by: andrew dahlinger, ben wenker, and travis weisenborn

16
By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

Upload: calvin-york

Post on 24-Dec-2015

222 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

Page 2: By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

Web Watcher Spector Pro Spy Agent Pc Pandora

http://top-monitoring-software.com/

Page 3: By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn
Page 4: By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn
Page 5: By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

•Key Stroke Monitoring

•Time Stamped

•Internet Connection

•HTTP, FTP, SMTP, POP3, TCP/UDP, IP, &

Messaging.

•Application Monitoring

Page 6: By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

•Remote Surveillance•More restrictive

•E-mail Forwarding

•Interception of Messages

•SMTP, POP3

•Filter/Block Content

•Remote freeze/lock up

Page 7: By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

Based on an American Management Association survey 75% of companies monitor website surfing.

50 % retain and review emails 30% track keystrokes 80% of employers disclose their monitoring policies

to their employees.

Page 8: By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

In 1990 an employee (Lori Eaton) of Nissan was conducting a training session demonstrating the use of their email system.

Lori Eaton randomly selected an email to show how it worked, and the Email that was viewed was of an employee named Burke. This email contained personal, sexual nature dialogue and not business related.

Eaton Reported the Incident to her supervisor who then with managements authorization reviewed the Email messages for the entire workgroup. Nissan found a substantial amount of emails that

contained many sexual messages between Bourke and Hall.

Page 9: By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

Nissan issued warnings for use of it’s computer systems for personal use. Bourke was eventually fired and sued Nissan Corporation on the following grounds:

– Common Law Invasion of Privacy– Violation of Constitutional Right to Privacy– Violation of Criminal wiretapping and eavesdropping statutes – Wrongful Discharge in violation of public policy

Page 10: By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

The court ruled in favor of Nissan Motor Corporation based on two grounds:

– Based on the undisputed facts, plaintiffs had no reasonable expectations to privacy in their E-mail messages being sent on the company’s network and computers.

– Plaintiffs failed to submit a separate statement meeting the requirements of Code of Civil Procedure section 437c.

Page 11: By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

Coverage for both public and private sector employees. That employees should have notice of data collection processes. That data should be collected and used lawfully and fairly. That employers should collect the minimum necessary data required for employment. That data should only be collected from the employee, absent consent. That data should only be used for reasons directly relevant to employment, and only for

the purposes for which the data were originally collected. That data should be held securely. That workers should have access to data. That data should not be transferred to third parties absent consent or to comply with a

legal requirement. That workers cannot waive their privacy rights. That medical data is confidential. That certain data, such as sex life and political and religious beliefs, should not be

collected. That certain collection techniques, such as polygraph testing, should be prohibited.

Page 12: By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

• High stress levels • Low employee morale • Depression • Other nervous disorders• Loss of trust• Low productivity• More sick days• Low self respect -These problems lead to loss of revenue

and efficiency in the workplace

Page 13: By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

Economic Loss

Employees being denied the right to conduct a few personal matters at work often leave early to take care of them

Managers and supervisors that spend more time monitoring employees are cutting back on their own efficiency and productivity

Less time working means less revenue

Page 14: By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

"Employees are autonomous moral agents. Among other things, that means they have independent moral status defined by some set of rights, not the least of which is the right NOT to be used by others only as a means to increase overall welfare or profits. If a boss were to monitor every conversation or move, most of us would think of such an environment as more like a prison than a humane workplace.”

SCU professor of philosophy Michael J. Meyer on privacy

Page 15: By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

Professor William Parent-points for determining whether an invasion of privacy is justifiable

1. For what purpose is the undocumented personal knowledge sought?

2. Is this purpose a legitimate and important one? 3. Is the knowledge sought through invasion of privacy

relevant to its justifying purpose? 4. Is invasion of privacy the only or the least offensive

means of obtaining the knowledge? 5. What restrictions or procedural restraints have been

placed on the privacy-invading techniques? 6. How will the personal knowledge be protected once

it has been acquired?

Page 16: By: Andrew Dahlinger, Ben Wenker, and Travis Weisenborn

News report: Workplace Privacy