Surveillance of Electronic Communications in the Workplace and the Protection of Employees' Privacy

Author(s):  
Ioannis Inglezakis

The use of Information and Communication Technologies in the workplace is constantly increasing, but also the use of surveillance technology. Electronic monitoring of employees becomes an integral part of information systems in the workplace. The specific software which is used for monitoring electronic communications is, however, intrusive and infringes upon the employees' right to privacy. The issue of surveillance of employees' electronic communications is subject to different approaches in various jurisdictions. The most comprehensive protection to employees is afforded in the EU, and it would be enhanced once the General Data Protection Regulation is passed.

2017 ◽  
pp. 971-986
Author(s):  
Ioannis Inglezakis

The use of Information and Communication Technologies in the workplace is constantly increasing, but also the use of surveillance technology. Electronic monitoring of employees becomes an integral part of information systems in the workplace. The specific software which is used for monitoring electronic communications is, however, intrusive and infringes upon the employees' right to privacy. The issue of surveillance of employees' electronic communications is subject to different approaches in various jurisdictions. The most comprehensive protection to employees is afforded in the EU, and it would be enhanced once the General Data Protection Regulation is passed.


Author(s):  
Ioannis Inglezakis

The use of Information and Communication Technologies in the workplace is constantly increasing, but also the use of surveillance technology. Electronic monitoring of employees becomes an integral part of information systems in the workplace. The specific software which is used for monitoring electronic communications is, however, intrusive and infringes upon the employees' right to privacy. The issue of surveillance of employees' electronic communications is subject to different approaches in various jurisdictions. The most comprehensive protection to employees is afforded in the EU, and it would be enhanced once the General Data Protection Regulation is passed.


Author(s):  
Ioannis Iglezakis

The use of Information and Communication Technologies in the workplace is constantly increasing, but also the use of surveillance technology. Electronic monitoring of employees becomes an integral part of information systems in the workplace. The specific software which is used for monitoring electronic communications is, however, intrusive and infringes upon the employees’ right to privacy. The issue of surveillance of employees’ electronic communications is subject to different approaches in various jurisdictions. The most comprehensive protection to employees is afforded in the EU, however, there are still ambiguities concerning the balancing of interests between employers and employees.


2020 ◽  
Author(s):  
Irene Kamara

In 2019, the Cybersecurity Act, the EU law aiming to achieve high level of cybersecurity in the Union and Member States, entered into force. The CSA belongs to a broader set of Union laws providing a framework of legal protection of individual and collective rights from harmful use of information and communication technologies. Those laws introduce private law instruments for the achievement of legislative goals.1 Despite the overarching similarities of the regulated fields, the Union legislator adopted seemingly different approaches in introducing private law instruments. The Chapter seeks to comparatively present the certification frameworks as introduced in the Cybersecurity Act and the General Protection Regulation, with the aim to provide an understanding on the legislative choices and the normative, implementation and policy reasons underpinning the introduction of private law instruments in Union laws.


Author(s):  
G. Golovko ◽  
M. Borozdin ◽  
Y. Tokar

This article highlights the need and importance of using an information system in the modern restaurant business. The nature of information systems and the tasks they can perform are presented. The direction of introduction of information and communication technologies and automation in management activity of restaurants is considered. The dependence of the efficiency of the food establishment on the correctly automated work process is determined. It has been proven that the use of information systems is a necessary condition for modern restaurants and contributes to the adoption of strategic management decisions to increase competitiveness and create an appropriate and efficient infrastructure.


Author(s):  
Rajeev Sharma ◽  
Atreyi Kankanhalli ◽  
Mahdieh Taher

The concept of democracy has a long tradition of research in the political science domain. In recent years, advances in Information and Communication Technologies (ICT) have provided opportunities for governments to deploy systems to actively engage citizens in the agenda-setting and decision-making processes for urban governance. Consequently, e-democracy and e-participation efforts have emerged and attracted researchers’ attention in the Information Systems (IS) field. Information systems lay the foundations of active citizenry, which may impact on the participation outcome. However, in order to maximize the potential of this evolving form of democracy, researchers and practitioners need to address a number of challenges in the design of participation structures for city governance. This chapter sets out to explore e-democracy systems and their impact on a number of e-participation outcomes. Outlining both promoters and barriers of ICT use for e-democracy, the authors also uncover gaps in the previous literature and identify an agenda for future research.


Author(s):  
Ugo Pagallo

The chapter examines how the information revolution impacts the field of data protection in a twofold way. On the one hand, the scale and amount of cross-border interaction taking place in cyberspace illustrate how the information revolution affects basic tenets of current legal frameworks, such as the idea of the law as a set of rules enforced through the menace of physical sanctions and matters of jurisdiction on the Internet. On the other hand, many impasses of today's legal systems on data protection, liability, and jurisdiction can properly be tackled by embedding normative constraints into information and communication technologies, as shown by the principle of privacy by design in such cases as information systems in hospitals, video surveillance networks in public transports, or smart cards for biometric identifiers. Normative safeguards and constitutional constraints can indeed be embedded in places and spaces, products and processes, so as to strengthen the rights of the individuals and widen the range of their choices. Although it is unlikely that “privacy by design” can offer the one-size-fits-all solution to the problems emerging in the field, it is plausible that the principle will be the key to understanding how today's data protection issues are being handled.


2011 ◽  
pp. 1-8 ◽  
Author(s):  
Yan Tian ◽  
Concetta Stewart

E-commerce or electronic commerce, also known as e-business, refers to the transaction of goods and services through electronic communications. Although the general public has become familiar with e-commerce only in the last decade or so, e-commerce has actually been around for over 30 years. There are two basic types of e-commerce: business-to-business (B2B) and business-to-consumer (B2C). In B2B, companies conduct business with their suppliers, distributors, and other partners through electronic networks. In B2C, companies sell products and services to consumers. Although B2C is the better known to the general public, B2B is the form that actually dominates e-commerce in terms of revenue.1 The concept of e-commerce is related to notions of Internet economy and digital economy. All these concepts relate to the use of new information and communication technologies for economic activities, but with different focuses. Internet economy refers to the economic activities that generate revenue from the Internet or Internet-related products or services (Costa, 2001). Therefore, pre-Internet e-commerce, as will be detailed in the following section, cannot be called Internet economy. On the other hand, some activities, such as building Internet connections for commercial purposes, are a part of Internet economy, but they are not necessarily e-commerce. Digital economy is based on digital technologies such as computer, software, and digital networks. In most cases, digital economy is the same as e-commerce. However, not all activities in the digital economy are e-commerce activities. For example, purchasing computer gear from a storefront retailer is not an activity of e-commerce, although it certainly is a key component of the digital economy. Hence, e-commerce, Internet economy, and digital economy are closely related but have different concepts. E-commerce has been perhaps one of the most prevalent terms in this digital era. Although e-commerce was once looked upon simply as an expressway to wealth, it has actually transformed the way people conduct business. An historical analysis of e-commerce will provide insights into the evolution of the application of information and communication technologies in the commercial arena. Furthermore, an analysis of the evolution of e-commerce in the past as well as its present state will enable us to project future trends in e-commerce.


Author(s):  
Beatriz Santos

Through the use of information and communication technologies, Public Administrations make its relevant information related to issues of public interest available for citizens. In the specific field of urban planning, Spanish administrations are making a huge effort to improve the urban information and make it available online for citizens developing Urban Information Systems, tools based on Geographic Information Systems which offer visualization and interaction options and increase transparency. More recently, digital channels have started to be used to enhance participation and promote democratic processes at regional, municipal, and local level. The chapter analyses different digital tools and services implemented to improve transparency in urban planning and web-based participation processes developed in Spain to check the result of these developments concluding that there is still a long considerable way to go since information and communications technologies offers a lot of options and tools to improve these processes, particularly through the application of PPGIS.


2020 ◽  
Vol 37 (1) ◽  
pp. 19-24
Author(s):  
Stephen Breen ◽  
Karim Ouazzane ◽  
Preeti Patel

The General Data Protection Regulation (GDPR) 2018 imposes much greater demands on companies to address the rights of individuals who provide data, that is, Data Subjects. The new law requires a much more transparent approach to gaining consent to process personal data. However, few obvious changes to how consent is gained from Data Subjects to comply with this. Many companies are running the risk of non-compliance with the law if they fail to address how data are obtained and the lack of true consent which Data Subjects currently give to their data being processed. Consent is a complex philosophical principle which relies on the person giving the consent being in full possession of the facts, this article explores the philosophical background of consent and examines the circumstances which were the point of departure for the debate on consent and attempts to develop an understanding of it in the context of the growing influence of information systems and the data-driven economy. The GDPR has gone further than any other regulation or law to date in developing an understanding of consent to address personal data and privacy concerns.


Sign in / Sign up

Export Citation Format

Share Document