SlideShare a Scribd company logo
You Are Being Watched

          Surveillance at
            workplace
General principles for surveillance
 policies

1. Openness
2. Consent
3. Consultation
4. Private spaces
5. Proportionality
Types of surveillance

  Overt surveillance

  Covert Surveillance
Methods of Surveillance

Telephone surveillance


 Telephone tapping



 Video facility



 To collect location data
Biometric surveillance


Technologies that measure and analyze human
  physical and/or behavioral characteristics for
  authentication, identification, or screening purposes.
 physical characteristics -fingerprints, DNA
 behavioral characteristics - a person's manner of
  walking or voice
Corporate surveillance

Monitoring of activities within a business or within the
        industry associated with that business.
  Monitoring of a person or group's behavior by a
                       corporation
Methods of Surveillance

 Internet Surveillance


        This surveillance monitor the employee internet
 activities. For this most of companies use spy ware
 & cookies.
 Video Surveillance


 Through this surveillance monitor the employee
  workplace activities.
In here video cameras connecting
With recording device use. There are
Many uses of these surveillance.
 Computer Surveillance


             This surveillance monitor the data and e
 maila through a softwares such as the FBI's Magic
 Lantern and CIPAV.
There are uses of this surveillance such as,
 Preventing excessive personal use of
 computers, Protecting security of computer
 system from external threats,Blocking Spam e-
 mails.
The way in which Workplace Surveillance is
regulated.

 Sri Lankan Situation.


 Regulations in other countries.
   ‘Workplace video surveillance Act’ 1998
    in New South Wales.
   ‘Workplace Privacy Act’ 2011 in
    Australia.

 Regulatory requirements.
 Covert Surveillance.
   Reasonable suspicion.
   Unlawful Activity.
   Should exclude the areas where there is a heightened
   expectation of privacy (rest rooms, wash rooms, bed
   rooms etc.)


 Violation of the rules in the act by an employer is a
 ‘Criminal Offence’
 Tracking employees inside the workplace.
   Access cards.
   Optical surveillance devices.
   Internet, email tracking.
   Telephone tracking.


 Tracking employees outside the workplace.
   Vehicle tracking (GPS).
   Mobile phone tracking.
Advantages of workplace
    surveillance
 Increase productivity
 Ensure workplace safety and security
 Ensure implementing smoothly
 Reducing exposure to liability risk
 control the cost.
 Eliminate leaking of confidential
Disadvantages of workplace
surveillance

 Distrust and resentment.

 High cost
 Difficult to protect Employee privacy
Where we use surveillance at
workplace


Practical examples from
Examples from Logiwiz
 Telephone calls Monitoring




 E-Mail Monitoring




 CCTV Monitoring
Examples from Logiwiz - Cont
 Web Browsing Limitations



 Location Monitoring



 Monthly Night work Roster
Practical Issues of surveillance
 Mass surveillance limited personal, social, political
  freedoms.
 surveillance create in everyone a feeling of always
  being watched
 Civil rights groups and privacy groups oppose
  surveillance as a violation of people's right to
  privacy.
How HR Manager can intervene in surveillance


                   Reduce
                   conflicts



        Create                 Develop a
                      HR
       awarenes     Manager    Surveillan
          s                    ce Policy


                   Create a
                  protective
                  atmospher
                      e
Thank You

More Related Content

What's hot

Sexual Harassment in the Workplace
Sexual Harassment in the WorkplaceSexual Harassment in the Workplace
Sexual Harassment in the Workplace
Idan Almog
 
Sexual Harassment PowerPoint PPT Content Modern Sample
Sexual Harassment PowerPoint PPT Content Modern SampleSexual Harassment PowerPoint PPT Content Modern Sample
Sexual Harassment PowerPoint PPT Content Modern Sample
Andrew Schwartz
 
Sexual Harassment at workplace
Sexual Harassment at workplaceSexual Harassment at workplace
Sexual Harassment at workplaceShahzad Khan
 
Sexual harassment awareness session
Sexual harassment awareness sessionSexual harassment awareness session
Sexual harassment awareness session
NTPC Limited
 
POSH TRAINING FOR IC MEMBERS
POSH TRAINING FOR IC MEMBERSPOSH TRAINING FOR IC MEMBERS
POSH TRAINING FOR IC MEMBERS
Neha Shrimali
 
Workplace harrasment
Workplace harrasmentWorkplace harrasment
Workplace harrasment
complianceonline123
 
Effectively Protecting Confidential Infomation
Effectively Protecting Confidential InfomationEffectively Protecting Confidential Infomation
Effectively Protecting Confidential Infomation
blewisbell
 
Sexual harassment at workplace (Prevention, Prohibition and Redressal) Act 2...
Sexual harassment at workplace (Prevention, Prohibition and Redressal)  Act 2...Sexual harassment at workplace (Prevention, Prohibition and Redressal)  Act 2...
Sexual harassment at workplace (Prevention, Prohibition and Redressal) Act 2...
Gaurav Kamboj
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacy
G&A Partners
 
Tips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the WorkplaceTips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the Workplace
Case IQ
 
Bullying in the workplace
Bullying in the workplaceBullying in the workplace
Bullying in the workplaceriskmgmnt
 
Bullying at work place
Bullying at work placeBullying at work place
Bullying at work place
Naresh Kumar
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
sidra batool
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
Qualsys Ltd
 
Human trafficking awareness
Human trafficking awarenessHuman trafficking awareness
Human trafficking awareness
Linh Tang
 
Sexual Harassment in the Workplace
Sexual Harassment in the WorkplaceSexual Harassment in the Workplace
Sexual Harassment in the Workplace
HR 360, Inc.
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
AT Internet
 
Harassment Powerpoint
Harassment PowerpointHarassment Powerpoint
Harassment PowerpointJo Woolery
 
IT Policy
IT PolicyIT Policy
IT Policy
Sherri Booher
 

What's hot (20)

Sexual Harassment in the Workplace
Sexual Harassment in the WorkplaceSexual Harassment in the Workplace
Sexual Harassment in the Workplace
 
Sexual Harassment PowerPoint PPT Content Modern Sample
Sexual Harassment PowerPoint PPT Content Modern SampleSexual Harassment PowerPoint PPT Content Modern Sample
Sexual Harassment PowerPoint PPT Content Modern Sample
 
Sexual Harassment at workplace
Sexual Harassment at workplaceSexual Harassment at workplace
Sexual Harassment at workplace
 
Sexual harassment awareness session
Sexual harassment awareness sessionSexual harassment awareness session
Sexual harassment awareness session
 
POSH TRAINING FOR IC MEMBERS
POSH TRAINING FOR IC MEMBERSPOSH TRAINING FOR IC MEMBERS
POSH TRAINING FOR IC MEMBERS
 
Workplace harrasment
Workplace harrasmentWorkplace harrasment
Workplace harrasment
 
Effectively Protecting Confidential Infomation
Effectively Protecting Confidential InfomationEffectively Protecting Confidential Infomation
Effectively Protecting Confidential Infomation
 
Sexual harassment at workplace (Prevention, Prohibition and Redressal) Act 2...
Sexual harassment at workplace (Prevention, Prohibition and Redressal)  Act 2...Sexual harassment at workplace (Prevention, Prohibition and Redressal)  Act 2...
Sexual harassment at workplace (Prevention, Prohibition and Redressal) Act 2...
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacy
 
Tips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the WorkplaceTips for Preventing and Detecting Employee Theft in the Workplace
Tips for Preventing and Detecting Employee Theft in the Workplace
 
Bullying in the workplace
Bullying in the workplaceBullying in the workplace
Bullying in the workplace
 
Bullying at work place
Bullying at work placeBullying at work place
Bullying at work place
 
Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
Human trafficking awareness
Human trafficking awarenessHuman trafficking awareness
Human trafficking awareness
 
Human trafficking
Human traffickingHuman trafficking
Human trafficking
 
Sexual Harassment in the Workplace
Sexual Harassment in the WorkplaceSexual Harassment in the Workplace
Sexual Harassment in the Workplace
 
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethicsData Privacy: What you need to know about privacy, from compliance to ethics
Data Privacy: What you need to know about privacy, from compliance to ethics
 
Harassment Powerpoint
Harassment PowerpointHarassment Powerpoint
Harassment Powerpoint
 
IT Policy
IT PolicyIT Policy
IT Policy
 

Similar to Workplace Surveillance

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
Enov8
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
PECB
 
A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...
A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...
A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...
rajsriinfotek1
 
Whistleblower presentation
Whistleblower presentationWhistleblower presentation
Whistleblower presentationMustapha Mugisa
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
G Prachi
 
UK Legal Framework (2003)
UK Legal Framework (2003)UK Legal Framework (2003)
UK Legal Framework (2003)
Phil Huggins FBCS CITP
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
CommLab India – Rapid eLearning Solutions
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
Md. Sajjat Hossain
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
ambersalomon88660
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
cyberprosocial
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
503SaranyaS
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
mapletronics
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
Alberto Canadè
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
infosec train
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
asundaram1
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
Forcepoint LLC
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
musicalworld14
 

Similar to Workplace Surveillance (20)

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...
A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...
A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...
 
Whistleblower presentation
Whistleblower presentationWhistleblower presentation
Whistleblower presentation
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
UK Legal Framework (2003)
UK Legal Framework (2003)UK Legal Framework (2003)
UK Legal Framework (2003)
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 

More from Sampath

Professional Judgment and expertise in Auditing
Professional Judgment and expertise in AuditingProfessional Judgment and expertise in Auditing
Professional Judgment and expertise in Auditing
Sampath
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace SurveilanceSampath
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace SurveilanceSampath
 
TQM in HR
TQM in HRTQM in HR
TQM in HRSampath
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information SystemsSampath
 
Conflict management
Conflict managementConflict management
Conflict managementSampath
 
Hr audit
Hr auditHr audit
Hr auditSampath
 
Hr audit
Hr auditHr audit
Hr auditSampath
 
Human Resource Development.
Human Resource Development.Human Resource Development.
Human Resource Development.
Sampath
 
Presentation team mgt
Presentation team mgtPresentation team mgt
Presentation team mgtSampath
 
Strategic+management+3
Strategic+management+3Strategic+management+3
Strategic+management+3Sampath
 
Strategic+management+2
Strategic+management+2Strategic+management+2
Strategic+management+2Sampath
 
Strategic strategic capabilitiies 2003
Strategic strategic capabilitiies 2003Strategic strategic capabilitiies 2003
Strategic strategic capabilitiies 2003Sampath
 
Strategic management 12
Strategic management 12Strategic management 12
Strategic management 12Sampath
 
Strategic management 8
Strategic management 8Strategic management 8
Strategic management 8Sampath
 
Led session4 presentation
Led session4 presentationLed session4 presentation
Led session4 presentationSampath
 
Ethics+lesson+2
Ethics+lesson+2Ethics+lesson+2
Ethics+lesson+2Sampath
 
Ethics lesson 4
Ethics lesson 4Ethics lesson 4
Ethics lesson 4Sampath
 
Ethics & stakeholders
Ethics & stakeholdersEthics & stakeholders
Ethics & stakeholdersSampath
 
Diversity management
Diversity managementDiversity management
Diversity managementSampath
 

More from Sampath (20)

Professional Judgment and expertise in Auditing
Professional Judgment and expertise in AuditingProfessional Judgment and expertise in Auditing
Professional Judgment and expertise in Auditing
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
 
TQM in HR
TQM in HRTQM in HR
TQM in HR
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
 
Conflict management
Conflict managementConflict management
Conflict management
 
Hr audit
Hr auditHr audit
Hr audit
 
Hr audit
Hr auditHr audit
Hr audit
 
Human Resource Development.
Human Resource Development.Human Resource Development.
Human Resource Development.
 
Presentation team mgt
Presentation team mgtPresentation team mgt
Presentation team mgt
 
Strategic+management+3
Strategic+management+3Strategic+management+3
Strategic+management+3
 
Strategic+management+2
Strategic+management+2Strategic+management+2
Strategic+management+2
 
Strategic strategic capabilitiies 2003
Strategic strategic capabilitiies 2003Strategic strategic capabilitiies 2003
Strategic strategic capabilitiies 2003
 
Strategic management 12
Strategic management 12Strategic management 12
Strategic management 12
 
Strategic management 8
Strategic management 8Strategic management 8
Strategic management 8
 
Led session4 presentation
Led session4 presentationLed session4 presentation
Led session4 presentation
 
Ethics+lesson+2
Ethics+lesson+2Ethics+lesson+2
Ethics+lesson+2
 
Ethics lesson 4
Ethics lesson 4Ethics lesson 4
Ethics lesson 4
 
Ethics & stakeholders
Ethics & stakeholdersEthics & stakeholders
Ethics & stakeholders
 
Diversity management
Diversity managementDiversity management
Diversity management
 

Recently uploaded

Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
ShivajiThube2
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 

Recently uploaded (20)

Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
JEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questionsJEE1_This_section_contains_FOUR_ questions
JEE1_This_section_contains_FOUR_ questions
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 

Workplace Surveillance

  • 1. You Are Being Watched Surveillance at workplace
  • 2. General principles for surveillance policies 1. Openness 2. Consent 3. Consultation 4. Private spaces 5. Proportionality
  • 3. Types of surveillance  Overt surveillance  Covert Surveillance
  • 4. Methods of Surveillance Telephone surveillance  Telephone tapping  Video facility  To collect location data
  • 5. Biometric surveillance Technologies that measure and analyze human physical and/or behavioral characteristics for authentication, identification, or screening purposes.  physical characteristics -fingerprints, DNA  behavioral characteristics - a person's manner of walking or voice
  • 6. Corporate surveillance Monitoring of activities within a business or within the industry associated with that business. Monitoring of a person or group's behavior by a corporation
  • 7. Methods of Surveillance  Internet Surveillance This surveillance monitor the employee internet activities. For this most of companies use spy ware & cookies.
  • 8.  Video Surveillance Through this surveillance monitor the employee workplace activities. In here video cameras connecting With recording device use. There are Many uses of these surveillance.
  • 9.  Computer Surveillance This surveillance monitor the data and e maila through a softwares such as the FBI's Magic Lantern and CIPAV. There are uses of this surveillance such as, Preventing excessive personal use of computers, Protecting security of computer system from external threats,Blocking Spam e- mails.
  • 10. The way in which Workplace Surveillance is regulated.  Sri Lankan Situation.  Regulations in other countries.  ‘Workplace video surveillance Act’ 1998 in New South Wales.  ‘Workplace Privacy Act’ 2011 in Australia.  Regulatory requirements.
  • 11.  Covert Surveillance.  Reasonable suspicion.  Unlawful Activity.  Should exclude the areas where there is a heightened expectation of privacy (rest rooms, wash rooms, bed rooms etc.)  Violation of the rules in the act by an employer is a ‘Criminal Offence’
  • 12.  Tracking employees inside the workplace.  Access cards.  Optical surveillance devices.  Internet, email tracking.  Telephone tracking.  Tracking employees outside the workplace.  Vehicle tracking (GPS).  Mobile phone tracking.
  • 13. Advantages of workplace surveillance  Increase productivity  Ensure workplace safety and security  Ensure implementing smoothly  Reducing exposure to liability risk  control the cost.  Eliminate leaking of confidential
  • 14. Disadvantages of workplace surveillance  Distrust and resentment.  High cost  Difficult to protect Employee privacy
  • 15. Where we use surveillance at workplace Practical examples from
  • 16. Examples from Logiwiz  Telephone calls Monitoring  E-Mail Monitoring  CCTV Monitoring
  • 17. Examples from Logiwiz - Cont  Web Browsing Limitations  Location Monitoring  Monthly Night work Roster
  • 18. Practical Issues of surveillance  Mass surveillance limited personal, social, political freedoms.  surveillance create in everyone a feeling of always being watched  Civil rights groups and privacy groups oppose surveillance as a violation of people's right to privacy.
  • 19. How HR Manager can intervene in surveillance Reduce conflicts Create Develop a HR awarenes Manager Surveillan s ce Policy Create a protective atmospher e