1 / 15

Groupware Violates Privacy

Overview. Groupware

feng
Download Presentation

Groupware Violates Privacy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Groupware Violates Privacy Matt Robertson Sherri Little Carolyn Perkins Chris Mazur

    2. Overview Groupware & Invasion of Privacy Pros of Invasion of Privacy Cons of Invasion of Privacy Conclusion

    3. What is Groupware? Groupware is technology that promotes open communication, cooperation, and collaboration among work groups, and is intended to help solve problems.

    4. What is Invasion of Privacy? Invasion of privacy is the act of obtaining or becoming knowledgeable of someone else's personal information, thoughts or attitudes without their expressed permission.

    5. Pros to Invasion of Privacy Collective information. Learn from past experiences. Ease of communication among peers. Environmental awareness and group collaboration.

    6. Collective Information Centralized information. Open understanding of what other teammates are doing. More documented resources at hand.

    7. Learn from Past Experiences. Work group mistakes. Didnt work once, probably wont work again. Work group accomplishments. Build or continue from previous work.

    8. Ease of Communication Among Peers. Up to date information on team members status as well as current project status. Aids communication among peers both on- and off-site.

    9. Cons of Invasion of Privacy No privacy. Discrimination against employees or teammates. Violation of Human Rights. 4th amendment right ECP Act PCW Act

    10. No Privacy Other users have access to your work area. Personal information is at risk.

    11. Discrimination Against Employees or Teammates Discrimination is possible when information becomes public knowledge.

    12. Violation of Human Rights Fourth Amendment The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

    13. Violation of Human Rights Electronic Communication Privacy Act of 1986 Provides security and rights against unauthorized access of your electronic communications. Provides security and rights against unauthorized users who hack or crack your systems files.

    14. Violation of Human Rights Privacy for Consumers and Workers Act Employers can periodically monitor new employees Employers who monitor their employees must notify the employees of when and how they are being monitored. An employer cannot monitor employees who are engaged in their First Amendment rights or who have five years' or more employment. The employer cannot disclose to any person other than the employee the data obtained by monitoring unless stated other wise.

    15. Conclusion Groupware can certainly an invasion of privacy, but there are pros and cons that one must consider when deciding whether groupware is right for them or their company.

More Related