SlideShare uma empresa Scribd logo
1 de 20
You Are Being Watched

          Surveillance at
            workplace
General principles for surveillance
 policies

1. Openness
2. Consent
3. Consultation
4. Private spaces
5. Proportionality
Types of surveillance

  Overt surveillance

  Covert Surveillance
Methods of Surveillance

Telephone surveillance


 Telephone tapping



 Video facility



 To collect location data
Biometric surveillance


Technologies that measure and analyze human
  physical and/or behavioral characteristics for
  authentication, identification, or screening purposes.
 physical characteristics -fingerprints, DNA
 behavioral characteristics - a person's manner of
  walking or voice
Corporate surveillance

Monitoring of activities within a business or within the
        industry associated with that business.
  Monitoring of a person or group's behavior by a
                       corporation
Methods of Surveillance

 Internet Surveillance


        This surveillance monitor the employee internet
 activities. For this most of companies use spy ware
 & cookies.
 Video Surveillance


 Through this surveillance monitor the employee
  workplace activities.
In here video cameras connecting
With recording device use. There are
Many uses of these surveillance.
 Computer Surveillance


             This surveillance monitor the data and e
 maila through a softwares such as the FBI's Magic
 Lantern and CIPAV.
There are uses of this surveillance such as,
 Preventing excessive personal use of
 computers, Protecting security of computer
 system from external threats,Blocking Spam e-
 mails.
The way in which Workplace Surveillance is
regulated.

 Sri Lankan Situation.


 Regulations in other countries.
   ‘Workplace video surveillance Act’ 1998
    in New South Wales.
   ‘Workplace Privacy Act’ 2011 in
    Australia.

 Regulatory requirements.
 Covert Surveillance.
   Reasonable suspicion.
   Unlawful Activity.
   Should exclude the areas where there is a heightened
   expectation of privacy (rest rooms, wash rooms, bed
   rooms etc.)


 Violation of the rules in the act by an employer is a
 ‘Criminal Offence’
 Tracking employees inside the workplace.
   Access cards.
   Optical surveillance devices.
   Internet, email tracking.
   Telephone tracking.


 Tracking employees outside the workplace.
   Vehicle tracking (GPS).
   Mobile phone tracking.
Advantages of workplace
    surveillance
 Increase productivity
 Ensure workplace safety and security
 Ensure implementing smoothly
 Reducing exposure to liability risk
 control the cost.
 Eliminate leaking of confidential
Disadvantages of workplace
surveillance

 Distrust and resentment.

 High cost
 Difficult to protect Employee privacy
Where we use surveillance at
workplace


Practical examples from
Examples from Logiwiz
 Telephone calls Monitoring




 E-Mail Monitoring




 CCTV Monitoring
Examples from Logiwiz - Cont
 Web Browsing Limitations



 Location Monitoring



 Monthly Night work Roster
Practical Issues of surveillance
 Mass surveillance limited personal, social, political
  freedoms.
 surveillance create in everyone a feeling of always
  being watched
 Civil rights groups and privacy groups oppose
  surveillance as a violation of people's right to
  privacy.
How HR Manager can intervene in surveillance


                   Reduce
                   conflicts



        Create                 Develop a
                      HR
       awarenes     Manager    Surveillan
          s                    ce Policy


                   Create a
                  protective
                  atmospher
                      e
Thank You

Mais conteúdo relacionado

Mais procurados

dowry and suicide
 dowry and suicide  dowry and suicide
dowry and suicide Avni Shah
 
Five Steps to Prevent Abusive Conduct and Workplace Bullying
Five Steps to Prevent Abusive Conduct and Workplace BullyingFive Steps to Prevent Abusive Conduct and Workplace Bullying
Five Steps to Prevent Abusive Conduct and Workplace BullyingAnderson-davis, Inc.
 
SEXUAL HARASSMENT AT WORKPLACE
SEXUAL HARASSMENT  AT WORKPLACESEXUAL HARASSMENT  AT WORKPLACE
SEXUAL HARASSMENT AT WORKPLACEOJO SUNDAY
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 
Sexual harassment PPT
Sexual  harassment PPTSexual  harassment PPT
Sexual harassment PPTDino Vesper
 
Prevention of Sexual Harassment Act 2013
Prevention of Sexual Harassment Act 2013Prevention of Sexual Harassment Act 2013
Prevention of Sexual Harassment Act 2013Neha Shrimali
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud PreventionBlackbaud
 
Discrimination in employment
Discrimination in employmentDiscrimination in employment
Discrimination in employmentNazir Fahim
 
POSH TRAINING FOR IC MEMBERS
POSH TRAINING FOR IC MEMBERSPOSH TRAINING FOR IC MEMBERS
POSH TRAINING FOR IC MEMBERSNeha Shrimali
 
Sexual harassment at workplace
Sexual harassment at workplaceSexual harassment at workplace
Sexual harassment at workplacebegraj SIWAL
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12Fuh George Cheo
 

Mais procurados (20)

Women Trafficking
Women TraffickingWomen Trafficking
Women Trafficking
 
Cyber law final
Cyber law finalCyber law final
Cyber law final
 
dowry and suicide
 dowry and suicide  dowry and suicide
dowry and suicide
 
Abuse and Harassment
Abuse and HarassmentAbuse and Harassment
Abuse and Harassment
 
Ethics ppt group 6 (1)
Ethics ppt group 6 (1)Ethics ppt group 6 (1)
Ethics ppt group 6 (1)
 
Five Steps to Prevent Abusive Conduct and Workplace Bullying
Five Steps to Prevent Abusive Conduct and Workplace BullyingFive Steps to Prevent Abusive Conduct and Workplace Bullying
Five Steps to Prevent Abusive Conduct and Workplace Bullying
 
SEXUAL HARASSMENT AT WORKPLACE
SEXUAL HARASSMENT  AT WORKPLACESEXUAL HARASSMENT  AT WORKPLACE
SEXUAL HARASSMENT AT WORKPLACE
 
About posh act
About posh actAbout posh act
About posh act
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Preventing Harassment in the Workplace
Preventing Harassment in the WorkplacePreventing Harassment in the Workplace
Preventing Harassment in the Workplace
 
Sexual harassment PPT
Sexual  harassment PPTSexual  harassment PPT
Sexual harassment PPT
 
Prevention of Sexual Harassment Act 2013
Prevention of Sexual Harassment Act 2013Prevention of Sexual Harassment Act 2013
Prevention of Sexual Harassment Act 2013
 
Sexual harassment
Sexual harassmentSexual harassment
Sexual harassment
 
Current Trends in Fraud Prevention
Current Trends in Fraud PreventionCurrent Trends in Fraud Prevention
Current Trends in Fraud Prevention
 
Discrimination in employment
Discrimination in employmentDiscrimination in employment
Discrimination in employment
 
POSH TRAINING FOR IC MEMBERS
POSH TRAINING FOR IC MEMBERSPOSH TRAINING FOR IC MEMBERS
POSH TRAINING FOR IC MEMBERS
 
IT act 2008
IT act 2008IT act 2008
IT act 2008
 
Sexual harassment at workplace
Sexual harassment at workplaceSexual harassment at workplace
Sexual harassment at workplace
 
Fraud prevention detection control fuh 12
Fraud prevention detection control fuh  12Fraud prevention detection control fuh  12
Fraud prevention detection control fuh 12
 

Semelhante a Workplace Surveillance

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfEnov8
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?PECB
 
A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...
A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...
A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...rajsriinfotek1
 
Whistleblower presentation
Whistleblower presentationWhistleblower presentation
Whistleblower presentationMustapha Mugisa
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docxambersalomon88660
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf503SaranyaS
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR prioritiesAlberto Canadè
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxinfosec train
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsForcepoint LLC
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxmusicalworld14
 

Semelhante a Workplace Surveillance (20)

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...
A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...
A Complete Guide to Managing the Legal and Ethical Environment of Surveillanc...
 
Whistleblower presentation
Whistleblower presentationWhistleblower presentation
Whistleblower presentation
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
UK Legal Framework (2003)
UK Legal Framework (2003)UK Legal Framework (2003)
UK Legal Framework (2003)
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 

Mais de Sampath

Professional Judgment and expertise in Auditing
Professional Judgment and expertise in AuditingProfessional Judgment and expertise in Auditing
Professional Judgment and expertise in AuditingSampath
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace SurveilanceSampath
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace SurveilanceSampath
 
TQM in HR
TQM in HRTQM in HR
TQM in HRSampath
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information SystemsSampath
 
Conflict management
Conflict managementConflict management
Conflict managementSampath
 
Hr audit
Hr auditHr audit
Hr auditSampath
 
Hr audit
Hr auditHr audit
Hr auditSampath
 
Human Resource Development.
Human Resource Development.Human Resource Development.
Human Resource Development.Sampath
 
Presentation team mgt
Presentation team mgtPresentation team mgt
Presentation team mgtSampath
 
Strategic+management+3
Strategic+management+3Strategic+management+3
Strategic+management+3Sampath
 
Strategic+management+2
Strategic+management+2Strategic+management+2
Strategic+management+2Sampath
 
Strategic strategic capabilitiies 2003
Strategic strategic capabilitiies 2003Strategic strategic capabilitiies 2003
Strategic strategic capabilitiies 2003Sampath
 
Strategic management 12
Strategic management 12Strategic management 12
Strategic management 12Sampath
 
Strategic management 8
Strategic management 8Strategic management 8
Strategic management 8Sampath
 
Led session4 presentation
Led session4 presentationLed session4 presentation
Led session4 presentationSampath
 
Ethics+lesson+2
Ethics+lesson+2Ethics+lesson+2
Ethics+lesson+2Sampath
 
Ethics lesson 4
Ethics lesson 4Ethics lesson 4
Ethics lesson 4Sampath
 
Ethics & stakeholders
Ethics & stakeholdersEthics & stakeholders
Ethics & stakeholdersSampath
 
Diversity management
Diversity managementDiversity management
Diversity managementSampath
 

Mais de Sampath (20)

Professional Judgment and expertise in Auditing
Professional Judgment and expertise in AuditingProfessional Judgment and expertise in Auditing
Professional Judgment and expertise in Auditing
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
 
TQM in HR
TQM in HRTQM in HR
TQM in HR
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
 
Conflict management
Conflict managementConflict management
Conflict management
 
Hr audit
Hr auditHr audit
Hr audit
 
Hr audit
Hr auditHr audit
Hr audit
 
Human Resource Development.
Human Resource Development.Human Resource Development.
Human Resource Development.
 
Presentation team mgt
Presentation team mgtPresentation team mgt
Presentation team mgt
 
Strategic+management+3
Strategic+management+3Strategic+management+3
Strategic+management+3
 
Strategic+management+2
Strategic+management+2Strategic+management+2
Strategic+management+2
 
Strategic strategic capabilitiies 2003
Strategic strategic capabilitiies 2003Strategic strategic capabilitiies 2003
Strategic strategic capabilitiies 2003
 
Strategic management 12
Strategic management 12Strategic management 12
Strategic management 12
 
Strategic management 8
Strategic management 8Strategic management 8
Strategic management 8
 
Led session4 presentation
Led session4 presentationLed session4 presentation
Led session4 presentation
 
Ethics+lesson+2
Ethics+lesson+2Ethics+lesson+2
Ethics+lesson+2
 
Ethics lesson 4
Ethics lesson 4Ethics lesson 4
Ethics lesson 4
 
Ethics & stakeholders
Ethics & stakeholdersEthics & stakeholders
Ethics & stakeholders
 
Diversity management
Diversity managementDiversity management
Diversity management
 

Último

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactisticshameyhk98
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 

Último (20)

Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 

Workplace Surveillance

  • 1. You Are Being Watched Surveillance at workplace
  • 2. General principles for surveillance policies 1. Openness 2. Consent 3. Consultation 4. Private spaces 5. Proportionality
  • 3. Types of surveillance  Overt surveillance  Covert Surveillance
  • 4. Methods of Surveillance Telephone surveillance  Telephone tapping  Video facility  To collect location data
  • 5. Biometric surveillance Technologies that measure and analyze human physical and/or behavioral characteristics for authentication, identification, or screening purposes.  physical characteristics -fingerprints, DNA  behavioral characteristics - a person's manner of walking or voice
  • 6. Corporate surveillance Monitoring of activities within a business or within the industry associated with that business. Monitoring of a person or group's behavior by a corporation
  • 7. Methods of Surveillance  Internet Surveillance This surveillance monitor the employee internet activities. For this most of companies use spy ware & cookies.
  • 8.  Video Surveillance Through this surveillance monitor the employee workplace activities. In here video cameras connecting With recording device use. There are Many uses of these surveillance.
  • 9.  Computer Surveillance This surveillance monitor the data and e maila through a softwares such as the FBI's Magic Lantern and CIPAV. There are uses of this surveillance such as, Preventing excessive personal use of computers, Protecting security of computer system from external threats,Blocking Spam e- mails.
  • 10. The way in which Workplace Surveillance is regulated.  Sri Lankan Situation.  Regulations in other countries.  ‘Workplace video surveillance Act’ 1998 in New South Wales.  ‘Workplace Privacy Act’ 2011 in Australia.  Regulatory requirements.
  • 11.  Covert Surveillance.  Reasonable suspicion.  Unlawful Activity.  Should exclude the areas where there is a heightened expectation of privacy (rest rooms, wash rooms, bed rooms etc.)  Violation of the rules in the act by an employer is a ‘Criminal Offence’
  • 12.  Tracking employees inside the workplace.  Access cards.  Optical surveillance devices.  Internet, email tracking.  Telephone tracking.  Tracking employees outside the workplace.  Vehicle tracking (GPS).  Mobile phone tracking.
  • 13. Advantages of workplace surveillance  Increase productivity  Ensure workplace safety and security  Ensure implementing smoothly  Reducing exposure to liability risk  control the cost.  Eliminate leaking of confidential
  • 14. Disadvantages of workplace surveillance  Distrust and resentment.  High cost  Difficult to protect Employee privacy
  • 15. Where we use surveillance at workplace Practical examples from
  • 16. Examples from Logiwiz  Telephone calls Monitoring  E-Mail Monitoring  CCTV Monitoring
  • 17. Examples from Logiwiz - Cont  Web Browsing Limitations  Location Monitoring  Monthly Night work Roster
  • 18. Practical Issues of surveillance  Mass surveillance limited personal, social, political freedoms.  surveillance create in everyone a feeling of always being watched  Civil rights groups and privacy groups oppose surveillance as a violation of people's right to privacy.
  • 19. How HR Manager can intervene in surveillance Reduce conflicts Create Develop a HR awarenes Manager Surveillan s ce Policy Create a protective atmospher e