By Frederick S. Lane III
"Most humans will be startled to grasp the various ways that their employers are in a position to intruding on privateness. large technological advances are gradually shrinking staff' own house, and it truly is as much as contributors to grasp which components in their day-by-day lives might fall less than the company magnifying glass. firms have the potential to observe e-mails, mobile conversations, and web-surfing, yet that isn't all...Among different issues, video surveillance, GPS monitoring of corporation autos, or even using infrared badges to figure out worker place are equipment that experience come into play within the office. From more and more intrusive hiring practices to non-stop info accumulating, "The bare worker" takes a probing examine the connection among businesses and their staff, and examines the social, criminal, and ethical implications of varied varieties of worker tracking. Measuring the rights of the person opposed to the wishes of the association, this well timed ebook investigates the very important privateness questions dealing with each employee.
"The bare worker" is filled with eye-opening, occasionally surprising details in addition to transparent, concise factors of proper laws and applied sciences. This well timed publication palms readers with the proof they should protect themselves opposed to the omnipresent company gaze."
Read Online or Download Naked Employee, The: How Technology Is Compromising Workplace Privacy PDF
Similar labor & industrial relations books
For 2 many years veteran photojournalist David Bacon has documented the connections among hard work, migration, and the worldwide economic climate. In unlawful humans Bacon explores the human aspect of globalization, exposing the numerous methods it uproots humans in Latin the US and Asia, riding them emigrate. whilst, U.
Cornelius Grebe bargains an research of work-family reconciliation coverage in Germany in the course of the Socialdemocrat-Green coalition govt of 1998 to 2005. His emphasis lies on Anti-Discrimination coverage, Childcare coverage, Parental depart coverage, and dealing Time coverage. The learn combines a social constructionist stance with another feminist viewpoint, therefore supplying a brand new technique for political technology.
A UNC Press Enduring variation -- UNC Press Enduring variants use the newest in electronic expertise to make to be had back books from our individual backlist that have been formerly out of print. those versions are released unaltered from the unique, and are awarded in cheap paperback codecs, bringing readers either historic and cultural worth.
It is a replica of a publication released ahead of 1923. This e-book could have occasional imperfections resembling lacking or blurred pages, bad images, errant marks, and so on. that have been both a part of the unique artifact, or have been brought via the scanning approach. We think this paintings is culturally vital, and regardless of the imperfections, have elected to convey it again into print as a part of our carrying on with dedication to the maintenance of revealed works around the globe.
- Labor's Giant Step: The First Twenty Years of the CIO: 1936-55
- Negotiating Globally: How to Negotiate Deals, Resolve Disputes, and Make Decisions Across Cultural Boundaries (Jossey-Bass Business & Management)
- Small states in world markets : industrial policy in Europe
- Child labor: a world history companion
Additional resources for Naked Employee, The: How Technology Is Compromising Workplace Privacy
Knowing that your prospective employer will do a criminal background check on you might make you uncomfortable, but it’s hard to argue that Applying for a Job in a Digital and Wired World 35 it constitutes an invasion of privacy. In fact, most courts agree with the Massachusetts Supreme Judicial Court, which stated that ‘‘a convicted person has a low expectation of privacy in his identity by reason of the taking and storing of fingerprints, photographs, and other criminal records. . ’’10 While searching criminal records may not be an invasion of privacy, the potential impact of a positive response does raise an important public policy question.
Mitnick’s defenders, however, allege that he was the classic hacker—someone who broke into systems merely for the intellectual challenge of doing so, and not for economic gain. True hackers distinguish themselves from a ‘‘cracker,’’ defined as ‘‘[o]ne who breaks security on a system, a term coined ca. , The New Hacker’s Dictionary (Eric S. ] While acknowledging that Mitnick did not seek to profit from the material he copied from invaded systems, prosecutors nonetheless argued that Mitnick’s activities diminished the value of the material he copied and made it easier for others to steal and sell the confidential material.
Overall, the Occupational Safety & Health Administration (OSHA) reported that in 2000, 674 workplace homicides occurred, and in 1999, violent (but nonfatal) assaults occurred 16,664 times. Put another way, during an average five-day workweek, nearly thirteen people are killed and roughly 320 are attacked at work. Needless to say, employers have an interest in doing everything they can to minimize workplace violence. Apart from the pain and suffering that workplace violence causes, companies face significant liability issues arising from on-the-job attacks.