Surveillance Methods In The Works

0 / 5. 0

Surveillance methods in the works

Introduction

In the first, the right to non -interference is defined in terms of access and control, according to Ferdinand Schoeman, ‘a person has privacy to the extent that others have limited access to information about it, limited access tointimacies of your life, or limited access to your thoughts or your body ‘Schoeman. In that sense, privacy rights are to restrict access to private matters and give people the exclusive right to control such access. Faced with privacy and privacy right at work, in recent years many new methods have been developed to monitor workers.

Developing

Based on the new developments in information technology. In this section, we will describe the main privacy problems they play instead of work today, taking as a starting point the five types of potentially private issues proposed by Brey, and to what extent they appear in the workplace as objects in dispute. Five basic types of private matters can be distinguished, with rights corresponding to privacy in the workplace. The aforementioned author distinguishes the human body as that physical or biological body, with all the characteristics that apply to a specific person.

Such characteristics include physical properties such as height, weight, facial characteristics, visual characteristics of the naked body, digital footprints, medical conditions;and biochemical properties such as blood, urine or genetic composition composition. Many of these aspects of the body are sensitive to privacy, the human body is increasingly a disputed site, since more and more access to aspects of the body are sought. Some of the main privacy problems in the workplace in relation to workers’ bodies, according to Brey are the following.

Medical examinations and medical background verification, drug test, “palpable” searches, bodily scanning, biometric encryption and surveillance cameras. Faced with the latter, in most cases, camera surveillance in the workplace should not reveal private information, information on bodies or body conditions. However, if used in areas where employees (partially) undress or take care of their body can be subject to a problem. Workers often bring their personal belongings to the workplace, these may include pen, wallets, bags.

Personal digital assistants, laptops, plants, family photos, etc.;Bags and desktop drawers can contain personal objects such as cosmetics, personal addresses, medications and female hygiene products. Workers can also use the workplace as a temporary storage space, for example for groceries, clothing and other personal belongings. In addition, workers also have a work space for personal use such as an office space, personal equipment, furniture or tools.

For example, a desk, a personal computer, a closet, which come to use as their own;And they often end up personalizing these spaces, not only bringing their own personal belongings, but also modifying the property of the company, for example reorganizing furniture or choosing salvapallas, funds and configurations on your computer. Faced with this, workers tend to have privacy expectations regarding the access of others made their personal elements brought to work, and in the face of their spaces, for example, the expectation that no one enters their office without prior notice.

Or go through the content of your archivators or computer hard disk without your consent. Naturally, reviewing personal items as a handbagof computers or vigilance with a chamber of workplaces. Personal information carriers are means that contain information about aspects of a person.

For example, about your individual behavior, your thoughts and beliefs, your personal relationships, aspects of your body or your personal belongings. Such carriers can include files, paper records, personal notes, photos, electronic newspapers, databases, video recordings, etc. These can encode information in several ways, including linguistic, numerical and pictorial. Personal information carriers can be the same information holders, but on many other occasions, it is not the owner who owns or uses the information, but third parties as doctors.

conclusion

Insurance companies, banks, government institutions, media agencies, Internet suppliers, supermarkets, employers, among others. And a series of privacy problems in the workplace refer to access to these media, since such files are generally destined to be accessible to a limited number of people, and a privacy violation would be considered if other people of theorganization were also granted access if there is no express authorization by the holder or by a court order. 

Free Surveillance Methods In The Works Essay Sample

Related samples

Zika virus: Transmission form Introduction The Zika virus belongs to the Flaviviradae family, was found for the first time in a monkey called Rhesus febrile and in...

Zika virus: cases and prevention Introduction The World Health Organization (WHO) has confirmed that Zika is a virus caused through the mosquito bite which is...

Zeus The King of Greek mythology Introduction Zeus is the Olympic God of heaven and thunder, the king of all other gods and men and, consequently, the main figure...

Zeus's punishment to Prometheus Introduction Prometheus, punished by Zeus Prometheus, punished by Zeus. Prometheus is a ‘cousin’ of Zeus. He is the son of the...

Comments

Leave feedback

Your email address will not be published. Required fields are marked *