SlideShare a Scribd company logo
1 of 26
Workplace Privacy
Brief Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy Exercise ,[object Object]
Context of Discussion ,[object Object],[object Object]
Canadian Charter of  Rights and Freedoms ,[object Object],[object Object],[object Object],[object Object],[object Object],Department of Justice Canada. (1982).  Canadian Charter of Rights and Freedoms.  Retrieved February  22, 2008 from  http://laws.justice.gc.ca/en/charter/#libertes
Privacy Legislation ,[object Object]
Freedom of Information  and Protection of Privacy Act (FIPPA) ,[object Object],[object Object],[object Object],Information & Privacy Commissioner/Ontario. (2007).  A mini guide to the Freedom of Information  and Protection of Privacy Act.  Retrieved February 22, 2008, from  http://www.ipc.on.ca/images/Resources/up-1mini_p_e.pdf.
Municipal Freedom of Information and Protection of Privacy Act (MFIPPA) ,[object Object],[object Object],[object Object],[object Object],[object Object],Information & Privacy Commissioner/Ontario. (1998).  A mini guide to the Municipal Freedom of  Information and Protection of Privacy Act.  Retrieved February 22, 2008, from  http://www.ipc.on.ca/images/Resources/up-mini_m_e.pdf.
Privacy Protection ,[object Object],[object Object],[object Object],[object Object],[object Object],Information & Privacy Commissioner/Ontario. (2006).  Your privacy rights.  Retrieved February 22, 2008, from http://www.ipc.on.ca/index.asp?navid=12.
Privacy Decision Tree Turnbull, I. J. (Ed.) (2004).  Privacy in the workplace: The employment perspective.  Toronto: CCH Canadian.
CSA Model Code—  10 Privacy Principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Privacy and Libraries ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Government of Ontario.   (1990).  The public libraries act.  Retrieved February 26, 2008, from  http://www.e-laws.gov.on.ca/html/statutes/english/elaws_statutes_90p44_e.htm.
Case Studies ,[object Object],[object Object],[object Object],[object Object]
County of Brant Public Library Privacy Policies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],County of Brant Public Library Personnel Policy. Rev. September 20, 2005.
Toronto Public Library Privacy Policies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Toronto Public Library Access to Information and Protection of Privacy Policy. Rev. March 26, 2007
Current Issues ,[object Object],[object Object],[object Object]
Big Brother  is  Watching You ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Pfeffer, J. (2006).  It's time to start trusting the workforce.  Business 2.0 Magazine 7 (11).
Big Brother is Monitoring… ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Social Networking ,[object Object]
Web 2. Uh-Oh ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Information & Privacy Commissioner/Ontario. (2006).  Reference check: Is your boss watching? Privacy  and your Facebook profile.  Retrieved February 22, 2008, from http://www.ipc.on.ca.
Personal Searches ,[object Object],[object Object],[object Object],[object Object],Klein, K. & Gates, V. (2005).  Privacy in employment: Control of personal information in the workplace.  Toronto: Thomson Carswell.
Effect on Employees ,[object Object],[object Object],[object Object],[object Object],[object Object],Klein, K. & Gates, V. (2005).  Privacy in employment: Control of personal information in the workplace.  Toronto: Tomson Carswell.   Pfeffer, J. (2006).  It's time to start trusting the workforce.  Business 2.0 Magazine, 7 (11).
Do You Have to Tell? ,[object Object],[object Object],[object Object],[object Object],[object Object],Canadian Mental Health Association. (2007).  Mental health works: Talking to your employer.  Retrieved  February 21, 2008 from http://www.mentalhealthworks.ca/employees/talking_to_your_employer.asp
Consider Before Telling ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Canadian Mental Health Association. (2007).  Mental health works: Talking to your employer.  Retrieved  February 21, 2008 from http://www.mentalhealthworks.ca/employees/talking_to_your_employer.asp
Disclosing Information ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Information & Privacy Commissioner/Ontario. (2006).  Protecting your privacy.  Retrieved  February 22, 2008, from  http://www.ipc.on.ca/index.asp?navid=14.
Government Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

What's hot (20)

General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 
Trade secrets and conflicts of interest
Trade secrets and conflicts of interestTrade secrets and conflicts of interest
Trade secrets and conflicts of interest
 
Tietosuoja varhaiskasvatuksessa
Tietosuoja varhaiskasvatuksessaTietosuoja varhaiskasvatuksessa
Tietosuoja varhaiskasvatuksessa
 
18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands18 Tips for Data Classification - Data Sheet by Secure Islands
18 Tips for Data Classification - Data Sheet by Secure Islands
 
Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)Privacy and Data Protection Act 2014 (VIC)
Privacy and Data Protection Act 2014 (VIC)
 
Data Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPRData Privacy and Data Protection: Rotary’s Compliance with GDPR
Data Privacy and Data Protection: Rotary’s Compliance with GDPR
 
GDPR Presentation slides
GDPR Presentation slidesGDPR Presentation slides
GDPR Presentation slides
 
PDPA 2010 at office (HairulHafiz)
PDPA 2010 at office (HairulHafiz)PDPA 2010 at office (HairulHafiz)
PDPA 2010 at office (HairulHafiz)
 
Personal Data Protection in Malaysia
Personal Data Protection in MalaysiaPersonal Data Protection in Malaysia
Personal Data Protection in Malaysia
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Records Retention And Destruction Policies
Records Retention And Destruction PoliciesRecords Retention And Destruction Policies
Records Retention And Destruction Policies
 
GDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection RegulationGDPR Basics - General Data Protection Regulation
GDPR Basics - General Data Protection Regulation
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Whistle blowing
Whistle blowingWhistle blowing
Whistle blowing
 
Data Privacy in India and data theft
Data Privacy in India and data theftData Privacy in India and data theft
Data Privacy in India and data theft
 
Human resources: protecting confidentiality
Human resources: protecting confidentiality Human resources: protecting confidentiality
Human resources: protecting confidentiality
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 

Viewers also liked

Is employer monitoring of employee email justified
Is employer monitoring of employee email justifiedIs employer monitoring of employee email justified
Is employer monitoring of employee email justified
Parker Donat
 
A Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer PrivacyA Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer Privacy
Aurélie Pols
 
Desjardins5e ppt ch6
Desjardins5e ppt ch6Desjardins5e ppt ch6
Desjardins5e ppt ch6
oudesign
 

Viewers also liked (20)

Workplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and MethodsWorkplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and Methods
 
Employees Privacy Issues and Legal Rights
Employees Privacy Issues and Legal RightsEmployees Privacy Issues and Legal Rights
Employees Privacy Issues and Legal Rights
 
Is employer monitoring of employee email justified
Is employer monitoring of employee email justifiedIs employer monitoring of employee email justified
Is employer monitoring of employee email justified
 
Employee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the LawEmployee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the Law
 
Data Privacy Rights @ Workplace - Balancing Employer Interests v. Employee Ri...
Data Privacy Rights @ Workplace - Balancing Employer Interests v. Employee Ri...Data Privacy Rights @ Workplace - Balancing Employer Interests v. Employee Ri...
Data Privacy Rights @ Workplace - Balancing Employer Interests v. Employee Ri...
 
A Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer PrivacyA Framework of Purpose and Consent for Data Security and Consumer Privacy
A Framework of Purpose and Consent for Data Security and Consumer Privacy
 
Privacy in the Work Place
Privacy in the Work PlacePrivacy in the Work Place
Privacy in the Work Place
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do not
 
Development and implementation of hris
Development and implementation of hrisDevelopment and implementation of hris
Development and implementation of hris
 
Information from Jack Tuckner about Workplace Rights
Information from Jack Tuckner about Workplace RightsInformation from Jack Tuckner about Workplace Rights
Information from Jack Tuckner about Workplace Rights
 
DESIGNING A HR PORTAL
DESIGNING A HR PORTALDESIGNING A HR PORTAL
DESIGNING A HR PORTAL
 
IT Security Strategy
IT Security StrategyIT Security Strategy
IT Security Strategy
 
7 legal issues in employee selection
7 legal issues in employee selection7 legal issues in employee selection
7 legal issues in employee selection
 
QLD EILS Seminar: Emerging Issues in Workplace Privacy
QLD EILS Seminar: Emerging Issues in Workplace PrivacyQLD EILS Seminar: Emerging Issues in Workplace Privacy
QLD EILS Seminar: Emerging Issues in Workplace Privacy
 
Seminar Hacking & Security Analysis
Seminar Hacking & Security AnalysisSeminar Hacking & Security Analysis
Seminar Hacking & Security Analysis
 
Desjardins5e ppt ch6
Desjardins5e ppt ch6Desjardins5e ppt ch6
Desjardins5e ppt ch6
 
Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title) Big Data, Security Intelligence, (And Why I Hate This Title)
Big Data, Security Intelligence, (And Why I Hate This Title)
 
“Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation “Privacy Today” Slide Presentation
“Privacy Today” Slide Presentation
 
Information Security Benchmarking 2015
Information Security Benchmarking 2015Information Security Benchmarking 2015
Information Security Benchmarking 2015
 
Surveillance
SurveillanceSurveillance
Surveillance
 

Similar to Workplace Privacy Presentation

Bus ethics and tech
Bus ethics and techBus ethics and tech
Bus ethics and tech
wtidwell
 
Final gygax training module_ attempt 2
Final gygax training module_ attempt 2Final gygax training module_ attempt 2
Final gygax training module_ attempt 2
Elspeth Gygax
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .
ClinosolIndia
 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009
canadianlawyer
 
InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework
lauricesatu
 

Similar to Workplace Privacy Presentation (20)

The Information that You Gather: Application of Ethics & Privacy in Fundraising
The Information that You Gather: Application of Ethics & Privacy in FundraisingThe Information that You Gather: Application of Ethics & Privacy in Fundraising
The Information that You Gather: Application of Ethics & Privacy in Fundraising
 
Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)Data Protection Act 1998 (amended 2000)
Data Protection Act 1998 (amended 2000)
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 Privacy
 
Review questions
Review questionsReview questions
Review questions
 
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and RequirementsPrivacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
Privacy Practice Fundamentals: Understanding Compliance Regimes and Requirements
 
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
Privacy Best Practices for Lawyers: What Every Law Practice Needs to Know Abo...
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Bus ethics and tech
Bus ethics and techBus ethics and tech
Bus ethics and tech
 
Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...Legal Perspective on Information Management “New Social Media – The New Recor...
Legal Perspective on Information Management “New Social Media – The New Recor...
 
Privacy & Data Ethics
Privacy & Data EthicsPrivacy & Data Ethics
Privacy & Data Ethics
 
4514611.ppt
4514611.ppt4514611.ppt
4514611.ppt
 
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...Introduction to US Privacy and Data Security Regulations and Requirements (Se...
Introduction to US Privacy and Data Security Regulations and Requirements (Se...
 
Final gygax training module_ attempt 2
Final gygax training module_ attempt 2Final gygax training module_ attempt 2
Final gygax training module_ attempt 2
 
Data Privacy and consent management .. .
Data Privacy and consent management  ..  .Data Privacy and consent management  ..  .
Data Privacy and consent management .. .
 
Data privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptxData privacy and consent management (K.sailaja).pptx
Data privacy and consent management (K.sailaja).pptx
 
Privacy Breaches In Canada It.Can May 1 2009
Privacy Breaches In Canada   It.Can May 1 2009Privacy Breaches In Canada   It.Can May 1 2009
Privacy Breaches In Canada It.Can May 1 2009
 
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdfCOSC372572 Topic1 Lect1-3 (ch04)_white.pdf
COSC372572 Topic1 Lect1-3 (ch04)_white.pdf
 
Protecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to KnowProtecting ePHI: What Providers and Business Associates Need to Know
Protecting ePHI: What Providers and Business Associates Need to Know
 
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
[Title Redacted for Privacy Purposes]: How Internal Audit Can Help Drive Priv...
 
InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Workplace Privacy Presentation

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10. Privacy Decision Tree Turnbull, I. J. (Ed.) (2004). Privacy in the workplace: The employment perspective. Toronto: CCH Canadian.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.