Research cyber crime, workplace privacy, and free speech on social media, create
ID: 3662528 • Letter: R
Question
Research cyber crime, workplace privacy, and free speech on social media, create a presentation that addresses how you would handle the situation is with integrity meaning how should you act that demonstrates respect for your employer(chain of command, liability, IP, profitloss ), coworkers, and outside contacts. Research cyber crime, workplace privacy, and free speech on social media, create a presentation that addresses how you would handle the situation is with integrity meaning how should you act that demonstrates respect for your employer(chain of command, liability, IP, profitloss ), coworkers, and outside contacts.Explanation / Answer
Research cyber crime :
Somewhere along the line, unless you're planning on having a general law practice, you'll need to decide on an
area to specialize in prosecuting cyber crimes.
The fact you'll decide that prosecuting cyber crime should be the center of your legal career.
Perhaps the easiest way for me to do this is by giving you a tour of some online crimes, so that we can see
the magnitude of the cyber crime problem we face as a society,the diversity of cyber crime topics
involved,
some of the challenges which make prosecuting these cases difficult, and some of the cases currently being brought against some online miscreants.
Traditional journalism-speak answer: "hackers"
In fact journalists really should be saying crackers, not hackers, but we both understand the casual/popular
misuse of the "hacker" term instead of the more strictly correct "cracker" nomenclature.
Some more specific possible answers to the question of "Who commits cyber intrusions?" might be…
1)Disgruntled/untrustworthy (former) insiders
2)Ideologically motivated individuals
3)Sophisticated professionals
Workplace privacy:
First thing we should know How much privacy do you have at our work place
More than 75% of employers do some employee monitoring
Many employers look into your past and your personal life
Some employers require certain tests
Don’t be caught off guard!
second thing we should know the types of Monitoring such as
Email and instant messages (IM)
Telephone
Voicemail
Computer usage
Websites visited
On-site activity
Third thing we should know the types of Checks & Tests
Credit check
Background check
Medical testing
Skills testing
Drug & alcohol testing
Psychological testing
last thing is we should know how to have Privacy Rights and Protecting Your Privacy and Your Job
Privacy Rights:
1)Is it legal to monitor employees?
2)Notification of monitoring
3)Personal calls
4)Private email
5)Cell phone calls & text messages
6)Surveillance & searches
7)Credit report/background checks
8)Medical history & testing
9)Public vs private employees
10)Union activity
11)Actions outside the workplace
12)Can I be fired? Not hired? Denied a promotion?
Protecting Your Privacy and Your Job:
1)Learn your employer’s privacy policies
2)Assume you are being monitored
3)Keep personal communications off-limits by using your own phone & home computer
4)Assume that deleted email, voicemail and computer files will still be accessible
5)Consider using a pseudonym (fake name) for certain online activities
6)Remind your employer you want to keep your medical information confidential
Free speech on social media
Every company engaging in Social Media should have the following in place:
Enforcement Mechanisms
A Social Media Strategy
A Social Media Policy
Staff Training
Statements on Social Media can spread worldwide very quickly
No universal defamation laws
People can forum-shop in the country most likely to uphold their claim
Educate staff on social media policy :
Consumer Protection Laws
Employment Laws
Advertising Standards
Privacy and Data Protection
Copyright and Trademark
Rules of the Social Media Platforms (Face Book, Twitter, LinkedIn etc.)
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.