A01 chaf6542 06 se fm indd



Download 29,46 Mb.
Pdf ko'rish
bet1186/1447
Sana15.08.2021
Hajmi29,46 Mb.
#148217
1   ...   1182   1183   1184   1185   1186   1187   1188   1189   ...   1447
Bog'liq
[Chaffey, Dave] Digital business and E-commerce 2nd book

impact assessment

’ of monitor-

ing activities.

According to the code, an impact assessment involves:

● 

identifying clearly the 

purpose(s) behind the monitoring arrangement and the benefits 

it is likely to deliver

● 

identifying any likely 



adverse impact of the monitoring arrangement

● 

considering 



alternatives to monitoring or different ways in which it might be carried out

Impact assessment

An assessment of the 

employee monitoring 

process in the workplace 

to identify improvements 

to minimise infringement 

of employee privacy.

Figure 11.29

Employee controls

Source: DTI (2006) Department of Trade and Industry Information Security Breaches Survey.

59%


37%

94%


49%

50%


24%

44%


18%

2%

83%



Restrict which staff have access

to the Internet at work

Block access to inappropriate websites

(through blocking software)

Block access to social networking sites

Monitor logs of which websites

staff visit and when

Monitor what staff have posted

onto social networking sites

ISBS 2013 - large organisations

ISBS 2013 - small businesses

20

0



40

60

80



100

M11_CHAF6542_06_SE_C11.indd   582

7/23/14   1:27 PM



583

Chapter 11  Analysis and design

● 

taking into account the 



obligations that arise from monitoring

● 

judging whether monitoring is 



justified.

The code does not make specific recommendations about monitoring of emails or web 

traffic, but it does refer to them as typical monitoring activities which it suggests may be 

acceptable if staff are informed of them and an impact assessment has been conducted. The 

code does ask employers to consider whether alternatives may be better than systematic 

monitoring. Alternatives may include training or clear communication from managers and 

analysis of stored emails where it is thought an infringement has taken place rather than 

continuous monitoring. For example, automated monitoring is preferred to IT staff viewing 

personal emails of staff. The code also makes clear that the company should not under-

take any 




Download 29,46 Mb.

Do'stlaringiz bilan baham:
1   ...   1182   1183   1184   1185   1186   1187   1188   1189   ...   1447




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish