By Jeffrey M. Stanton
Read or Download The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust PDF
Similar human resources & personnel management books
Theres a becoming consensus that the present activity improvement systemboth within the US and overseas--is badly damaged. Too many of us cant locate sturdy jobs. Too many companies cant locate certified humans. Whats at the back of the deep expertise shortages that now confront the USA and lots more and plenty of the realm? and the way do we rebuild the pipeline?
This e-book is designed to provide these ideas and strategies for land appraisal that are acceptable to all constructing international locations. Examples of particular occasions within which those options were or should be followed are taken essentially from monsoonal and equatorial Asia. it really is during this area that the land/food/population challenge is so much acute.
Even if a firm has a Human assets division, likelihood is it will possibly take advantage of a few educated, useful and leading edge HR information. ''The every thing HR Kit'' paves the way in which for any corporation huge or small to lessen worker turnover, increase the standard of its humans, and luck absolutely deal with their functionality.
- Comportamiento humano en el trabajo
- Manufacturing the Employee: Management Knowledge from the 19th to 21st Centuries
- Primary Games: Experiential Learning Activities for Teaching Children K-8
- Mitarbeitergespräche führen: situativ, typgerecht und lösungsorientiert
- ACE the IT Resume: Resumes and Cover Letters to Get You Hired
Extra resources for The Visible Employee: Using Workplace Monitoring and Surveillance to Protect Information Assets-Without Compromising Employee Privacy or Trust
The most valuable information an organization possesses for improving organizational productivity is often the most valuable for competitors, regulatory bodies, and industrial spies. Every time an additional employee obtains access to a shared resource, that resource becomes somewhat more vulnerable to theft or attack as a result. While the majority of employees working in organizations are essentially honest individuals who are unlikely to destroy or steal firm resources for their own benefit, the success of a single transgressor in copying a customer list, chemical synthesis process, or patent application for the benefit of a competitor can have devastating effects on an organization.
We discuss authentication techniques in greater detail in Chapter 3. For now, keep in mind that authentication is a prerequisite step that then allows an information system to administer access control according to the rights assigned to a particular user. Access control is a rapidly developing area in computer and information sciences, but the actual practice of access control in organizations is still more of an art than a science. In fact, most information technology teams are so busy that careful, thoughtful, and timely management of access control is a dream left unfulfilled in favor of more pressing concerns.
The organization may be liable even if it has written policies against such activities, although documented evidence of well-enforced policies can help to mitigate this liability. On a closely related note, the company’s reputation may be soured in the public eye if employees are caught gambling, distributing hate speech, or engaging in any other activity that appears to run counter to the company’s mission and values. ”—it is unfortunately the case that across any large group of employees, a few will display poor judgment in a given situation.