27
How to be evil And stay legal

How to be evil - And stay legal

Embed Size (px)

Citation preview

Page 1: How to be evil - And stay legal

How to be evilAnd stay legal

Page 2: How to be evil - And stay legal
Page 3: How to be evil - And stay legal
Page 4: How to be evil - And stay legal
Page 5: How to be evil - And stay legal

Мы всей ебаной редакцией поржали над его опусом: чел угрожает НЕСУЩЕСТВУЮЩЕЙ статьей за клевету, вменяет какую-то ответственность перед законом — каким? чьим? Я сомневаюсь что зеркалам сайта в USA и Мексике есть какое либо дело до электронных писем украинских участковых или их помощников. Оно и заметно, что у тела незаконченное высшее юрфака, иначе бы подобную ахинею не писал (разве что сидит на тяжёлых наркотиках).Так вот, Миша, нам абсолютно похуй на подобные угрозы от неадекватов и нариков вроде тебя. Ты обычный офисный клерк который прислуживает/лижет задницу другим и не имеет личного мнения.

PS. Извините

Page 6: How to be evil - And stay legal
Page 7: How to be evil - And stay legal
Page 8: How to be evil - And stay legal
Page 9: How to be evil - And stay legal

Concorde

Page 10: How to be evil - And stay legal
Page 11: How to be evil - And stay legal

Як бути злим

Page 12: How to be evil - And stay legal

…і не бути смішним

Page 13: How to be evil - And stay legal

Потрібно прийняти рішення

Воно стрьомн

е

Во но точно не стрьомнеСистемне

мислення

ОК

Закон Судова практик

а

Етика і паблік

ОК ОК

Прийняти рішення

Page 14: How to be evil - And stay legal

We we want to spy?

Control productivity

Non-competition clause in the contract

Non-solicitation clause

Disclosure of confidential information

Human nature to control everything

Page 15: How to be evil - And stay legal

Employee: must (a) work and (b) act in line with internal rules.

Employer: must (a) make a working place (b) pay and (c) draft internal rules.

Labor legislation

Page 16: How to be evil - And stay legal

Constitution of Ukraine

Стаття 31. Кожному гарантується таємниця листування, телефонних розмов, телеграфної та іншої кореспонденції.

Винятки можуть бути встановлені лише судом у випадках, передбачених законом, з метою запобігти злочинові чи з'ясувати істину під час розслідування кримінальної справи, якщо іншими способами одержати інформацію неможливо.

Стаття 32. Ніхто не може зазнавати втручання в його особисте і сімейне життя, крім випадків, передбачених Конституцією України.

Не допускається збирання, зберігання, використання та поширення конфіденційної інформації про особу без її згоди, крім випадків, визначених законом, і лише в інтересах національної безпеки, економічного добробуту та прав людини.

Page 17: How to be evil - And stay legal

Does it mean, we cannot spy after employee?

Page 18: How to be evil - And stay legal

Contract matters

Right to monitor e-mail / social media / sms / skype

Right to record phone calls

Right to video recording in the office

Right to use recordings in the court + right to use logs

Any exceptions?

Page 19: How to be evil - And stay legal

Prevention of crime

No right in the contract needed (but still better to have such)

Page 20: How to be evil - And stay legal

Each third employee believes that his employer spies after him.

12% employees reports, that they had problems after employer read their working correspondence

Half of all 5000+ companies monitor their employees

Only 30% of employees worry of the monitoring

The higher salary is, the more employer worry about monitoring

Some statistics (HeadHunter)

Page 21: How to be evil - And stay legal

60+% believes, that it is normal to spy after employees 

20% like that they are monitored/spied

More statistics

Page 22: How to be evil - And stay legal

Is it legal elsewhere?

Electronic Communications Privacy Act of 1986 

Business Exception:  There is a business exception that allows an employer to monitor employee use of its own systems for “legitimate business needs.”  This includes improving customer service, preventing harassment and making sure that people are actually working.

Consent to Monitoring: If one party to the communication consents to the monitoring, then monitoring is permitted even if the business exception does not apply.  “Consent” requires the employer to give advance notice of its policy to monitor—it does not require the employees to agree.  Consent is implied from the fact that they learned about the policy and decided to keep working there.

Employer Owned Systems: The owner of the email, IM and phone message systems is also allowed to access the communications even if they are personal.

Limitations on Employer Monitoring:  No continuous monitoring.  If the call is obviously personal, the employer has to stop listening.  However, the employee can still be disciplined for making personal calls on company time.

Page 23: How to be evil - And stay legal

Is it legal elsewhere?

 In Sitton v. Print Direction, Inc. (Georgia, September 2011), an employer did not violate an employee’s privacy rights by accessing an employee’s personal laptop to print out personal email messages.  The employee had been using his personal laptop at work to help his wife run their printing business.  The boss came into the employee’s office and saw the computer screen that had a non-work email open.  Both the trial court and the court of appeal found that the employer had a legitimate interest in investigating whether or not the employee was running another business from the employer’s worksite on the employer’s time and found that printing out the emails was proper.  The employee had to pay the employer damages for breach of the duty of loyalty.

Page 24: How to be evil - And stay legal

Is it legal elsewhere?

Computer Hacking Laws.

Using employee passwords to sign-in to their personal or social media accounts can violate state and federal computer hacking laws and constitute identity theft.

All 50 states have laws that prohibit someone from unauthorized access to another person’s computer and online accounts, especially if the intent is to change or modify access or content. This would include deleting an inappropriate post.

In Pietrylo v. Hillstone Restaurant Group (New Jersey 2009), two employees set up a password protected MySpace account where employees could vent about working at the restaurant. A manger got a hold of the password and logged into the site to discover disparaging and sexual remarks about management and references to illegal drugs. The restaurant fired the employees who sued under the computer hacking laws. The court found for the employees because the restaurant’s employee monitoring policy did not extent to private online communications on a social network outside of work.

Page 25: How to be evil - And stay legal

Потрібно прийняти рішення

Воно стрьомн

е

Во но точно не стрьомнеСистемне

мислення

ОК

Закон Судова практик

а

Етика і паблік

ОК ОК

Прийняти рішення

Page 26: How to be evil - And stay legal
Page 27: How to be evil - And stay legal