SlideShare ist ein Scribd-Unternehmen logo
1 von 8
Surveillance in
the Workplace
Luis Medina and Rick Lizotte
Background


•   Privacy not among Constitutional rights
•   But Fourth Amendment—right against unreasonable search and
    seizure
•   Not much law about privacy until end of the 19 th century
•   Invention of microphone and telephone—new threats to privacy
•   1890—Supreme Court Justice wants right to privacy from wiretapping,
    not only house searches
•   1986—Electronic Communications Privacy Act—allows employer
    right to monitor business but not personal communication
Background
•   Computer networks and
    new camera equipment
    allow better monitoring
    of the workplace
•   Employers can fire for
    any reason not covered
    by law
•   Employers often look for
    misuse of computer,
    stealing, drug use and
    alcohol use, lack of
    productivity
•   More extreme—camera
    in locker
    room/bathroom;
    contract not to smoke or
    drink at home to
    prevent use of medical
    insurance later
Background
The Controversy

• Some people believe
  electronic surveillance is good
  for security, safety, and
  productivity.
• Others believe it is a violation
  of privacy rights and should
  not be used.

•    My opinion—use of electronic
    surveillance good if only used
    to protect employees and not
    to violate privacy.

                                     From the movie 1984
Arguments For
         Workplace Surveillance

1. The use of electronic
   surveillance increases worker
   productivity
2. Helps to prevent accidents at
   work
3. Essential for the protection of
   employees
4. May prevent employee theft
   and harassment by other
   employees
5. May provide a way to make
   work evaluation objective
Arguments Against
     Workplace Surveillance

1.   Employees have the right to privacy in some
     areas of workplace

2.   Surveillance creates a hostile environment
     which makes employees fearful and unhappy

3.   Employers don’t know how to separate the
     public from the private—what is in the
     workplace from what is in the home

4.   Surveillance provides an opportunity for
     sexual harassment by employer or security
     personnel
My Conclusion
•   Electronic surveillance
    may be necessary to
    secure safety and
    productivity

•   However, electronic
    surveillance must never
    violate the employees’
    rights to privacy and
    cause bad feeling in the
    workplace

•   Workers need to be
    notified of surveillance

•   Finally, where does the
    employers right to
    monitor us stop?

Weitere ähnliche Inhalte

Was ist angesagt?

Privacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyPrivacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyRica Young
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018Fizaril Amzari Omar
 
Computer ethics
Computer ethicsComputer ethics
Computer ethicsshashi kiran
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Securitymtvvvv
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyPELUMI APANTAKU
 
INTERNET OF THINGS PPT
INTERNET OF THINGS PPTINTERNET OF THINGS PPT
INTERNET OF THINGS PPTHarsh Kumar
 
Computer ethics
Computer ethics Computer ethics
Computer ethics Aglaia Connect
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computerAbdullah Khosa
 
11 Rules of Technology Success & Social Media 101
11 Rules of Technology Success & Social Media 10111 Rules of Technology Success & Social Media 101
11 Rules of Technology Success & Social Media 101Ramon Ray
 
Cyber crime
Cyber crimeCyber crime
Cyber crimeMukul Kumar
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student workJorge Arturo Ortiz
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
Computer Ethics
Computer EthicsComputer Ethics
Computer EthicsRamki M
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usagetushki92
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodcharvill
 

Was ist angesagt? (20)

Privacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational TechnologyPrivacy, Security and Ethics in Educational Technology
Privacy, Security and Ethics in Educational Technology
 
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
PST SC015 Chapter 4 Comp. Ethics and Security 2017/2018
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
TAMUC LO 7
TAMUC LO 7TAMUC LO 7
TAMUC LO 7
 
Cybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and SocietyCybercrime in Nigeria - Technology and Society
Cybercrime in Nigeria - Technology and Society
 
INTERNET OF THINGS PPT
INTERNET OF THINGS PPTINTERNET OF THINGS PPT
INTERNET OF THINGS PPT
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Etical and professional issues of computer
Etical and professional issues of computerEtical and professional issues of computer
Etical and professional issues of computer
 
11 Rules of Technology Success & Social Media 101
11 Rules of Technology Success & Social Media 10111 Rules of Technology Success & Social Media 101
11 Rules of Technology Success & Social Media 101
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
tejakshaya chowdary
tejakshaya chowdarytejakshaya chowdary
tejakshaya chowdary
 
Safety and security of data student work
Safety and security of data student workSafety and security of data student work
Safety and security of data student work
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Nfwordle
NfwordleNfwordle
Nfwordle
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethics in IT and System Usage
Ethics in IT and System UsageEthics in IT and System Usage
Ethics in IT and System Usage
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics and privacy ppt 3rd period
Ethics and privacy ppt 3rd periodEthics and privacy ppt 3rd period
Ethics and privacy ppt 3rd period
 

Andere mochten auch

VisiĂłn y misiĂłn de la universidad nacional de cajamarca
VisiĂłn y misiĂłn de  la universidad nacional de cajamarcaVisiĂłn y misiĂłn de  la universidad nacional de cajamarca
VisiĂłn y misiĂłn de la universidad nacional de cajamarca996483919
 
Emendas ao pl 4921 relatĂłrio final do policarpo.
Emendas ao pl 4921   relatĂłrio final do policarpo.Emendas ao pl 4921   relatĂłrio final do policarpo.
Emendas ao pl 4921 relatĂłrio final do policarpo.Tenente Poliglota
 
Derechos de autor
Derechos de autorDerechos de autor
Derechos de autorCarla Barahona
 
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995Kevin Caballero Marin
 
2.3. fundamento epistemolĂłgicos da medicna - problemas fundamentais do conh...
2.3. fundamento epistemolĂłgicos da medicna -   problemas fundamentais do conh...2.3. fundamento epistemolĂłgicos da medicna -   problemas fundamentais do conh...
2.3. fundamento epistemolĂłgicos da medicna - problemas fundamentais do conh...Luiz-Salvador Miranda-Sa
 
Artigo: Resolução de problemas associado à comunicação
Artigo: Resolução de problemas associado à comunicaçãoArtigo: Resolução de problemas associado à comunicação
Artigo: Resolução de problemas associado à comunicaçãoMiguel de Carvalho
 
MetodologĂ­a pacie-dokeos
MetodologĂ­a pacie-dokeosMetodologĂ­a pacie-dokeos
MetodologĂ­a pacie-dokeosIsbelia Pelayo
 
Metalurgica fierro s
Metalurgica fierro sMetalurgica fierro s
Metalurgica fierro sFelipe Aliaga
 
Como conciliar gestĂŁo eficiente e respeito Ă  legalidade - Mackenzie
Como conciliar gestĂŁo eficiente e respeito Ă  legalidade - MackenzieComo conciliar gestĂŁo eficiente e respeito Ă  legalidade - Mackenzie
Como conciliar gestĂŁo eficiente e respeito Ă  legalidade - MackenzieAndrĂŠ Laubenstein Pereira
 
MarĂ­a montessori proyecto modulo 2
MarĂ­a montessori proyecto modulo 2MarĂ­a montessori proyecto modulo 2
MarĂ­a montessori proyecto modulo 2Mayer Lozano
 
Trabajo corregido word2
Trabajo corregido word2Trabajo corregido word2
Trabajo corregido word2996483919
 
vestidos de inocencia
vestidos de inocenciavestidos de inocencia
vestidos de inocenciagramadal
 
A concorrência desleal e o crime de falsa alegação de
A concorrência desleal e o crime de falsa alegação deA concorrência desleal e o crime de falsa alegação de
A concorrência desleal e o crime de falsa alegação deVerlaine Costa
 
sexualidad humana
sexualidad humanasexualidad humana
sexualidad humanaWilmer Lopez
 

Andere mochten auch (20)

VisiĂłn y misiĂłn de la universidad nacional de cajamarca
VisiĂłn y misiĂłn de  la universidad nacional de cajamarcaVisiĂłn y misiĂłn de  la universidad nacional de cajamarca
VisiĂłn y misiĂłn de la universidad nacional de cajamarca
 
Emendas ao pl 4921 relatĂłrio final do policarpo.
Emendas ao pl 4921   relatĂłrio final do policarpo.Emendas ao pl 4921   relatĂłrio final do policarpo.
Emendas ao pl 4921 relatĂłrio final do policarpo.
 
Derechos de autor
Derechos de autorDerechos de autor
Derechos de autor
 
SĂ­mbolos patrios del perĂş
SĂ­mbolos patrios del  perĂşSĂ­mbolos patrios del  perĂş
SĂ­mbolos patrios del perĂş
 
Proyecto final
Proyecto finalProyecto final
Proyecto final
 
Exposicionpereiravibra
ExposicionpereiravibraExposicionpereiravibra
Exposicionpereiravibra
 
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995
Politicas de lucha contra la pobreza gobiernos peruanos 1985 1995
 
5. etapas do proc conhec
5. etapas do proc conhec5. etapas do proc conhec
5. etapas do proc conhec
 
2.3. fundamento epistemolĂłgicos da medicna - problemas fundamentais do conh...
2.3. fundamento epistemolĂłgicos da medicna -   problemas fundamentais do conh...2.3. fundamento epistemolĂłgicos da medicna -   problemas fundamentais do conh...
2.3. fundamento epistemolĂłgicos da medicna - problemas fundamentais do conh...
 
Artigo: Resolução de problemas associado à comunicação
Artigo: Resolução de problemas associado à comunicaçãoArtigo: Resolução de problemas associado à comunicação
Artigo: Resolução de problemas associado à comunicação
 
5 videos
5 videos5 videos
5 videos
 
MetodologĂ­a pacie-dokeos
MetodologĂ­a pacie-dokeosMetodologĂ­a pacie-dokeos
MetodologĂ­a pacie-dokeos
 
Metalurgica fierro s
Metalurgica fierro sMetalurgica fierro s
Metalurgica fierro s
 
Como conciliar gestĂŁo eficiente e respeito Ă  legalidade - Mackenzie
Como conciliar gestĂŁo eficiente e respeito Ă  legalidade - MackenzieComo conciliar gestĂŁo eficiente e respeito Ă  legalidade - Mackenzie
Como conciliar gestĂŁo eficiente e respeito Ă  legalidade - Mackenzie
 
MarĂ­a montessori proyecto modulo 2
MarĂ­a montessori proyecto modulo 2MarĂ­a montessori proyecto modulo 2
MarĂ­a montessori proyecto modulo 2
 
Trabajo corregido word2
Trabajo corregido word2Trabajo corregido word2
Trabajo corregido word2
 
vestidos de inocencia
vestidos de inocenciavestidos de inocencia
vestidos de inocencia
 
A concorrência desleal e o crime de falsa alegação de
A concorrência desleal e o crime de falsa alegação deA concorrência desleal e o crime de falsa alegação de
A concorrência desleal e o crime de falsa alegação de
 
Caso chile
Caso chileCaso chile
Caso chile
 
sexualidad humana
sexualidad humanasexualidad humana
sexualidad humana
 

Ähnlich wie Surveillance in the_workplace_highcontrast_ppt

Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challengesCRM
 
Unit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptxUnit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptxCallplanetsDeveloper
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacyG&A Partners
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxArti Parab Academics
 
Internet monitoring
Internet monitoringInternet monitoring
Internet monitoringCorrje
 
Surveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsSurveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsDLA Piper (Canada) LLP
 
code of conduct
code of conductcode of conduct
code of conductDavid Waddell
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxAmandaWeaver21
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet SafetyCharina Mostierra
 
New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issueslgarib
 
Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...Niki Avraam
 
Employees and Internet Use - Legal Perspective
Employees and Internet Use - Legal PerspectiveEmployees and Internet Use - Legal Perspective
Employees and Internet Use - Legal PerspectiveDarius Whelan
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Case IQ
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsDan Michaluk
 
Are Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- SpaffordAre Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- SpaffordMia Eaker
 

Ähnlich wie Surveillance in the_workplace_highcontrast_ppt (20)

Module 8 security and ethical challenges
Module 8 security and ethical challengesModule 8 security and ethical challenges
Module 8 security and ethical challenges
 
Unit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptxUnit 7 Management Challenges in IT.pptx
Unit 7 Management Challenges in IT.pptx
 
Understanding employee privacy
Understanding employee privacyUnderstanding employee privacy
Understanding employee privacy
 
COMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptxCOMPUTER APPLICATIONS Module 5.pptx
COMPUTER APPLICATIONS Module 5.pptx
 
Information security
Information securityInformation security
Information security
 
Internet monitoring
Internet monitoringInternet monitoring
Internet monitoring
 
Surveillance of Your Electronic Systems
Surveillance of Your Electronic SystemsSurveillance of Your Electronic Systems
Surveillance of Your Electronic Systems
 
code of conduct
code of conductcode of conduct
code of conduct
 
Topic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptxTopic 3 Current Legislation.pptx
Topic 3 Current Legislation.pptx
 
1 ictl-ethics
1 ictl-ethics1 ictl-ethics
1 ictl-ethics
 
ICT online tools & Internet Safety
ICT online tools & Internet SafetyICT online tools & Internet Safety
ICT online tools & Internet Safety
 
New Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy IssuesNew Technologies in the Workplace: Privacy Issues
New Technologies in the Workplace: Privacy Issues
 
Unit 14 LO2
Unit 14 LO2Unit 14 LO2
Unit 14 LO2
 
Unit 14 LO2
Unit 14 LO2Unit 14 LO2
Unit 14 LO2
 
Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...Employee use of social media - Chapter 1. Employee misuse of internet and ema...
Employee use of social media - Chapter 1. Employee misuse of internet and ema...
 
Employees and Internet Use - Legal Perspective
Employees and Internet Use - Legal PerspectiveEmployees and Internet Use - Legal Perspective
Employees and Internet Use - Legal Perspective
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
 
Investigating without running afoul of privacy laws
Investigating without running afoul of privacy lawsInvestigating without running afoul of privacy laws
Investigating without running afoul of privacy laws
 
Are Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- SpaffordAre Computer Hacker Break-ins Ethical -- Spafford
Are Computer Hacker Break-ins Ethical -- Spafford
 

KĂźrzlich hochgeladen

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxJisc
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 

KĂźrzlich hochgeladen (20)

Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 

Surveillance in the_workplace_highcontrast_ppt

  • 1. Surveillance in the Workplace Luis Medina and Rick Lizotte
  • 2. Background • Privacy not among Constitutional rights • But Fourth Amendment—right against unreasonable search and seizure • Not much law about privacy until end of the 19 th century • Invention of microphone and telephone—new threats to privacy • 1890—Supreme Court Justice wants right to privacy from wiretapping, not only house searches • 1986—Electronic Communications Privacy Act—allows employer right to monitor business but not personal communication
  • 3. Background • Computer networks and new camera equipment allow better monitoring of the workplace • Employers can fire for any reason not covered by law • Employers often look for misuse of computer, stealing, drug use and alcohol use, lack of productivity • More extreme—camera in locker room/bathroom; contract not to smoke or drink at home to prevent use of medical insurance later
  • 5. The Controversy • Some people believe electronic surveillance is good for security, safety, and productivity. • Others believe it is a violation of privacy rights and should not be used. • My opinion—use of electronic surveillance good if only used to protect employees and not to violate privacy. From the movie 1984
  • 6. Arguments For Workplace Surveillance 1. The use of electronic surveillance increases worker productivity 2. Helps to prevent accidents at work 3. Essential for the protection of employees 4. May prevent employee theft and harassment by other employees 5. May provide a way to make work evaluation objective
  • 7. Arguments Against Workplace Surveillance 1. Employees have the right to privacy in some areas of workplace 2. Surveillance creates a hostile environment which makes employees fearful and unhappy 3. Employers don’t know how to separate the public from the private—what is in the workplace from what is in the home 4. Surveillance provides an opportunity for sexual harassment by employer or security personnel
  • 8. My Conclusion • Electronic surveillance may be necessary to secure safety and productivity • However, electronic surveillance must never violate the employees’ rights to privacy and cause bad feeling in the workplace • Workers need to be notified of surveillance • Finally, where does the employers right to monitor us stop?