SlideShare a Scribd company logo
1 of 20
You Are Being Watched

          Surveillance at
            workplace
General principles for surveillance
 policies

1. Openness
2. Consent
3. Consultation
4. Private spaces
5. Proportionality
Types of surveillance

  Overt surveillance

  Covert Surveillance
Methods of Surveillance

Telephone surveillance


 Telephone tapping



 Video facility



 To collect location data
Biometric surveillance


Technologies that measure and analyze human
  physical and/or behavioral characteristics for
  authentication, identification, or screening purposes.
 physical characteristics -fingerprints, DNA
 behavioral characteristics - a person's manner of
  walking or voice
Corporate surveillance

Monitoring of activities within a business or within the
        industry associated with that business.
  Monitoring of a person or group's behavior by a
                       corporation
Methods of Surveillance

 Internet Surveillance


        This surveillance monitor the employee internet
 activities. For this most of companies use spy ware
 & cookies.
 Video Surveillance


 Through this surveillance monitor the employee
  workplace activities.
In here video cameras connecting
With recording device use. There are
Many uses of these surveillance.
 Computer Surveillance


             This surveillance monitor the data and e
 maila through a softwares such as the FBI's Magic
 Lantern and CIPAV.
There are uses of this surveillance such as,
 Preventing excessive personal use of
 computers, Protecting security of computer
 system from external threats,Blocking Spam e-
 mails.
The way in which Workplace Surveillance is
regulated.

 Sri Lankan Situation.


 Regulations in other countries.
   ‘Workplace video surveillance Act’ 1998
    in New South Wales.
   ‘Workplace Privacy Act’ 2011 in
    Australia.

 Regulatory requirements.
 Covert Surveillance.
   Reasonable suspicion.
   Unlawful Activity.
   Should exclude the areas where there is a heightened
   expectation of privacy (rest rooms, wash rooms, bed
   rooms etc.)


 Violation of the rules in the act by an employer is a
 ‘Criminal Offence’
 Tracking employees inside the workplace.
   Access cards.
   Optical surveillance devices.
   Internet, email tracking.
   Telephone tracking.


 Tracking employees outside the workplace.
   Vehicle tracking (GPS).
   Mobile phone tracking.
Advantages of workplace
    surveillance
 Increase productivity
 Ensure workplace safety and security
 Ensure implementing smoothly
 Reducing exposure to liability risk
 control the cost.
 Eliminate leaking of confidential
Disadvantages of workplace
surveillance

 Distrust and resentment.

 High cost
 Difficult to protect Employee privacy
Where we use surveillance at
workplace


Practical examples from
Examples from Logiwiz
 Telephone calls Monitoring




 E-Mail Monitoring




 CCTV Monitoring
Examples from Logiwiz - Cont
 Web Browsing Limitations



 Location Monitoring



 Monthly Night work Roster
Practical Issues of surveillance
 Mass surveillance limited personal, social, political
  freedoms.
 surveillance create in everyone a feeling of always
  being watched
 Civil rights groups and privacy groups oppose
  surveillance as a violation of people's right to
  privacy.
How HR Manager can intervene in surveillance


                   Reduce
                   conflicts



        Create                 Develop a
                      HR
       awarenes     Manager    Surveillan
          s                    ce Policy


                   Create a
                  protective
                  atmospher
                      e
Thank You

More Related Content

What's hot

VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
 
Unit v: Cyber Safety Mechanism
Unit v: Cyber Safety MechanismUnit v: Cyber Safety Mechanism
Unit v: Cyber Safety MechanismArnav Chowdhury
 
Safeguardsintheworkplace
SafeguardsintheworkplaceSafeguardsintheworkplace
SafeguardsintheworkplaceAdam Richards
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template Demand Metric
 
Information Security
Information SecurityInformation Security
Information Securitysteffiann88
 
Sms compliance white paper for mobile communications
Sms compliance white paper for mobile communicationsSms compliance white paper for mobile communications
Sms compliance white paper for mobile communicationsTextGuard
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issuesDhani Ahmad
 
Ramamurthy Security Manager1
Ramamurthy Security Manager1Ramamurthy Security Manager1
Ramamurthy Security Manager1rama Murthy
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And ComplianceOracle
 
Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Napier University
 
Ramamurthy security manager1
Ramamurthy security manager1Ramamurthy security manager1
Ramamurthy security manager1Rama Murthy
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systemsOmid Aminzadeh Gohari
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Armstrong Teasdale
 

What's hot (20)

Ethiopia reba paper
Ethiopia reba paperEthiopia reba paper
Ethiopia reba paper
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Byod
ByodByod
Byod
 
Unit v: Cyber Safety Mechanism
Unit v: Cyber Safety MechanismUnit v: Cyber Safety Mechanism
Unit v: Cyber Safety Mechanism
 
Safeguardsintheworkplace
SafeguardsintheworkplaceSafeguardsintheworkplace
Safeguardsintheworkplace
 
Mobile Device Policy Template
Mobile Device Policy Template Mobile Device Policy Template
Mobile Device Policy Template
 
Information Security
Information SecurityInformation Security
Information Security
 
Sms compliance white paper for mobile communications
Sms compliance white paper for mobile communicationsSms compliance white paper for mobile communications
Sms compliance white paper for mobile communications
 
Legal, ethical & professional issues
Legal, ethical & professional issuesLegal, ethical & professional issues
Legal, ethical & professional issues
 
New CIO Challenges
New CIO ChallengesNew CIO Challenges
New CIO Challenges
 
Chapter 8 securing information systems MIS
Chapter 8 securing information systems MISChapter 8 securing information systems MIS
Chapter 8 securing information systems MIS
 
needforsecurity
needforsecurityneedforsecurity
needforsecurity
 
Ramamurthy Security Manager1
Ramamurthy Security Manager1Ramamurthy Security Manager1
Ramamurthy Security Manager1
 
Best Practice For Public Sector Information Security And Compliance
Best  Practice For  Public  Sector    Information  Security And  ComplianceBest  Practice For  Public  Sector    Information  Security And  Compliance
Best Practice For Public Sector Information Security And Compliance
 
Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?Data Loss: Derelication of Duties?
Data Loss: Derelication of Duties?
 
Ramamurthy security manager1
Ramamurthy security manager1Ramamurthy security manager1
Ramamurthy security manager1
 
Ethics and information security 2
Ethics and information security 2Ethics and information security 2
Ethics and information security 2
 
Session#7; securing information systems
Session#7;  securing information systemsSession#7;  securing information systems
Session#7; securing information systems
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
 

Similar to Workplace Surveilance

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfEnov8
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?PECB
 
Whistleblower presentation
Whistleblower presentationWhistleblower presentation
Whistleblower presentationMustapha Mugisa
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docxambersalomon88660
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...cyberprosocial
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf503SaranyaS
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Knowmapletronics
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR prioritiesAlberto Canadè
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxinfosec train
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsForcepoint LLC
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxmusicalworld14
 

Similar to Workplace Surveilance (20)

Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Article - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdfArticle - 10 best data compliance practices .pdf
Article - 10 best data compliance practices .pdf
 
Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?Digital Forensics 101 – How is it used to protect an Organization’s Data?
Digital Forensics 101 – How is it used to protect an Organization’s Data?
 
Whistleblower presentation
Whistleblower presentationWhistleblower presentation
Whistleblower presentation
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
UK Legal Framework (2003)
UK Legal Framework (2003)UK Legal Framework (2003)
UK Legal Framework (2003)
 
Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?Need for Data Protection Training - How E-learning Can Help?
Need for Data Protection Training - How E-learning Can Help?
 
Security policy.pdf
Security policy.pdfSecurity policy.pdf
Security policy.pdf
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
STUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdfSTUCOR_CS8792-LL.pdf
STUCOR_CS8792-LL.pdf
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Setting the right GDPR priorities
Setting the right GDPR prioritiesSetting the right GDPR priorities
Setting the right GDPR priorities
 
Top 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptxTop 10 Measure to Mitigate Insider Security Threats.pptx
Top 10 Measure to Mitigate Insider Security Threats.pptx
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Addressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider ThreatsAddressing Future Risks and Legal Challenges of Insider Threats
Addressing Future Risks and Legal Challenges of Insider Threats
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 

More from Sampath

Professional Judgment and expertise in Auditing
Professional Judgment and expertise in AuditingProfessional Judgment and expertise in Auditing
Professional Judgment and expertise in AuditingSampath
 
TQM in HR
TQM in HRTQM in HR
TQM in HRSampath
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information SystemsSampath
 
Conflict management
Conflict managementConflict management
Conflict managementSampath
 
Hr audit
Hr auditHr audit
Hr auditSampath
 
Hr audit
Hr auditHr audit
Hr auditSampath
 
Human Resource Development.
Human Resource Development.Human Resource Development.
Human Resource Development.Sampath
 
Presentation team mgt
Presentation team mgtPresentation team mgt
Presentation team mgtSampath
 
Strategic+management+3
Strategic+management+3Strategic+management+3
Strategic+management+3Sampath
 
Strategic+management+2
Strategic+management+2Strategic+management+2
Strategic+management+2Sampath
 
Strategic strategic capabilitiies 2003
Strategic strategic capabilitiies 2003Strategic strategic capabilitiies 2003
Strategic strategic capabilitiies 2003Sampath
 
Strategic management 12
Strategic management 12Strategic management 12
Strategic management 12Sampath
 
Strategic management 8
Strategic management 8Strategic management 8
Strategic management 8Sampath
 
Led session4 presentation
Led session4 presentationLed session4 presentation
Led session4 presentationSampath
 
Ethics+lesson+2
Ethics+lesson+2Ethics+lesson+2
Ethics+lesson+2Sampath
 
Ethics lesson 4
Ethics lesson 4Ethics lesson 4
Ethics lesson 4Sampath
 
Ethics & stakeholders
Ethics & stakeholdersEthics & stakeholders
Ethics & stakeholdersSampath
 
Diversity management
Diversity managementDiversity management
Diversity managementSampath
 
Descriptive+strategic+management+process
Descriptive+strategic+management+processDescriptive+strategic+management+process
Descriptive+strategic+management+processSampath
 
Corporate+strategy
Corporate+strategyCorporate+strategy
Corporate+strategySampath
 

More from Sampath (20)

Professional Judgment and expertise in Auditing
Professional Judgment and expertise in AuditingProfessional Judgment and expertise in Auditing
Professional Judgment and expertise in Auditing
 
TQM in HR
TQM in HRTQM in HR
TQM in HR
 
Management Information Systems
Management Information SystemsManagement Information Systems
Management Information Systems
 
Conflict management
Conflict managementConflict management
Conflict management
 
Hr audit
Hr auditHr audit
Hr audit
 
Hr audit
Hr auditHr audit
Hr audit
 
Human Resource Development.
Human Resource Development.Human Resource Development.
Human Resource Development.
 
Presentation team mgt
Presentation team mgtPresentation team mgt
Presentation team mgt
 
Strategic+management+3
Strategic+management+3Strategic+management+3
Strategic+management+3
 
Strategic+management+2
Strategic+management+2Strategic+management+2
Strategic+management+2
 
Strategic strategic capabilitiies 2003
Strategic strategic capabilitiies 2003Strategic strategic capabilitiies 2003
Strategic strategic capabilitiies 2003
 
Strategic management 12
Strategic management 12Strategic management 12
Strategic management 12
 
Strategic management 8
Strategic management 8Strategic management 8
Strategic management 8
 
Led session4 presentation
Led session4 presentationLed session4 presentation
Led session4 presentation
 
Ethics+lesson+2
Ethics+lesson+2Ethics+lesson+2
Ethics+lesson+2
 
Ethics lesson 4
Ethics lesson 4Ethics lesson 4
Ethics lesson 4
 
Ethics & stakeholders
Ethics & stakeholdersEthics & stakeholders
Ethics & stakeholders
 
Diversity management
Diversity managementDiversity management
Diversity management
 
Descriptive+strategic+management+process
Descriptive+strategic+management+processDescriptive+strategic+management+process
Descriptive+strategic+management+process
 
Corporate+strategy
Corporate+strategyCorporate+strategy
Corporate+strategy
 

Workplace Surveilance

  • 1. You Are Being Watched Surveillance at workplace
  • 2. General principles for surveillance policies 1. Openness 2. Consent 3. Consultation 4. Private spaces 5. Proportionality
  • 3. Types of surveillance  Overt surveillance  Covert Surveillance
  • 4. Methods of Surveillance Telephone surveillance  Telephone tapping  Video facility  To collect location data
  • 5. Biometric surveillance Technologies that measure and analyze human physical and/or behavioral characteristics for authentication, identification, or screening purposes.  physical characteristics -fingerprints, DNA  behavioral characteristics - a person's manner of walking or voice
  • 6. Corporate surveillance Monitoring of activities within a business or within the industry associated with that business. Monitoring of a person or group's behavior by a corporation
  • 7. Methods of Surveillance  Internet Surveillance This surveillance monitor the employee internet activities. For this most of companies use spy ware & cookies.
  • 8.  Video Surveillance Through this surveillance monitor the employee workplace activities. In here video cameras connecting With recording device use. There are Many uses of these surveillance.
  • 9.  Computer Surveillance This surveillance monitor the data and e maila through a softwares such as the FBI's Magic Lantern and CIPAV. There are uses of this surveillance such as, Preventing excessive personal use of computers, Protecting security of computer system from external threats,Blocking Spam e- mails.
  • 10. The way in which Workplace Surveillance is regulated.  Sri Lankan Situation.  Regulations in other countries.  ‘Workplace video surveillance Act’ 1998 in New South Wales.  ‘Workplace Privacy Act’ 2011 in Australia.  Regulatory requirements.
  • 11.  Covert Surveillance.  Reasonable suspicion.  Unlawful Activity.  Should exclude the areas where there is a heightened expectation of privacy (rest rooms, wash rooms, bed rooms etc.)  Violation of the rules in the act by an employer is a ‘Criminal Offence’
  • 12.  Tracking employees inside the workplace.  Access cards.  Optical surveillance devices.  Internet, email tracking.  Telephone tracking.  Tracking employees outside the workplace.  Vehicle tracking (GPS).  Mobile phone tracking.
  • 13. Advantages of workplace surveillance  Increase productivity  Ensure workplace safety and security  Ensure implementing smoothly  Reducing exposure to liability risk  control the cost.  Eliminate leaking of confidential
  • 14. Disadvantages of workplace surveillance  Distrust and resentment.  High cost  Difficult to protect Employee privacy
  • 15. Where we use surveillance at workplace Practical examples from
  • 16. Examples from Logiwiz  Telephone calls Monitoring  E-Mail Monitoring  CCTV Monitoring
  • 17. Examples from Logiwiz - Cont  Web Browsing Limitations  Location Monitoring  Monthly Night work Roster
  • 18. Practical Issues of surveillance  Mass surveillance limited personal, social, political freedoms.  surveillance create in everyone a feeling of always being watched  Civil rights groups and privacy groups oppose surveillance as a violation of people's right to privacy.
  • 19. How HR Manager can intervene in surveillance Reduce conflicts Create Develop a HR awarenes Manager Surveillan s ce Policy Create a protective atmospher e