SlideShare ist ein Scribd-Unternehmen logo
1 von 14
Effective Employee Monitoring
Mike Gillespie – MD Advent IM Ltd
Agenda

• Thinking about monitoring employees?
• Monitoring or Snooping?
• Monitoring, The Data Protection Act (1998) and the ICO
• Managing resulting data
• CIA
• Summary and Questions




                holistic security
Thinking of monitoring employees?




          Data Protection




       holistic security
Monitoring or Snooping?




•Clear, achievable and targeted            •Blanket employee coverage - not
objective                                  issue led
•Employees aware, educated and             •Covert – employees unaware
accepting                                  •No policy or no education in place
•Clear compliance with DPA for             •Lack of DPA compliance
resultant data..we’ll come onto this
later.
                              holistic security
Monitoring, DPA and the ICO

• Why you are monitoring
•What the process is
•What you are monitoring –
systems, applications, hardware etc
•When you will be monitoring
•Who will be responsible for monitoring
•Who will have access to the data generated
by the monitoring
•How that resulting data will be
held, managed and eventually destroyed
 Without consistent and effective rules and policies, culture
will take over until policy becomes whatever culture dictates.
                      holistic security
Managing resulting data creation




           IT
          Dept



     holistic security
CIA (not what you think...)




                confidentiality
Availability



               integrity




     holistic security
CIA (not what you think...)

                  Assurance that information is shared only among authorised persons
                  or organisations. Breaches of Confidentiality can occur when data is
                  not handled in a manner adequate to safeguard the confidentiality of
confidentiality   the information concerned. Such disclosure can take place by word of
                  mouth, by printing, copying, e-mailing or creating documents and
                  other data etc. The classification of the information should determine
                  is confidentiality and hence the appropriate safeguards.




                   holistic security
CIA (not what you think...)




            Assurance that the information is authentic and complete. Ensuring
            that information can be relied upon to be sufficiently accurate for its
            purpose. The term Integrity is used frequently when considering
            Information Security as it is represents one of the primary indicators
integrity   of security (or lack of it). The integrity of data is not only whether the
            data is 'correct', but whether it can be trusted and relied upon. For
            example, making copies (say by e-mailing a file) of a sensitive
            document, threatens both confidentiality and the integrity of the
            information. Why? Because, by making one or more copies, the data
            is then at risk of change or modification.




               holistic security
CIA (not what you think...)




availability   Assurance that the systems responsible for delivering, storing and
               processing information are accessible when needed, by those who
               need them.


                  holistic security
Managing resulting data creation




           HR
          Dept



     holistic security
Information Commissioners Office
                                    Guidance




Section 5 of the ‘Quick guide to the
employment practices code’ covers employee monitoring and can be accessed
from the ‘For Organisations’ section of the ICO website www.ico.gov.uk

                          holistic security
Summary


•   Use the ICO Guidance
•   Have firm, clear objectives and targets
•   Be open and consistent
•   Ensure resultant data is managed in line
    with the Data Protection Act (1998)




                holistic security
Questions




holistic security

Weitere ähnliche Inhalte

Was ist angesagt?

Information security group presentation ppt
Information security group presentation   pptInformation security group presentation   ppt
Information security group presentation pptvaishalshah01
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Keep It Secret, Keep It Safe: Security and Privacy in 21st Century Health IT
Keep It Secret, Keep It Safe: Security and Privacy in 21st Century Health IT Keep It Secret, Keep It Safe: Security and Privacy in 21st Century Health IT
Keep It Secret, Keep It Safe: Security and Privacy in 21st Century Health IT Health Informatics New Zealand
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issuesHaseeb Ahmed Awan
 
Infromation Assurance
Infromation AssuranceInfromation Assurance
Infromation AssuranceAkshay Pal
 
Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)brentcarey
 
Cia security model
Cia security modelCia security model
Cia security modelImran Ahmed
 
It8073 information security syllabus
It8073  information security syllabusIt8073  information security syllabus
It8073 information security syllabusssuserb2f734
 
IT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighIT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighChristina McVeigh
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarConcept Searching, Inc
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...acemindia
 
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and RiskAIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and RiskCarl Frappaolo
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT IssueEvan Francen
 
CYBERSECURITY.pdf
CYBERSECURITY.pdfCYBERSECURITY.pdf
CYBERSECURITY.pdfSprintzeal
 
Information security
Information securityInformation security
Information securityakku12342006
 

Was ist angesagt? (20)

CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015CHIME Lead Forum - Seattle 2015
CHIME Lead Forum - Seattle 2015
 
Information security group presentation ppt
Information security group presentation   pptInformation security group presentation   ppt
Information security group presentation ppt
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Keep It Secret, Keep It Safe: Security and Privacy in 21st Century Health IT
Keep It Secret, Keep It Safe: Security and Privacy in 21st Century Health IT Keep It Secret, Keep It Safe: Security and Privacy in 21st Century Health IT
Keep It Secret, Keep It Safe: Security and Privacy in 21st Century Health IT
 
Information security and other issues
Information security and other issuesInformation security and other issues
Information security and other issues
 
Infromation Assurance
Infromation AssuranceInfromation Assurance
Infromation Assurance
 
Data security training
Data security trainingData security training
Data security training
 
Privacy icms (handouts)
Privacy icms (handouts)Privacy icms (handouts)
Privacy icms (handouts)
 
Cia security model
Cia security modelCia security model
Cia security model
 
It8073 information security syllabus
It8073  information security syllabusIt8073  information security syllabus
It8073 information security syllabus
 
IT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeighIT_Security_Profile_Christina_McVeigh
IT_Security_Profile_Christina_McVeigh
 
How To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 WebinarHow To Eliminate Security Exposures in Office 365 Webinar
How To Eliminate Security Exposures in Office 365 Webinar
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
 
Is ch1 (2)
Is ch1 (2)Is ch1 (2)
Is ch1 (2)
 
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and RiskAIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
 
Ch01
Ch01Ch01
Ch01
 
Information Security is NOT an IT Issue
Information Security is NOT an IT IssueInformation Security is NOT an IT Issue
Information Security is NOT an IT Issue
 
Computer security
Computer securityComputer security
Computer security
 
CYBERSECURITY.pdf
CYBERSECURITY.pdfCYBERSECURITY.pdf
CYBERSECURITY.pdf
 
Information security
Information securityInformation security
Information security
 

Andere mochten auch

Drupal 7 Entity & Entity API
Drupal 7 Entity & Entity APIDrupal 7 Entity & Entity API
Drupal 7 Entity & Entity API均民 戴
 
植基於個人本體論的新聞推薦系統
植基於個人本體論的新聞推薦系統植基於個人本體論的新聞推薦系統
植基於個人本體論的新聞推薦系統均民 戴
 
Bootstrap個人網站 20141027
Bootstrap個人網站 20141027Bootstrap個人網站 20141027
Bootstrap個人網站 20141027均民 戴
 
SMEs, Security and How Its a Growing Threat
SMEs, Security and How Its a Growing ThreatSMEs, Security and How Its a Growing Threat
SMEs, Security and How Its a Growing ThreatAdvent IM Ltd
 
Social Engineering, Insider and Cyber Threat
Social Engineering, Insider and Cyber Threat Social Engineering, Insider and Cyber Threat
Social Engineering, Insider and Cyber Threat Advent IM Ltd
 
20130706閃電秀
20130706閃電秀20130706閃電秀
20130706閃電秀均民 戴
 
The Cyber Threat to the Built Estate
The Cyber Threat to the Built Estate The Cyber Threat to the Built Estate
The Cyber Threat to the Built Estate Advent IM Ltd
 
Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Advent IM Ltd
 
The Human Threat in Data protection
The Human Threat in Data protection The Human Threat in Data protection
The Human Threat in Data protection Advent IM Ltd
 
Kodemint Technologies Pvt Ltd
Kodemint Technologies Pvt LtdKodemint Technologies Pvt Ltd
Kodemint Technologies Pvt LtdSamsheer Moosa
 
Data Breach and Hacking
Data Breach and HackingData Breach and Hacking
Data Breach and HackingAdvent IM Ltd
 
興大資訊社 CPE 訓練宣傳
興大資訊社 CPE 訓練宣傳興大資訊社 CPE 訓練宣傳
興大資訊社 CPE 訓練宣傳均民 戴
 
Drupalize your data use entities
Drupalize your data use entitiesDrupalize your data use entities
Drupalize your data use entities均民 戴
 
寫程式?那些老師沒教的事
寫程式?那些老師沒教的事寫程式?那些老師沒教的事
寫程式?那些老師沒教的事均民 戴
 

Andere mochten auch (17)

Drupal 7 Entity & Entity API
Drupal 7 Entity & Entity APIDrupal 7 Entity & Entity API
Drupal 7 Entity & Entity API
 
Kodemint brochure
Kodemint brochureKodemint brochure
Kodemint brochure
 
植基於個人本體論的新聞推薦系統
植基於個人本體論的新聞推薦系統植基於個人本體論的新聞推薦系統
植基於個人本體論的新聞推薦系統
 
Bootstrap個人網站 20141027
Bootstrap個人網站 20141027Bootstrap個人網站 20141027
Bootstrap個人網站 20141027
 
SMEs, Security and How Its a Growing Threat
SMEs, Security and How Its a Growing ThreatSMEs, Security and How Its a Growing Threat
SMEs, Security and How Its a Growing Threat
 
Social Engineering, Insider and Cyber Threat
Social Engineering, Insider and Cyber Threat Social Engineering, Insider and Cyber Threat
Social Engineering, Insider and Cyber Threat
 
20130706閃電秀
20130706閃電秀20130706閃電秀
20130706閃電秀
 
Castanyada 2012
Castanyada  2012Castanyada  2012
Castanyada 2012
 
The IT Cyber Battle
The IT Cyber BattleThe IT Cyber Battle
The IT Cyber Battle
 
The Cyber Threat to the Built Estate
The Cyber Threat to the Built Estate The Cyber Threat to the Built Estate
The Cyber Threat to the Built Estate
 
Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012Ernst & Young visuals security survey 2012
Ernst & Young visuals security survey 2012
 
The Human Threat in Data protection
The Human Threat in Data protection The Human Threat in Data protection
The Human Threat in Data protection
 
Kodemint Technologies Pvt Ltd
Kodemint Technologies Pvt LtdKodemint Technologies Pvt Ltd
Kodemint Technologies Pvt Ltd
 
Data Breach and Hacking
Data Breach and HackingData Breach and Hacking
Data Breach and Hacking
 
興大資訊社 CPE 訓練宣傳
興大資訊社 CPE 訓練宣傳興大資訊社 CPE 訓練宣傳
興大資訊社 CPE 訓練宣傳
 
Drupalize your data use entities
Drupalize your data use entitiesDrupalize your data use entities
Drupalize your data use entities
 
寫程式?那些老師沒教的事
寫程式?那些老師沒教的事寫程式?那些老師沒教的事
寫程式?那些老師沒教的事
 

Ähnlich wie Waldrons march 2013 v1.0

Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
Information Security
Information Security Information Security
Information Security Alok Katiyar
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a SciencePankaj Rane
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & ManufacturingEvan Francen
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docxPrernaThakwani
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security PolicyRobot Mode
 
Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentationfranbodh
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to securityMukesh Chinta
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introductionyuliana_mar
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze DataExchangeAgency
 
Information security
Information securityInformation security
Information securitySanjay Tiwari
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptxrabeetkashif
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptshahadd2021
 
2020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 22020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 2FRSecure
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfJenna Murray
 

Ähnlich wie Waldrons march 2013 v1.0 (20)

internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Information Security
Information Security Information Security
Information Security
 
DR PANKAJ SIR (1).pptx
DR PANKAJ SIR (1).pptxDR PANKAJ SIR (1).pptx
DR PANKAJ SIR (1).pptx
 
Information Security : Is it an Art or a Science
Information Security : Is it an Art or a ScienceInformation Security : Is it an Art or a Science
Information Security : Is it an Art or a Science
 
Information Security - I.T Project Management
Information Security - I.T Project ManagementInformation Security - I.T Project Management
Information Security - I.T Project Management
 
Information Security & Manufacturing
Information Security & ManufacturingInformation Security & Manufacturing
Information Security & Manufacturing
 
Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
The Role of Information Security Policy
The Role of Information Security PolicyThe Role of Information Security Policy
The Role of Information Security Policy
 
Isys20261 lecture 01
Isys20261 lecture 01Isys20261 lecture 01
Isys20261 lecture 01
 
Physician Office Presentation
Physician Office PresentationPhysician Office Presentation
Physician Office Presentation
 
Introduction to security
Introduction to securityIntroduction to security
Introduction to security
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introduction
 
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze FROM STRATEGY TO ACTION - Vasil Tsvimitidze
FROM STRATEGY TO ACTION - Vasil Tsvimitidze
 
Information security
Information securityInformation security
Information security
 
Presentation 1.pptx
Presentation 1.pptxPresentation 1.pptx
Presentation 1.pptx
 
Lecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.pptLecture 01- What is Information Security.ppt
Lecture 01- What is Information Security.ppt
 
2020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 22020 FRSecure CISSP Mentor Program - Class 2
2020 FRSecure CISSP Mentor Program - Class 2
 
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdfCYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
CYBER SECURITY WHAT IS IT AND WHAT YOU NEED TO KNOW.pdf
 

Waldrons march 2013 v1.0

  • 1. Effective Employee Monitoring Mike Gillespie – MD Advent IM Ltd
  • 2. Agenda • Thinking about monitoring employees? • Monitoring or Snooping? • Monitoring, The Data Protection Act (1998) and the ICO • Managing resulting data • CIA • Summary and Questions holistic security
  • 3. Thinking of monitoring employees? Data Protection holistic security
  • 4. Monitoring or Snooping? •Clear, achievable and targeted •Blanket employee coverage - not objective issue led •Employees aware, educated and •Covert – employees unaware accepting •No policy or no education in place •Clear compliance with DPA for •Lack of DPA compliance resultant data..we’ll come onto this later. holistic security
  • 5. Monitoring, DPA and the ICO • Why you are monitoring •What the process is •What you are monitoring – systems, applications, hardware etc •When you will be monitoring •Who will be responsible for monitoring •Who will have access to the data generated by the monitoring •How that resulting data will be held, managed and eventually destroyed Without consistent and effective rules and policies, culture will take over until policy becomes whatever culture dictates. holistic security
  • 6. Managing resulting data creation IT Dept holistic security
  • 7. CIA (not what you think...) confidentiality Availability integrity holistic security
  • 8. CIA (not what you think...) Assurance that information is shared only among authorised persons or organisations. Breaches of Confidentiality can occur when data is not handled in a manner adequate to safeguard the confidentiality of confidentiality the information concerned. Such disclosure can take place by word of mouth, by printing, copying, e-mailing or creating documents and other data etc. The classification of the information should determine is confidentiality and hence the appropriate safeguards. holistic security
  • 9. CIA (not what you think...) Assurance that the information is authentic and complete. Ensuring that information can be relied upon to be sufficiently accurate for its purpose. The term Integrity is used frequently when considering Information Security as it is represents one of the primary indicators integrity of security (or lack of it). The integrity of data is not only whether the data is 'correct', but whether it can be trusted and relied upon. For example, making copies (say by e-mailing a file) of a sensitive document, threatens both confidentiality and the integrity of the information. Why? Because, by making one or more copies, the data is then at risk of change or modification. holistic security
  • 10. CIA (not what you think...) availability Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them. holistic security
  • 11. Managing resulting data creation HR Dept holistic security
  • 12. Information Commissioners Office Guidance Section 5 of the ‘Quick guide to the employment practices code’ covers employee monitoring and can be accessed from the ‘For Organisations’ section of the ICO website www.ico.gov.uk holistic security
  • 13. Summary • Use the ICO Guidance • Have firm, clear objectives and targets • Be open and consistent • Ensure resultant data is managed in line with the Data Protection Act (1998) holistic security

Hinweis der Redaktion

  1. Excessive use of phones for personal useExcessive use of the internet for personal useInappropriate behavioursMisuse of company vehicles some of the reasons that monitoring for corrective or disciplinary purposes, however doing this incorrectly or in a cavalier or ill informed manner is a minefield for an employer and can be far more damaging for an employer than the employee who is being accused.
  2. Employees have a reasonable right to privacy.The ICO is very clear on how monitoring should be approached and it is with a spirit of honesty and openness toward employees.
  3. There are many needs that have to be addressed when considering monitoring and informing and educating employees in order to stay within ICO guidelines on monitoring.If these areas are not addressed Employment Tribunals may well result in a negative outcome for the business and potentially could attract the attention of the ICO which is rarely pleasant.
  4. Who should be collecting the data may not be the same as who should have access to it or be responsible for it.? This example shows IT as the collector, manager and accesser of the data – is that appropriate? (of course it might be)
  5. CIA elements required to make successful Monitoring policy.
  6. So let’s look at our example again...Would it make more sense for the data to be accessed only by HR and pertinentManagement? Employees would also need to know who is accessing this data. IT will be involved in harvesting the data but is it appropriate they have access to it? CIA is the guide to how you should manage this important and sensitive data. Don’t forget sometimes there are emotive issues involving highly controversial or sensitive matters.So the person reviewing any resultant data needs to be in an appropriate setting. For instance if someone habitually surfing on pornographic websites and data is collected on what they are viewing, it is not appropriate for the offensive material to be reviewed in a busy office surrounded by the people who would have been offended by it in the first place! Also they should be aware of correct procedures and for instance as in this example, not make copies of everything that has been viewed as this in itself is also an offence (if it is something like child abuse etc).