Download Free Privacy In The Workplace Book in PDF and EPUB Free Download. You can read online Privacy In The Workplace and write the review.

In recent years, new and more intrusive surveillance technology has found its way into workplaces. New medical tests provide detailed information about workers' biology that was previously unthinkable. An increasing number of employees work under camera surveillance. At the same time, computers allow for a detailed monitoring of our interactions with machines, and all this information can be electronically stored in an easily accessible format. What is happening in our workplaces? Has the trend towards more humane workplaces been broken? From an ethical point of view, which types and degrees of surveillance are acceptable, and which are not? From a policy point of view, what methods can be used to regulate the use of surveillance technology in workplaces? These are some of the questions that have driven the research reported in this book. Written by an interdisciplinary group of researchers in Computer Ethics, Medical Ethics and Moral Philosophy, this book provides a broad overview that covers both empirical and normative aspects of workplace privacy.
The misuse of an organization's information systems by employees, whether through error or by intent, can result in leaked and corrupted data, crippled networks, lost productivity, legal problems, and public embarrassment. As organizations turn to technology to monitor employee use of network resources, they are finding themselves at odds with workers who instinctively feel their privacy is being invaded. The Visible Employee reports the results of an extensive four-year research project, covering a range of security solutions for at-risk organizations as well as the perceptions and attitudes of employees toward monitoring and surveillance. The result is a wake-up call for business owners, managers, and IT staff, as well as an eye-opening dose of reality for employees.
Explores the social, legal, and moral implications of various types of employee monitoring, discussing the boundaries of employee privacy, the investigative and surveillance technologies used, how employers try to protect themselves, and what employees can do to ensure their own protection.
The transformational technologies of the Internet-Web compound continue to exert a vast and readily apparent influence on the way we live and work. In recent times, internet penetration is now very high in most parts of the world, impacting the context and content of the workplace and the boundary between work and private life is even more porous. Not only has the reach increased, but the technologies to access the Internet-Web have further evolved towards increasing portability. The hardware evolution from desktops to laptops to mobile technologies (phones, tablets, watches, eyeglasses) marches forward. The increasing mobility and 24/7 accessibility offers the opportune time to revisit the transformations occurring. Today the Internet consists of billions of digital devices, people, services and other physical objects with the potential to seamlessly connect, interact and exchange information about themselves and their environment. Organizations now use these digital devices and physical objects to produce and consume Internet-based services. This new Internet ecosystem is commonly referred to as the Internet of People, Things and Services (IoPTS). In this follow-up to their 2006 volume, Simmers & Anandarajan examine how The Internet of People, Things and Services (IoPTS) transforms our workplaces. Information and communications technology (ICT) expansion from desktops to laptops to ubiquitous smart objects that sense and communicate directly over the internet – the IoPTS - offers us the opportune time to revisit how the Internet transforms our workplaces.
Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information. Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.
An ILO code of practice
In 1967, Justice John Marshall Harlan introduced the litmus test of ‘a reasonable expectation of privacy’ in his concurring opinion in the US Supreme Court case of Katz v. United States. Privacy, regulations to protect privacy, and data protection have been legal and social issues in many Western countries for a number of decades. However, recent measures to combat terrorism, to fight crime, and to increase security, together with the growing social acceptance of privacy-invasive technologies can be considered a serious threat to the fundamental right to privacy. What is the purport of ‘reasonable expectations of privacy’? Reasonable expectations of privacy and the reality of data protection is the title of a research project being carried out by TILT, the Tilburg Institute for Law, Technology, and Society at Tilburg University, The Netherlands. The project is aimed at developing an international research network of privacy experts (professionals, academics, policymakers) and to carry out research on the practice, meaning, and legal performance of privacy and data protection in an international perspective. Part of the research project was to analyse the concept of privacy and the reality of data protection in case law, with video surveillance and workplace privacy as two focal points. The eleven country reports regarding case law on video surveillance and workplace privacy are the core of the present book. The conclusions drawn by the editors are intended to trigger and stimulate an international debate on the use and possible drawbacks of the ‘reasonable expectations of privacy’ concept. The editors are all affiliated to TILT – Tilburg Institute for Law, Technology, and Society, Tilburg University, The Netherlands. This is Volume 7 in the Information Technology and Law (IT&Law) Series
The internet is established in most households worldwide and used for entertainment purposes, shopping, social networking, business activities, banking, telemedicine, and more. As more individuals and businesses use this essential tool to connect with each other and consumers, more private data is exposed to criminals ready to exploit it for their gain. Thus, it is essential to continue discussions involving policies that regulate and monitor these activities, and anticipate new laws that should be implemented in order to protect users. Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications examines current internet and data protection laws and their impact on user experience and cybercrime, and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security and threats. Highlighting a range of topics such as online privacy and security, hacking, and online threat protection, this multi-volume book is ideally designed for IT specialists, administrators, policymakers, researchers, academicians, and upper-level students.
There is rising concern about the rights of employees, especially with respect to their rights to privacy. Contributes to the debate and will point the way toward some solutions.