SlideShare uma empresa Scribd logo
1 de 10
Baixar para ler offline
IS THAT SOLITAIRE ON YOUR SCREEN?!
SURVEILLANCE OF YOUR ELECTRONIC SYSTEMS



                             Tania da Silva
                             May 24, 2012
INTRODUCTION
Use of the Internet at work and its advantages:
1. Quicker and more efficient communications to optimize
   productivity;
2. Important research and consultation tools;
3. Better visibility on the market;
4. Better relationships with clients and business partners.
THE LEGAL RISKS
1. Defamatory, harassing, offensive or illegal content;
2. Intellectual property infringement;
3. Damage to the company’s reputation;
4. Failure to protect the company’s privileged or confidential
   information;
5. Harassment;
6. Loss of time and diminished employee productivity;
7. Risks to network security.
DOES THE EMPLOYER HAVE A RIGHT TO MONITOR?
WHY?
YES, because of:
• Its powers of management and control to ensure that
  the company functions properly;
• Its disciplinary powers;
• Its powers to create standards and regulations;
• Its contractual rights.

•   What of its property rights?
WHAT ARE THE LIMITS OF THE EMPLOYER’S RIGHT
TO MONITOR?
The laws that protect privacy:

1.   Federal laws regarding personal information;
2.   Quebec’s Charter of human rights and freedoms;
3.   The Civil Code of Quebec;
4.   Quebec laws regarding personal information.
EXPECTATION OF PRIVACY
•   What is an expectation of privacy?

•   How can the level of employees’ expectation of privacy
    with respect to the use of computer systems at work be
    determined?
EXPECTATION OF PRIVACY (continued)
•   Factors to consider:

       1. Are the employees aware of the monitoring?
       2. Was the consent with respect to the monitoring?
       3. The vulnerable nature of Internet
          communications;
       4. The work environment;
PRACTICAL METHODS FOR REDUCING EMPLOYEES’
EXPECTATION OF PRIVACY
•   Create a written policy regarding the use of the company’s
    information technology, which, amongst other things, should
    include a list of activities/uses which are not authorized;
•   Have the policy signed upon hiring;
•   Provide reminder of the policy upon use of information technology
    with warning messages or require a password to access sites
    which are blocked by the company;
•   Use progressive disciplinary measures when the policy is not
    respected;
QUESTIONS?
THANK YOU!

Mais conteúdo relacionado

Mais procurados

Compliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulationsCompliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulationsSherWeb
 
Ethical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of ITEthical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of ITDr. Rosemarie Sibbaluca-Guirre
 
OLD - altOS Secure Mobile Platform - Public
OLD - altOS Secure Mobile Platform - PublicOLD - altOS Secure Mobile Platform - Public
OLD - altOS Secure Mobile Platform - PublicSimon Hartley
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkBlue Coat
 
Implementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring ProgramImplementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring ProgramVeriato
 
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...Segun Ebenezer Olaniyan
 
Smartphone and mobile device safety & security
Smartphone and mobile device safety & securitySmartphone and mobile device safety & security
Smartphone and mobile device safety & securityAlbanMichael
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivismrashidirazali
 
Safeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare DataSafeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare DataBitglass
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College WorkshopRahul Nayan
 
CYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTIONCYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTIONshanueduthoughts
 
La1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsLa1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsCma Mohd
 
Four ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographicFour ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographicCheapest SSLs
 
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSSStop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSSChad Gilles
 

Mais procurados (20)

Compliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulationsCompliant Email Solutions for HIPAA & SOX regulations
Compliant Email Solutions for HIPAA & SOX regulations
 
Ethical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of ITEthical Dimension and understanding Ethical Foundation of IT
Ethical Dimension and understanding Ethical Foundation of IT
 
OLD - altOS Secure Mobile Platform - Public
OLD - altOS Secure Mobile Platform - PublicOLD - altOS Secure Mobile Platform - Public
OLD - altOS Secure Mobile Platform - Public
 
Why Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You ThinkWhy Your Mobile Device Isn’t As Secure As You Think
Why Your Mobile Device Isn’t As Secure As You Think
 
IT Policy
IT PolicyIT Policy
IT Policy
 
IoT_Implemented
IoT_ImplementedIoT_Implemented
IoT_Implemented
 
Implementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring ProgramImplementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring Program
 
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
BRIDGING THE KNOWLEDGE GAP: From Higher Institution Theory to Real Life Pract...
 
Smartphone and mobile device safety & security
Smartphone and mobile device safety & securitySmartphone and mobile device safety & security
Smartphone and mobile device safety & security
 
Hacking and Hacktivism
Hacking and HacktivismHacking and Hacktivism
Hacking and Hacktivism
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Cyberlaw
CyberlawCyberlaw
Cyberlaw
 
Safeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare DataSafeguarding Cloud and Mobile Healthcare Data
Safeguarding Cloud and Mobile Healthcare Data
 
Administrative safeguards
Administrative safeguardsAdministrative safeguards
Administrative safeguards
 
Data security
Data securityData security
Data security
 
Cyber Security College Workshop
Cyber Security College WorkshopCyber Security College Workshop
Cyber Security College Workshop
 
CYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTIONCYBER PRIVACY AND PASSWORD PROTECTION
CYBER PRIVACY AND PASSWORD PROTECTION
 
La1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsLa1 Malaysia Cyber Laws
La1 Malaysia Cyber Laws
 
Four ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographicFour ways to secure the internet of things - infographic
Four ways to secure the internet of things - infographic
 
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSSStop Spymail: Protecting Your Organization from Email Privacy LOSS
Stop Spymail: Protecting Your Organization from Email Privacy LOSS
 

Destaque (6)

U3 t1aa1
U3 t1aa1U3 t1aa1
U3 t1aa1
 
TESTS
TESTSTESTS
TESTS
 
Drilling down to the core: collaborative core content creation - Karen Fisher...
Drilling down to the core: collaborative core content creation - Karen Fisher...Drilling down to the core: collaborative core content creation - Karen Fisher...
Drilling down to the core: collaborative core content creation - Karen Fisher...
 
UX in 10 Minutes - Usability Testing - Presented at SEMPO
UX in 10 Minutes - Usability Testing - Presented at SEMPOUX in 10 Minutes - Usability Testing - Presented at SEMPO
UX in 10 Minutes - Usability Testing - Presented at SEMPO
 
Digital Nirvana
Digital NirvanaDigital Nirvana
Digital Nirvana
 
Avoiding Resume Pitfalls
Avoiding Resume PitfallsAvoiding Resume Pitfalls
Avoiding Resume Pitfalls
 

Semelhante a Surveillance of Your Electronic Systems

DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesNapier University
 
Are You Prepared For a Data Breach
Are You Prepared For a Data BreachAre You Prepared For a Data Breach
Are You Prepared For a Data BreachBrian Heidelberger
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3Meg Weber
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsTrustArc
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rulessaurnou
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyResilient Systems
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy ProgramDaniel Ayala
 
Don't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint heartedDon't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint heartedIRIS
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...acemindia
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016centralohioissa
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksNicole Garton
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!SparkPost
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsgppcpa
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilienceRishi Kant
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacyCenter.cloud
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredPrecisely
 
HIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewHIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewClearDATACloud
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach riskLivingstone Advisory
 

Semelhante a Surveillance of Your Electronic Systems (20)

DLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The ChallengesDLP: Monitoring Legal Obligations, Managing The Challenges
DLP: Monitoring Legal Obligations, Managing The Challenges
 
Are You Prepared For a Data Breach
Are You Prepared For a Data BreachAre You Prepared For a Data Breach
Are You Prepared For a Data Breach
 
2014 ota databreach3
2014 ota databreach32014 ota databreach3
2014 ota databreach3
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
 
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model RulesData Confidentiality, Security and Recent Changes to the ABA Model Rules
Data Confidentiality, Security and Recent Changes to the ABA Model Rules
 
Anatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The UglyAnatomy Of A Breach: The Good, The Bad & The Ugly
Anatomy Of A Breach: The Good, The Bad & The Ugly
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
IT Policy
IT PolicyIT Policy
IT Policy
 
Don't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint heartedDon't panic - cyber security for the faint hearted
Don't panic - cyber security for the faint hearted
 
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
Security Management in Cloud Computing by Shivani Gogia - Aravali College of ...
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
Trends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the RisksTrends in Law Practice Management – Calculating the Risks
Trends in Law Practice Management – Calculating the Risks
 
Privacy and Big Data Overload!
Privacy and Big Data Overload!Privacy and Big Data Overload!
Privacy and Big Data Overload!
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
A Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOsA Cybersecurity Planning Guide for CFOs
A Cybersecurity Planning Guide for CFOs
 
GDPR | Cyber security process resilience
GDPR | Cyber security process resilienceGDPR | Cyber security process resilience
GDPR | Cyber security process resilience
 
Privacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User DataPrivacy Policies: Guide to Protecting User Data
Privacy Policies: Guide to Protecting User Data
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
HIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An OverviewHIPAA Compliant Cloud Computing, An Overview
HIPAA Compliant Cloud Computing, An Overview
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 

Mais de DLA Piper (Canada) LLP

Consumer Protection: Recent Developments and Trends
Consumer Protection: Recent Developments and TrendsConsumer Protection: Recent Developments and Trends
Consumer Protection: Recent Developments and TrendsDLA Piper (Canada) LLP
 
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...Latest Developments in Advertising and Marketing Law and Their Impact on Cana...
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...DLA Piper (Canada) LLP
 
The Need to Know Legalities of Marketing Sponsorships
The Need to Know Legalities of Marketing SponsorshipsThe Need to Know Legalities of Marketing Sponsorships
The Need to Know Legalities of Marketing SponsorshipsDLA Piper (Canada) LLP
 
The Importance of Documentation in an Employment Relationship
The Importance of Documentation in an Employment RelationshipThe Importance of Documentation in an Employment Relationship
The Importance of Documentation in an Employment RelationshipDLA Piper (Canada) LLP
 
Operational Information as "Personal Information"
Operational Information as "Personal Information"Operational Information as "Personal Information"
Operational Information as "Personal Information"DLA Piper (Canada) LLP
 
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...DLA Piper (Canada) LLP
 
Anatomy of a Failed Termination Process
Anatomy of a Failed Termination ProcessAnatomy of a Failed Termination Process
Anatomy of a Failed Termination ProcessDLA Piper (Canada) LLP
 
Maternity and Parental Leave: Current Issues
Maternity and Parental Leave: Current IssuesMaternity and Parental Leave: Current Issues
Maternity and Parental Leave: Current IssuesDLA Piper (Canada) LLP
 
Mental Health as a Safety Issue in the Workplace
Mental Health as a Safety Issue in the WorkplaceMental Health as a Safety Issue in the Workplace
Mental Health as a Safety Issue in the WorkplaceDLA Piper (Canada) LLP
 
Employing Contractors and Contracting Employees
Employing Contractors and Contracting EmployeesEmploying Contractors and Contracting Employees
Employing Contractors and Contracting EmployeesDLA Piper (Canada) LLP
 
What to Do When Regulators Come A-knocking
What to Do When Regulators Come A-knockingWhat to Do When Regulators Come A-knocking
What to Do When Regulators Come A-knockingDLA Piper (Canada) LLP
 
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...DLA Piper (Canada) LLP
 
To Disclaim or Not and How? Very Big Questions. A Primer for Marketers
To Disclaim or Not and How? Very Big Questions. A Primer for MarketersTo Disclaim or Not and How? Very Big Questions. A Primer for Marketers
To Disclaim or Not and How? Very Big Questions. A Primer for MarketersDLA Piper (Canada) LLP
 
Notre ami, Anton Piller (l’ordonnance d’injonction)
Notre ami, Anton Piller (l’ordonnance d’injonction)Notre ami, Anton Piller (l’ordonnance d’injonction)
Notre ami, Anton Piller (l’ordonnance d’injonction)DLA Piper (Canada) LLP
 
Our Friend, Anton Piller (The Injunction)
Our Friend, Anton Piller (The Injunction)Our Friend, Anton Piller (The Injunction)
Our Friend, Anton Piller (The Injunction)DLA Piper (Canada) LLP
 
La surveillance de vos systèmes informatiques
La surveillance de vos systèmes informatiquesLa surveillance de vos systèmes informatiques
La surveillance de vos systèmes informatiquesDLA Piper (Canada) LLP
 

Mais de DLA Piper (Canada) LLP (20)

Current Issues in Employment Law
Current Issues in Employment LawCurrent Issues in Employment Law
Current Issues in Employment Law
 
Consumer Protection: Recent Developments and Trends
Consumer Protection: Recent Developments and TrendsConsumer Protection: Recent Developments and Trends
Consumer Protection: Recent Developments and Trends
 
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...Latest Developments in Advertising and Marketing Law and Their Impact on Cana...
Latest Developments in Advertising and Marketing Law and Their Impact on Cana...
 
The Need to Know Legalities of Marketing Sponsorships
The Need to Know Legalities of Marketing SponsorshipsThe Need to Know Legalities of Marketing Sponsorships
The Need to Know Legalities of Marketing Sponsorships
 
The Importance of Documentation in an Employment Relationship
The Importance of Documentation in an Employment RelationshipThe Importance of Documentation in an Employment Relationship
The Importance of Documentation in an Employment Relationship
 
Operational Information as "Personal Information"
Operational Information as "Personal Information"Operational Information as "Personal Information"
Operational Information as "Personal Information"
 
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...
Background Checks: The Legality of Reference, Credit, Criminal and Qualificat...
 
Anatomy of a Failed Termination Process
Anatomy of a Failed Termination ProcessAnatomy of a Failed Termination Process
Anatomy of a Failed Termination Process
 
Maternity and Parental Leave: Current Issues
Maternity and Parental Leave: Current IssuesMaternity and Parental Leave: Current Issues
Maternity and Parental Leave: Current Issues
 
Mental Health as a Safety Issue in the Workplace
Mental Health as a Safety Issue in the WorkplaceMental Health as a Safety Issue in the Workplace
Mental Health as a Safety Issue in the Workplace
 
Disclaimer in Ads - Resting Not Dead?
Disclaimer in Ads - Resting Not Dead?Disclaimer in Ads - Resting Not Dead?
Disclaimer in Ads - Resting Not Dead?
 
Employing Contractors and Contracting Employees
Employing Contractors and Contracting EmployeesEmploying Contractors and Contracting Employees
Employing Contractors and Contracting Employees
 
Breaking Up Is Hard to Do!
Breaking Up Is Hard to Do!Breaking Up Is Hard to Do!
Breaking Up Is Hard to Do!
 
What to Do When Regulators Come A-knocking
What to Do When Regulators Come A-knockingWhat to Do When Regulators Come A-knocking
What to Do When Regulators Come A-knocking
 
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...
Mitigating Legal Risks and Staying Compliant While Running a Successful Onlin...
 
To Disclaim or Not and How? Very Big Questions. A Primer for Marketers
To Disclaim or Not and How? Very Big Questions. A Primer for MarketersTo Disclaim or Not and How? Very Big Questions. A Primer for Marketers
To Disclaim or Not and How? Very Big Questions. A Primer for Marketers
 
How to Make Litigation Pay
How to Make Litigation PayHow to Make Litigation Pay
How to Make Litigation Pay
 
Notre ami, Anton Piller (l’ordonnance d’injonction)
Notre ami, Anton Piller (l’ordonnance d’injonction)Notre ami, Anton Piller (l’ordonnance d’injonction)
Notre ami, Anton Piller (l’ordonnance d’injonction)
 
Our Friend, Anton Piller (The Injunction)
Our Friend, Anton Piller (The Injunction)Our Friend, Anton Piller (The Injunction)
Our Friend, Anton Piller (The Injunction)
 
La surveillance de vos systèmes informatiques
La surveillance de vos systèmes informatiquesLa surveillance de vos systèmes informatiques
La surveillance de vos systèmes informatiques
 

Último

Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckHajeJanKamps
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Anamaria Contreras
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 

Último (20)

Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deckPitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
Pitch Deck Teardown: Geodesic.Life's $500k Pre-seed deck
 
Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.Traction part 2 - EOS Model JAX Bridges.
Traction part 2 - EOS Model JAX Bridges.
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 

Surveillance of Your Electronic Systems

  • 1. IS THAT SOLITAIRE ON YOUR SCREEN?! SURVEILLANCE OF YOUR ELECTRONIC SYSTEMS Tania da Silva May 24, 2012
  • 2. INTRODUCTION Use of the Internet at work and its advantages: 1. Quicker and more efficient communications to optimize productivity; 2. Important research and consultation tools; 3. Better visibility on the market; 4. Better relationships with clients and business partners.
  • 3. THE LEGAL RISKS 1. Defamatory, harassing, offensive or illegal content; 2. Intellectual property infringement; 3. Damage to the company’s reputation; 4. Failure to protect the company’s privileged or confidential information; 5. Harassment; 6. Loss of time and diminished employee productivity; 7. Risks to network security.
  • 4. DOES THE EMPLOYER HAVE A RIGHT TO MONITOR? WHY? YES, because of: • Its powers of management and control to ensure that the company functions properly; • Its disciplinary powers; • Its powers to create standards and regulations; • Its contractual rights. • What of its property rights?
  • 5. WHAT ARE THE LIMITS OF THE EMPLOYER’S RIGHT TO MONITOR? The laws that protect privacy: 1. Federal laws regarding personal information; 2. Quebec’s Charter of human rights and freedoms; 3. The Civil Code of Quebec; 4. Quebec laws regarding personal information.
  • 6. EXPECTATION OF PRIVACY • What is an expectation of privacy? • How can the level of employees’ expectation of privacy with respect to the use of computer systems at work be determined?
  • 7. EXPECTATION OF PRIVACY (continued) • Factors to consider: 1. Are the employees aware of the monitoring? 2. Was the consent with respect to the monitoring? 3. The vulnerable nature of Internet communications; 4. The work environment;
  • 8. PRACTICAL METHODS FOR REDUCING EMPLOYEES’ EXPECTATION OF PRIVACY • Create a written policy regarding the use of the company’s information technology, which, amongst other things, should include a list of activities/uses which are not authorized; • Have the policy signed upon hiring; • Provide reminder of the policy upon use of information technology with warning messages or require a password to access sites which are blocked by the company; • Use progressive disciplinary measures when the policy is not respected;