Any of these folks work with you?Any of these folks work with you?
Any of these folks work with you?
 
Group assignment 2
Group assignment 2Group assignment 2
Group assignment 2
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
Digital Forensics Company
Digital Forensics CompanyDigital Forensics Company
Digital Forensics Company
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 

More from Anitha Ishu

Meaning of Management .pptx
Meaning of Management              .pptxMeaning of Management              .pptx
Meaning of Management .pptx
Anitha Ishu
 
Nature of Management in Principle of Management.pptx
Nature of Management in Principle of Management.pptxNature of Management in Principle of Management.pptx
Nature of Management in Principle of Management.pptx
Anitha Ishu
 
III.Performance Management system 3.pptx
III.Performance Management system 3.pptxIII.Performance Management system 3.pptx
III.Performance Management system 3.pptx
Anitha Ishu
 
III. concepts Performance managements.pptx
III. concepts Performance managements.pptxIII. concepts Performance managements.pptx
III. concepts Performance managements.pptx
Anitha Ishu
 
chapter :Market-Entry-and-Exit-Decisions.pptx
chapter :Market-Entry-and-Exit-Decisions.pptxchapter :Market-Entry-and-Exit-Decisions.pptx
chapter :Market-Entry-and-Exit-Decisions.pptx
Anitha Ishu
 

More from Anitha Ishu (14)

Perception-and-Learning-in-Organizational-Behavior.pptx
Perception-and-Learning-in-Organizational-Behavior.pptxPerception-and-Learning-in-Organizational-Behavior.pptx
Perception-and-Learning-in-Organizational-Behavior.pptx
 
Socila Responsibility of Business .pptx
Socila Responsibility of Business  .pptxSocila Responsibility of Business  .pptx
Socila Responsibility of Business .pptx
 
Social Responsibility of Business .pptx
Social Responsibility of Business  .pptxSocial Responsibility of Business  .pptx
Social Responsibility of Business .pptx
 
Meaning of Management .pptx
Meaning of Management              .pptxMeaning of Management              .pptx
Meaning of Management .pptx
 
Nature of Management in Principle of Management.pptx
Nature of Management in Principle of Management.pptxNature of Management in Principle of Management.pptx
Nature of Management in Principle of Management.pptx
 
performance management 5S Conceptual Framework.pptx
performance management 5S Conceptual Framework.pptxperformance management 5S Conceptual Framework.pptx
performance management 5S Conceptual Framework.pptx
 
stress in performance management II.pptx
stress in performance management II.pptxstress in performance management II.pptx
stress in performance management II.pptx
 
PERFORMANCE MANAGEMENT -TYPES OF TEAM.pptx
PERFORMANCE MANAGEMENT -TYPES OF TEAM.pptxPERFORMANCE MANAGEMENT -TYPES OF TEAM.pptx
PERFORMANCE MANAGEMENT -TYPES OF TEAM.pptx
 
performance appraisal - competency mapping.pptx
performance appraisal - competency mapping.pptxperformance appraisal - competency mapping.pptx
performance appraisal - competency mapping.pptx
 
performance management -Work place hormony.pptx
performance management -Work place hormony.pptxperformance management -Work place hormony.pptx
performance management -Work place hormony.pptx
 
III.Performance Management system 3.pptx
III.Performance Management system 3.pptxIII.Performance Management system 3.pptx
III.Performance Management system 3.pptx
 
III. concepts Performance managements.pptx
III. concepts Performance managements.pptxIII. concepts Performance managements.pptx
III. concepts Performance managements.pptx
 
topic: Performance management MBA,BBA.pptx
topic: Performance management MBA,BBA.pptxtopic: Performance management MBA,BBA.pptx
topic: Performance management MBA,BBA.pptx
 
chapter :Market-Entry-and-Exit-Decisions.pptx
chapter :Market-Entry-and-Exit-Decisions.pptxchapter :Market-Entry-and-Exit-Decisions.pptx
chapter :Market-Entry-and-Exit-Decisions.pptx
 

Recently uploaded

會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Recently uploaded (20)

male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Improved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio AppImproved Approval Flow in Odoo 17 Studio App
Improved Approval Flow in Odoo 17 Studio App
 
How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17How To Create Editable Tree View in Odoo 17
How To Create Editable Tree View in Odoo 17
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
ANTI PARKISON DRUGS.pptx
ANTI         PARKISON          DRUGS.pptxANTI         PARKISON          DRUGS.pptx
ANTI PARKISON DRUGS.pptx
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 

performance management- work place stress.pptx

  • 1. Work Place Privacy • Work place Privacy can be defined as “Freedom for employees from unauthorized intrusion from the employers’ or the general right of the Individual to be let alone”. • Privacy at home or at our place is of course different from the one at our work place. • Work place is common to many other people and obviously owned and controlled by other people. But still, there is a level of privacy the employees has to maintain, in order to perform their job in an effective manner.
  • 2. The major issues of work place privacy and its violations are as follows: • Electronic surveillance and Video Monitoring of employees at work place • Monitoring of emails (including personal emails) of the employees through the office server system • Tapping of phone calls of employees during office hours • Credit check on employees • Seeking personal information of employees
  • 3. •In USA, invasion of privacy is considered to be a major infringement of individual rights. •In India, the MNCs and industries with western ties like BPOs, KPOs and Software companies are the major users of softwares to monitors the employees. •The popular softwares like “spector soft” and “VPI empower suite” are available in the market which are specially designed to monitor the desktops and phone calls of employees in the organisation.
  • 4. On the other side of the coin, employers justify the surveillance or monitoring by stating the following reasons: • Monitoring employees helps identifying genuine and honest employees • Surveillance improves productivity • It helps in keeping a check on thefts in the organisation –may it be materialistic or knowledge data base • When employees know that they are under observation, they try to act cordial and amicable to co-workers and conflicts are reduced • Cuts out the misuse of internet facilities & Cuts our computer slack time • Keeps the misuse of company resources
  • 5. • we cannot say altogether that monitoring the employees is wrong. • As in the present scenario, where technology rules and day- by- day new softwares are invented to do millions of things from your desk top, the concern over the sustainability and reputation of the organisation becomes vital. • The employees, particularly those who have negative thoughts about the organisation, may misuse the organisations possessions or name to damage them. For instance, let us imagine a scenario.
  • 6. • An employee who is in cash transactions of a financial company may use the company email id to create a rumour about funds manipulation in the company. • There may be investigations later, may be the culprit gets punishment, but the damage done will be irrevocable. Once the goodwill and the reputation of the financial company gone, it’s gone forever. • If there is a surveillance system to monitor the emails, this problem would have been stopped before happening.
  • 7. • Apart from the data base security concerns, the work time wastedin internet surfing is also a major issue in work place monitoring. • An article from IIM, Bangalore mentions that approximately 8 lakh rupees is calculated to be wasted on cyber slack time by a software engineer in India.