Premium Essay

Issues with Implementing Electronic Monitoring System

In:

Submitted By bayode
Words 846
Pages 4
ELECTRONIC MONITORING SYSTEM.
INTRODUCTION
Due to the continuous evolving of surveillance technology, the firm of Just Information Communication Technology Limited (JICTL) is desirous to implement a system that will enable it monitor their employee electronically in order to measure their productivity.
Since “one of the biggest issues of the information age is that of privacy” (Andrew A. Adams & Rachel J. Mccrindle, 2011, P. 211). This report will address the relevant issues on privacy with regards to implementing this project and make necessary recommendations.
ELECTRONIC SURVEILLANCE OF HUMAN (EMPLOYEE) IN A WORK PLACE
Electronic surveillance of employees in a work place can be described as the monitoring of the activities (work conduct) of employees by the employer by the means of electronic device. The monitoring aspect may include some or all of the following areas:
• E-mail
• Voice mail
• Employee location
• Telephone conversation
• Internet usage
• CCTV (Video surveillance) etc.
There are various reasons why employers may want to monitor the activities of their employee. One of such reasons is to ensure system security and operation (Andrew A. Adams & Rachel J. Mccrindle, 2011, P. 212-218). The firm of JICTL is implementing this system for the purpose of measuring employee productivity.
For the fact that electronic communication has become so important in the modern workplace with the use of e-mail, the internet, telecommuting, and corporate intranets, employers are increasingly scrutinizing employee use of these business assets, because inappropriate usage of electronic assets hampers the productivity and efficiency of a business. ( Kelly Eileen P, 2011).
According to mcgregor theories X and Y of human behavior at work place that states as follows:
• There are individuals at workplace who dislike work and avoid it where possible
• There are

Similar Documents

Premium Essay

Implementing Organizational Change

...Implementing Organizational Change October 22, 2012 Implementing Organizational Change Health care organizations that choose to convert to an electronic medical record system (EMR) have several advantages; most important it increases patient safety, efficiency, cost-effectiveness and security. Accepting such a transition also presents with its share of challenges like preparing for the required significant time obligation and resources that will make the transition a successful one. Leadership and management must create an atmosphere that will get the buy-in of all stakeholders. Providing information about the process and what methods will be best to make the conversion to an EMR system is an important aspect of the implementation process. When the change process is initiated those involved in the success of the organization needs to examine the current processes and systems, including different roles that may be affected by the proposed change. With that in mind, effective communication during the implementation of this change will allow they may have regarding the new system. All of the above experiences taken into consideration, the organization can implement a successful organizational change with the support of those vested . Once the organization has accepted the proposed plan of change, leadership, and management will create methods that will monitor the implementation process. According to Leibel, Currie, Gelowitz, Aldridge and Kuncewicz (2012), “Transitioning...

Words: 1582 - Pages: 7

Premium Essay

Organizational Chnage

...HCS/587 September 24, 2012 Dr. Margaret Walker We Need a Change The Autauga-Elmore Mental Retardation Board has decided an electronic medical record system should be purchased and implemented. The board and team feel an electronic medical record would help to bring cohesion between the nurses, case managers, physicians, and families. However, there are barriers to the change and factors that could influence the proposal and implementation of changing to a paperless system. Lewins’ theory of change is the model the agency will be using to implement the change process. However, as the change process takes place, there are methods the organization will use to monitor the change process. An examination if the relationship between the organization’s related processes, systems, and personal or professional roles and their affect on the proposed organizational change will be completed. Furthermore, an identification of communication techniques used to address any implementation issues that may arise will be addressed to ensure a successful organizational change. Monitoring Implementation Once the change has been implemented the organization is moving toward a new direction and employing new practices monitoring of the change and its success must begin. Monitoring the implementation plan of the organizational change will be accomplished with the use of questionnaires, interviews, and observation. Questionnaires are often the first method used for collecting information from...

Words: 1268 - Pages: 6

Premium Essay

Employee Privacy Rights in the Workplace

...I. INTRODUCTION Controversy surrounding workplace monitoring and surveillance has intensified with the rapid digitization of the workplace. The ways in which we work, communicate and share information have forever changed. Employers are playing constant “catch up” with new technologies that are utilized on a broad scale long before policies are created to manage their impacts. Privacy issues often arise in connection with employer efforts to locate, hire and evaluate the most qualified and reliable employees. Improvements in technology, such as the rapid rise of the use of electronic mail and the increasing use of surveillance cameras, often force otherwise reluctant employers to readdress the balance between employees' privacy concerns and perceived business needs. In fact, nearly 67% of all companies currently use some type of surveillance in the workplace. According to a recent poll, “. . . over 66% percent of those surveyed had used the Internet from work in the past 24 hours.” (M.Lee Smith Publishers, Hospitality Workforce Trends, January 2000) In addition, when issues in his or her personal life impact an employee’s work, the employer must make judgments as to the appropriate level of involvement. Lastly, as traffic on the “information superhighway” continues to explode a number of substantive questions about the use and abuse of these information networks arises. What are the ramifications for employees’ right to privacy in the workplace? Does an employer...

Words: 3154 - Pages: 13

Free Essay

Change Plan

...This paper will discuss strategies for implementing changes to the education of juveniles housed at the new Juvenile Justice Center. The Juvenile Justice Center, formerly Youth Study Center, will add vocational technical training to the regular education already offered to juveniles. Vocational technical training will offer juveniles employable skills upon release. To properly implement this training, management must develop a monitoring process, understand the relationships of processes, systems, and professional roles. Monitoring There are 3 components in the monitoring process of the implementation of a vocational technical education curriculum at the new Juvenile Justice Center. The monitoring components includes: 1) data collection; 2) evaluation and communication procedures; and 3) documentation. Data collection includes data relative to implementation. Ideally, these data should be able to summarize the effects of adding a vocational technical curriculum to the regular curriculum. At a minimum, monitoring data should include: ▪ Annual material and equipment costs ▪ Tracking released juveniles for employment ▪ Assessing regular education progress versus vocational technical process ▪ Significant changes in personnel In addition, management must identify who is responsible for the collection and frequency of data collection. All data should be collected frequently enough to make certain that information is recorded correctly. Evaluating the data collected...

Words: 1412 - Pages: 6

Free Essay

Week 4 Db Mit Principles of Information Systems Itc 610

...AIU Online The electronic auction websites have a role of providing the mean to the people who want to sell their electronic devices on the websites in order to get the maximum sale price of the product. The role of these auction sites is to reduce the risk of sellers, protect intellectual property rights, support laws and regulations, provide equal opportunity to the sellers and provide the more enjoyable buying and selling experience to the visitors. There should be proper policies for buying and selling electronic items on the auctions websites (Jacobson, 2003- 2015).   No, sellers should not be able to post whatever they want without sensitivity to others because each electronic or non-electronic auction website has some rules and policies using which the sellers have to sell their products on these websites. Some sensitive items should not be posted on these websites as these posts can hurt someone’s feeling. Like a well- known auction website does not allow the sale of some items like firearms, weapon, random drawings, offensive material which includes items that are racially and ethnically inappropriate and some electronic sex toys etc. So these sensitive items should not be posted on auction websites. The control that should be placed on the auction of electronic elements on auction websites should consist of rules, compliance monitoring and enforcement. Rules define the lines between violation and norms between sanction and approval. Monitoring is important in order...

Words: 1015 - Pages: 5

Premium Essay

Critical Factors

...Critical Factors in Implementing an IT System in Health Facilities Cynthia Jones Professor Ilisher Ford HSA315 Health Information Systems Strayer University February 3, 2016 CRITICAL FACTORS Critical Factors in Implementing an IT System in Health Facilities Health Care Organizations Reluctant to Implement HER One reason some healthcare organizations have been reluctant to implementing electronic health records is the cost. These systems aren’t cheap ,vendors charge 40,000 to install an electronic record system and 10,000 to 15,000 maintenance annually. It is a hassle and costly to hire staff to enter data and comply with rules and regulations. Another reason some healthcare organizations have been reluctant to implementing electronic health records is privacy. This is a big issue, perhaps the greatest vulnerability of electronic health systems. The system can be hacked into and misused, invading patient’s privacy, revealing sensitive information...

Words: 871 - Pages: 4

Premium Essay

Electronic Monitoring and House Arrest

...Introduction to Criminal Justice Electronic Monitoring and House Arrest Katelyn Fritz November 24, 2013 Introduction Electronic Monitoring (EM) and house arrest (HA) is a system that has been met with both trepidation and acceptance since its integration in the 1980’s. Though it goes by many names, including Community Sentencing and Intermediate sanctions, it still maintains a single identity. It is a form of punishment for offenders as an alternative to incarceration. This program applies to offenders chosen at the judge’s discretion and is based upon the offenders compliance, the nature of the infraction, and the burden on the system. Involved is a period of time where the offender is confined to his home under the supervision of a probation officer and some form of electronic monitoring. These monitoring options include the random call method (RC), an ankle monitor using radio frequency (RF) or GPS technology, or a combination thereof (Burell & Gable, 2008). Electronic monitoring is touted as an ideal means of reducing overcrowding in jails and prisons, but how effect is electronic monitoring and house arrest really? More than 30 years after its integration, there are several issues that have developed, or that have yet to be resolved. To demonstrate this lets us look at one example that occurred in the year 2000. Gerald A. Jones, a young, 18 year old man, was convicted of a robbery after sticking a gun into a woman’s face and stealing her watch. As a...

Words: 5158 - Pages: 21

Premium Essay

Nt1330 Unit 1

...To choose an appropriate system, we should determine which system meets the needs of our practice as well as legal and regulatory requirements of our jurisdiction. We should also determine how the chosen system will work in concert with other electronic records systems. We must know the compatibility requirements as may be prescribed by the health authorities, health facilities or clinics. To facilitate this choice, there are various professional resources, including technology providers, consultants Information Technology, provincial, territorial or national medical associations and local technical support programs for doctors. Colleagues who have implemented an EHR system can also provide useful information. Some organizations of a province or territory have a list of pre-approved suppliers that facilitates the selection process and can also offer subsidies to offset part or all of the costs of acquisition and implementation. The system vendor will likely require that we sign a license to use the software, which is a legal agreement governing the use and distribution of EHR...

Words: 474 - Pages: 2

Premium Essay

Nut1

...WELCOME EHR The implementation of the new EMR system to the hospital will provide ease of information access, protected PHI, and help eliminate errors in our everyday use. IMPORTANCE OF INFORMATION ACCESS Benefits Increase quality of care Bedside charting access Ability to access your patients records at one time All information in one place IMPORTANCE OF INFORMATION ACCESS • The implementation of the EHR will open up the employee to gain access to all the patient records available within one system. This includes x-rays, labs, notes, care plans, etc. • With secured passwords available to each employee, the employ is able to review current and past reports to increase the quality of care for that patient. • Accessing the chart at bedside will help prevent wrong patient errors. PERSONAL HEALTH INFORMATION Vulnerability The wondering eye Hackers Curious employees PERSONAL HEALTH INFORMATION • The patient health information(PHI) will be more vulnerable with the fact that the computer screens either on handhelds or desktops are more easily accessible to everyone's eyes who pass by them. • The risk of hackers getting into the system is also a risk for PHI to be breeched. • Curiosity of employees shows to be a risk involved with EHR. Employees have the risk of entering PHI when they want some information on the patient, even when it is not their patient or relevant to that patients care. PERSONAL HEALTH INFORMATION SECURITY Firewalls Encryption...

Words: 1060 - Pages: 5

Premium Essay

Network Administrator

...CURRICULUM VITAE NAME : NYAMACHE EVANS ONGUTI ADDRESS : P.O. BOX 672 - 00100 GPO NAIROBI TELEPHONE : 0724–395-908 E-MAIL : javansong@gmail.com, enyamache@jambo.co.ke MARITAL STATUS : SINGLE DATE OF BIRTH : 28/10/1984 PLACE OF BIRTH : KISII NATIONALITY : KENYAN LANGUAGES : ENGLISH AND KISWAHILI AGE : 26 YEARS ID NUMBER : 23769870 CARRIER OBJECTIVES To design and plan an advanced Telecom infrastructure that services over a million subscribers with ‎Triple Play Services (Voice, Data & Video Services).‎ To contribute to the growth of a progressive company with quality products and services in the field of Telecommunications and Information Technology (ICT).‎ SUMMARY OF SKILLS AND EXPERIENCE • Total 2 years and 4 months of experience with Advanced Diploma in Telecommunication Engineering and Cisco Certified Network Associate (CCNA). • 2 years and 8 months of experience as Network Engineer (Windows/Linux/Network). Possess the expertise in the following: Networking • Installations, Configurations and Troubleshooting of; • Wireless local Area network (WLAN) • Local Area Network (LAN) and Wide Area Network (WAN) Security • Wimax CPE (Alvarion) for SAFARICOM and ACCESSKENYA networks ...

Words: 1141 - Pages: 5

Premium Essay

Employee Privacy Rights

...to protect employee privacy. Many Americans accuse their employers of violating their privacy. Employers are becoming more vicious on how they screen new candidates as well as their current employees. Normally employers will conduct background checks, random drug testing, and maybe even a credit check. The question that needs addressing here is “How much are we willing to give up satisfying our employers”? Employees need to become more aware of this situation. Employers have the upper hand in this situation. Everyday they find a new way to invade their employees’ privacy. In today’s world of ever-changing technology, the court and legislature systems addressed these issues, and they are actively involved in resolving privacy right issues (Townsend & Bennett, 2003). The passage of the Electronic Communication Privacy Act signals a significant intervention by the federal government into a rapidly evolving technological arena that had few specific guidelines as to what constituted reasonable privacy. While the government’s...

Words: 2090 - Pages: 9

Premium Essay

Comparative Research on the Development and Implementation of Philippine Health Information Systems

...information systems (Health professionals should be closely involved in implementation)Joel Ladner Editor—Littlejohns et al identified the reasons for failure to implement a hospital information system in South Africa,1 but they do not emphasise the need for health professionals to be closely involved. In 1997 we conducted a field test of prototype tools and information flows over six months, with the overall goal of developing a computerised health information system at the three university teaching hospitals (totalling 1500 beds) in Abidjan, Côte d'Ivoire. In each hospital the system was managed by a team from the administrative department, without a hospital doctor or trained epidemiologist. Before the field test, in five voluntary clinical departments in each hospital, administrative staff underwent intensive training for three weeks. Project presentation workshops with clinicians and nurses were organised in all hospitals, and a ministry of health supervisory team (epidemiologists) was responsible for technical implementation and follow up. After six months the assessment showed a major failure in implementing the system for three main reasons: * Heavy administrative workload generated by management's inadequate medical and epidemiological education * Limited involvement of medical teams, possibly because of the responsibilities attributed to the administrative departments * Difficulty perceived among practitioners of implementing a health information system that...

Words: 625 - Pages: 3

Premium Essay

Ehr Implementation

...increasingly useful and implemented more frequently by health care providers throughout the United States. This technology may include Electronic Health Records (EHR) or Electronic Medical Records (EMR). The shift towards implementing Electronic Health Records has a significant influence on the quality of care provided by health care providers; however, some providers still stick to the basic paper documentation due to skepticism and disregard the benefits to adopting new technologies. Many questions arise when a health care provider is interested in adopting EHR’s, such as why adopt EHR’s? What are the benefits of EHR’s in relation to paper documentation? What steps need to be taken in order to adopt and implement EHR’s? What barriers will be encountered during the decision making process and how will these barriers be addressed? A health practice interested in adopting and implementing an EHR system must establish priorities, identify potential risks and how to avoid or overcome these risks, outweigh the pros and cons, set goals, and adhere to strict guidelines to ensure adopting a successful system. The terms Electronic Health Records (EHR) and Electronic Medical Records (EMR) are often used interchangeably by health care providers when in fact there is a subtle difference between EHRs and EMRs. Electronic Medical Records and Electronic Medical Records are both digital versions of a patient’s medical history and information; however EMRs are designed to communicate within...

Words: 4391 - Pages: 18

Premium Essay

Baltimore Home Invesments Ltd. Case Analysis

...Investments Ltd. From: Date: July 12, 2014 Subject: Controls issues, analysis, and recommendations for your business. With reference to our meeting of July 6th, based upon the information you provided regarding Baltimore Home Investments Ltd. (BHIL), and in light of the analysis to follow, it is evident that a myriad of control deficiencies was the root cause that enabled unscrupulous individuals to unlawfully wrest control of BHIL from you. In order to aid in the prevention of such a disaster occurring in the future, this memo will focus on detailing the control deficiencies, generating alternatives for future application, and evaluating the alternatives in preparation for providing recommendations. Overview and Problem Identification While directly running BHIL, the primary methods of control employed were action and results controls. Action controls, which make behaviors themselves the focus of controls, included: 1) direct handling of leads generated by telemarketers for distribution to loan officers; 2) direct monitoring of loan officers by tracking the number of credit inquiries each requested; 3) monitoring of loan status for final approval and the resulting revenue due; 4) receiving funds directly from proceeds and in the form of a brokers’ check mailed overnight to BHIL’s office or by direct wire transfer to BHIL’s general account; 5) monitoring Joe Carlson’s work habits. Results controls, which center on rewards...

Words: 1804 - Pages: 8

Free Essay

Should Employers Be Allowed to Monitor Personal Commuication of Its Employees?

..."Should employers be allowed to monitor personal communication of its employees?"  Ellen Berkeley, Amy Davis, Shawn Molloy, Deborah O’Leary, Karey Raubenheimer BCOM 275 October 31, 2011 Professor Tom Melpolder Although organizations have monitored employees for centuries, a number of developments have greatly expanded the amount and scope of employee monitoring. For example, recent technological advances have dramatically altered the nature of work, the working environment, and employee–employer relationships. As a result, information technology has emerged as an integral part of today’s organizational infrastructure. These new technologies have the potential to improve worker efficiency and effectiveness. However, there are risks associated with any new technology including the potential for employee abuse resulting in negative consequences (Alder, Kuenzi & Schminke, 2008). Private communication such as e-mails and social media in the workplace has emerged as one of the stickiest legal issues of the electronic age” (Cappel, 1995). The debate is divided. One side believes that employers should not have full control over its employee’s personal communication. Their view is that employees should have the ability to communicate with friends and family while on breaks, as long as productivity isn’t affected. Further, they believe that employees have a privacy right and should be allowed to communicate while at work without being monitored...

Words: 1812 - Pages: 8