SlideShare una empresa de Scribd logo
1 de 10
MONITORING EMPLOYEE’S E-MAILS Sigrid, Jane
We are going to talk about... ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is monitoring? ,[object Object],[object Object],[object Object],[object Object]
E-mails and monitoring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reasons for monitoring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reasons for monitoring
Inappropriate Web surfing
Negative sides of monitoring ,[object Object],[object Object],[object Object]
Conclusion ,[object Object]
Thank you for listening!

Más contenido relacionado

La actualidad más candente

legalworkspace-infographic 0116
legalworkspace-infographic 0116legalworkspace-infographic 0116
legalworkspace-infographic 0116
Melissa Ek
 

La actualidad más candente (6)

legalworkspace-infographic 0116
legalworkspace-infographic 0116legalworkspace-infographic 0116
legalworkspace-infographic 0116
 
AWWAWCEnv1102.009
AWWAWCEnv1102.009AWWAWCEnv1102.009
AWWAWCEnv1102.009
 
Mobile app security
Mobile app securityMobile app security
Mobile app security
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdf
 
A Guide to Employee Computer Tracking
A Guide to Employee Computer TrackingA Guide to Employee Computer Tracking
A Guide to Employee Computer Tracking
 
Where You'll Find Today's Top Malware
Where You'll Find Today's Top MalwareWhere You'll Find Today's Top Malware
Where You'll Find Today's Top Malware
 

Destacado

Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
adrigee12
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
Amandeep Kaur
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
koolkampus
 

Destacado (10)

Security as Code
Security as CodeSecurity as Code
Security as Code
 
Email Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mailEmail Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mail
 
Encryption
EncryptionEncryption
Encryption
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
E commerce
E commerceE commerce
E commerce
 
Network Effects
Network EffectsNetwork Effects
Network Effects
 

Similar a Monitoring Employee`S E Mails

Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
Sampath
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docx
arnoldmeredith47041
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
musicalworld14
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
ecommerce
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
UMaine
 
Investigating computer system abuse power point final
Investigating computer system abuse power point finalInvestigating computer system abuse power point final
Investigating computer system abuse power point final
Dan Michaluk
 

Similar a Monitoring Employee`S E Mails (20)

Workplace Surveillance
Workplace SurveillanceWorkplace Surveillance
Workplace Surveillance
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docx
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Cyber fraud and Security - What risks does family office's face in today's wo...
Cyber fraud and Security - What risks does family office's face intoday's wo...Cyber fraud and Security - What risks does family office's face intoday's wo...
Cyber fraud and Security - What risks does family office's face in today's wo...
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Investigating computer system abuse power point final
Investigating computer system abuse power point finalInvestigating computer system abuse power point final
Investigating computer system abuse power point final
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
How to keep printing processes GDPR compliant
How to keep printing processes GDPR compliantHow to keep printing processes GDPR compliant
How to keep printing processes GDPR compliant
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of Mind
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Logfiles? GDPR Says YES!
Logfiles? GDPR Says YES!Logfiles? GDPR Says YES!
Logfiles? GDPR Says YES!
 
Frankston
FrankstonFrankston
Frankston
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 

Más de rsoosaar

Oh, he saw it coming!
Oh, he saw it coming!Oh, he saw it coming!
Oh, he saw it coming!
rsoosaar
 
The euro zone`s debt crisis
The euro zone`s debt crisisThe euro zone`s debt crisis
The euro zone`s debt crisis
rsoosaar
 
Marketing in a weak economy
Marketing in a weak economyMarketing in a weak economy
Marketing in a weak economy
rsoosaar
 
Is today's economic crisis another great depression
Is today's economic crisis another great depressionIs today's economic crisis another great depression
Is today's economic crisis another great depression
rsoosaar
 
Hope at last
Hope at lastHope at last
Hope at last
rsoosaar
 
Enterprise
EnterpriseEnterprise
Enterprise
rsoosaar
 
Commercial property blues
Commercial property bluesCommercial property blues
Commercial property blues
rsoosaar
 
Baltic countries are fighting for euro
Baltic countries are fighting for euroBaltic countries are fighting for euro
Baltic countries are fighting for euro
rsoosaar
 
Unemployment in spain
Unemployment in spainUnemployment in spain
Unemployment in spain
rsoosaar
 
Volcanic fallout
Volcanic falloutVolcanic fallout
Volcanic fallout
rsoosaar
 
Hidden costs of climate change in us
Hidden costs of climate change in usHidden costs of climate change in us
Hidden costs of climate change in us
rsoosaar
 
Don't miss the tech stock revival
Don't miss the tech stock revivalDon't miss the tech stock revival
Don't miss the tech stock revival
rsoosaar
 
Bailing out greece
Bailing out greeceBailing out greece
Bailing out greece
rsoosaar
 
The 10 most expensive homes in the world
The 10 most expensive homes in the worldThe 10 most expensive homes in the world
The 10 most expensive homes in the world
rsoosaar
 
Protecting your portfolio from deflation
Protecting your portfolio from deflationProtecting your portfolio from deflation
Protecting your portfolio from deflation
rsoosaar
 
China's overheating economy
China's overheating economyChina's overheating economy
China's overheating economy
rsoosaar
 
Courageous leadership aadam kurm_ep1
Courageous leadership aadam kurm_ep1Courageous leadership aadam kurm_ep1
Courageous leadership aadam kurm_ep1
rsoosaar
 
Employee engagement
Employee engagementEmployee engagement
Employee engagement
rsoosaar
 
Export or die
Export or dieExport or die
Export or die
rsoosaar
 
Learning lessons of latvia's losses
Learning lessons of latvia's lossesLearning lessons of latvia's losses
Learning lessons of latvia's losses
rsoosaar
 

Más de rsoosaar (20)

Oh, he saw it coming!
Oh, he saw it coming!Oh, he saw it coming!
Oh, he saw it coming!
 
The euro zone`s debt crisis
The euro zone`s debt crisisThe euro zone`s debt crisis
The euro zone`s debt crisis
 
Marketing in a weak economy
Marketing in a weak economyMarketing in a weak economy
Marketing in a weak economy
 
Is today's economic crisis another great depression
Is today's economic crisis another great depressionIs today's economic crisis another great depression
Is today's economic crisis another great depression
 
Hope at last
Hope at lastHope at last
Hope at last
 
Enterprise
EnterpriseEnterprise
Enterprise
 
Commercial property blues
Commercial property bluesCommercial property blues
Commercial property blues
 
Baltic countries are fighting for euro
Baltic countries are fighting for euroBaltic countries are fighting for euro
Baltic countries are fighting for euro
 
Unemployment in spain
Unemployment in spainUnemployment in spain
Unemployment in spain
 
Volcanic fallout
Volcanic falloutVolcanic fallout
Volcanic fallout
 
Hidden costs of climate change in us
Hidden costs of climate change in usHidden costs of climate change in us
Hidden costs of climate change in us
 
Don't miss the tech stock revival
Don't miss the tech stock revivalDon't miss the tech stock revival
Don't miss the tech stock revival
 
Bailing out greece
Bailing out greeceBailing out greece
Bailing out greece
 
The 10 most expensive homes in the world
The 10 most expensive homes in the worldThe 10 most expensive homes in the world
The 10 most expensive homes in the world
 
Protecting your portfolio from deflation
Protecting your portfolio from deflationProtecting your portfolio from deflation
Protecting your portfolio from deflation
 
China's overheating economy
China's overheating economyChina's overheating economy
China's overheating economy
 
Courageous leadership aadam kurm_ep1
Courageous leadership aadam kurm_ep1Courageous leadership aadam kurm_ep1
Courageous leadership aadam kurm_ep1
 
Employee engagement
Employee engagementEmployee engagement
Employee engagement
 
Export or die
Export or dieExport or die
Export or die
 
Learning lessons of latvia's losses
Learning lessons of latvia's lossesLearning lessons of latvia's losses
Learning lessons of latvia's losses
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Monitoring Employee`S E Mails

Notas del editor

  1. The Economist Online – February 12th 2010
  2. The presentation lasts about... We are going to talk about...
  3. the act of observing something The act of listening, carrying out surveillance on, and/or recording of enemy emissions for intelligence purposes.
  4. Employee use of electronic mail (e-mail) during business hours is a common characteristic of the 21st century American workplace. According to a recent study, over 130 million workers are currently flooding recipients with 2.8 billion e-mail messages each day.1 Employers provide e-mail services to their employees as an efficient means of facilitating both intra-company communication and communication with the outside client base.2 E-mail serves to increase the efficiency of today's workplace because it is inexpensive to provide, simple to install and easy to use.3 E-mail usage also dramatically decreases the use of office-related, paper-based correspondence. However, despite these efficiencies, this technological advancement is also creating collateral problems concerning issues of employee privacy that today's legal environment appears unprepared to solve. This inadequacy in the law is primarily based on the fact that many employees do not know the extent of their privacy rights regarding their company-provided e-mail accounts. In fact, many employees operate under the false assumption that personal e-mail messages sent from work are protected from their employer's scrutiny.
  5. 1. Maintaining the company's professional reputation and image; 2. Maintaining employee productivity; 3. Preventing and discouraging sexual or other illegal workplace harassment; 4. Preventing "cyberstalking" by employees; 5. Preventing possible defamation liability (kohustuste laimamine); 6. Preventing employee disclosure of trade secrets and other confidential information; and 7. Avoiding copyright and other intellectual property infringement from employees illegally downloading software, etc.8
  6. To motivate compliance with rules and policies, more than one fourth of employers have fired workers for misusing e-mail and nearly one third have fired employees for misusing the Internet. The 28% of employers who have fired workers for e-mail misuse did so for the following reasons: violation of any company policy (64%); inappropriate or offensive language (62%); excessive personal use (26%); breach of confidentiality rules (22%); other (12%). The 30% of bosses who have fired workers for Internet misuse cite the following reasons: viewing, downloading, or uploading inappropriate/offensive content (84%); excessive personal use (34%); other (9%).
  7. Employers are primarily concerned about inappropriate Web surfing, with 66% monitoring Internet connections. Fully 65% of companies use software to block connections to inappropriate Websites—a 27% increase since 2001 when AMA/ePolicy Institute first surveyed electronic monitoring and surveillance policies and procedures. Employers who block access to the Web are concerned about employees visiting adult sites with sexual, romantic, or pornographic content (96%); game sites (61%); social networking sites (50%); entertainment sites (40%); shopping/auction sites (27%); and sports sites (21%). In addition, companies use URL blocks to stop employees from visiting external blogs (18%).
  8. Hard to make the difference between personal and bussiness information.