Vetting and Monitoring Employees

Vetting and Monitoring Employees PDF Author: Gillian Howard
Publisher: Routledge
ISBN: 1351143387
Category : Business & Economics
Languages : en
Pages : 184

Get Book Here

Book Description
Most employers will at some time need to monitor, record and read e-mails sent and received by their staff, or check on their employees' use of the telephone and internet, or access business correspondence received at work but addressed to a member of staff. There may also be clear cases where covert surveillance either by video camera or private investigators is considered as a means to collect evidence of criminal activity on site. The law in this area is complex and, in some cases, contradictory. Gillian Howard aims to set out the law clearly and give practical guidance, both to employers as to their legal rights, and to employees as to what safeguards to their privacy the law gives them. She provides precedents and useful examples of policies and procedures for monitoring employees at work. Vetting staff before taking them into employment can be equally fraught with legal issues. The Data Protection Act 1998 requires employers to obtain explicit consent from an employee before seeking and using certain sensitive information. This book gives guidance in this difficult area of employment law with practical advice, precedents and policies, and details of legal interpretations of the law by the Courts and Employment Tribunals.

Vetting and Monitoring Employees

Vetting and Monitoring Employees PDF Author: Gillian Howard
Publisher: Routledge
ISBN: 1351143387
Category : Business & Economics
Languages : en
Pages : 184

Get Book Here

Book Description
Most employers will at some time need to monitor, record and read e-mails sent and received by their staff, or check on their employees' use of the telephone and internet, or access business correspondence received at work but addressed to a member of staff. There may also be clear cases where covert surveillance either by video camera or private investigators is considered as a means to collect evidence of criminal activity on site. The law in this area is complex and, in some cases, contradictory. Gillian Howard aims to set out the law clearly and give practical guidance, both to employers as to their legal rights, and to employees as to what safeguards to their privacy the law gives them. She provides precedents and useful examples of policies and procedures for monitoring employees at work. Vetting staff before taking them into employment can be equally fraught with legal issues. The Data Protection Act 1998 requires employers to obtain explicit consent from an employee before seeking and using certain sensitive information. This book gives guidance in this difficult area of employment law with practical advice, precedents and policies, and details of legal interpretations of the law by the Courts and Employment Tribunals.

Employee Surveillance

Employee Surveillance PDF Author: T. Pitt Payne
Publisher: Jordans Pub
ISBN: 9781846612596
Category : Law
Languages : en
Pages : 350

Get Book Here

Book Description
More details coming soon.

The Visible Employee

The Visible Employee PDF Author: Jeffrey M. Stanton
Publisher: Information Today, Inc.
ISBN: 9780910965743
Category : Business & Economics
Languages : en
Pages : 380

Get Book Here

Book Description
The misuse of an organization's information systems by employees, whether through error or by intent, can result in leaked and corrupted data, crippled networks, lost productivity, legal problems, and public embarrassment. As organizations turn to technology to monitor employee use of network resources, they are finding themselves at odds with workers who instinctively feel their privacy is being invaded. The Visible Employee reports the results of an extensive four-year research project, covering a range of security solutions for at-risk organizations as well as the perceptions and attitudes of employees toward monitoring and surveillance. The result is a wake-up call for business owners, managers, and IT staff, as well as an eye-opening dose of reality for employees.

Internet Searches for Vetting, Investigations, and Open-Source Intelligence

Internet Searches for Vetting, Investigations, and Open-Source Intelligence PDF Author: Edward J. Appel
Publisher: CRC Press
ISBN: 1439827524
Category : Business & Economics
Languages : en
Pages : 307

Get Book Here

Book Description
In the information age, it is critical that we understand the implications and exposure of the activities and data documented on the Internet. Improved efficiencies and the added capabilities of instant communication, high-speed connectivity to browsers, search engines, websites, databases, indexing, searching and analytical applications have made

Same But Different

Same But Different PDF Author: Intelligence and National Security Alliance. Insider Threat Subcommittee
Publisher:
ISBN:
Category : Employee screening
Languages : en
Pages : 13

Get Book Here

Book Description
Both government employees and contractors who require a security clearance are subject to comprehensive vetting and periodic reinvestigation or Continuous Evaluation (CE) of their behavior. Government policy requires both go through the same vetting and adjudication process. However, INSA has found two critical differences when it comes to how contractors and government employees are monitored on an ongoing basis (through continuous vetting (CV) or insider threat monitoring)

Information Theft Prevention

Information Theft Prevention PDF Author: Romanus Okeke
Publisher: Routledge
ISBN: 1317553705
Category : Business & Economics
Languages : en
Pages : 165

Get Book Here

Book Description
As retail businesses migrate to the digital realm, internal information theft incidents continue to threaten on-line and off-line retail operations. The evolving propagation of internal information theft has surpassed the traditional techniques of crime prevention practices. Many business organizations search for internal information theft prevention guides that fit into their retail business operation, only to be inundated with generic and theoretical models. This book examines applicable methods for retail businesses to effectively prevent internal information theft. Information Theft Prevention offers readers a comprehensive understanding of the current status of the retail sector information theft prevention models in relation to the internationally recognized benchmark of information security. It presents simple and effective management processes for ensuring better information system security, fostering a proactive approach to internal information theft prevention. Furthermore, it builds on well-defined retail business cases to identify applicable solutions for businesses today. Integrating the retail business operations and information system security practices, the book identifies ways to coordinate efforts across a business in order to achieve the best results. IT security managers and professionals, financial frauds consultants, cyber security professionals and crime prevention professionals will find this book a valuable resource for identifying and creating tools to prevent internal information theft.

Electronic Monitoring in the Workplace

Electronic Monitoring in the Workplace PDF Author: John Weckert
Publisher: IGI Global
ISBN: 9781591404569
Category : Business & Economics
Languages : en
Pages : 0

Get Book Here

Book Description
The use of online technologies has made extensive employee monitoring by employers expensive and easy. The rights of employers--and the rights of employees--are explored in this thoughtful book that contributes to the debate and points the way toward solutions. The contributors come from a variety of disciplines, countries, and cultures, and so bring a wide range of perspectives to the issues.

The Cambridge Handbook of Forensic Psychology

The Cambridge Handbook of Forensic Psychology PDF Author: Jennifer M. Brown
Publisher: Cambridge University Press
ISBN: 1139489453
Category : Psychology
Languages : en
Pages :

Get Book Here

Book Description
Forensic psychology has developed and extended from an original, narrow focus on presenting evidence to the courts to a wider application across the whole span of civil and criminal justice, which includes dealing with suspects, offenders, victims, witnesses, defendants, litigants and justice professionals. This Handbook provides an encyclopedic-style source regarding the major concerns in forensic psychology. It is an invaluable reference text for practitioners within community, special hospital, secure unit, prison, probation and law enforcement forensic settings, as well as being appropriate for trainees and students in these areas. It will also serve as a companion text for lawyers and psychiatric and law enforcement professionals who wish to be apprised of forensic psychology coverage. Each entry provides a succinct outline of the topic, describes current thinking, identifies relevant consensual or contested aspects and alternative positions. Readers are presented with key issues and directed towards specialized sources for further reference.

Cybervetting

Cybervetting PDF Author: Edward J. Appel
Publisher: CRC Press
ISBN: 1040083498
Category : Business & Economics
Languages : en
Pages : 326

Get Book Here

Book Description
Researching an individual‘s, firm‘s or brands online presence has become standard practice for many employers, investigators, and intelligence officers, including law enforcement. Countless companies and organizations are implementing their own policies, procedures, and practices for Internet investigations, cybervetting, and intelligence.

Social Media Listening and Monitoring for Business Applications

Social Media Listening and Monitoring for Business Applications PDF Author: Rao, N. Raghavendra
Publisher: IGI Global
ISBN: 1522508473
Category : Computers
Languages : en
Pages : 506

Get Book Here

Book Description
Social Media has transformed the ways in which individuals keep in touch with family and friends. Likewise, businesses have identified the profound opportunities present for customer engagement and understanding through the massive data available on social media channels, in addition to the customer reach of such sites. Social Media Listening and Monitoring for Business Applications explores research-based solutions for businesses of all types interested in an understanding of emerging concepts and technologies for engaging customers online. Providing insight into the currently available social media tools and practices for various business applications, this publication is an essential resource for business professionals, graduate-level students, technology developers, and researchers.