Welcome to the “Ethics Toolkit: Privacy at Work” video lesson intended to highlight the fact that most employers monitor the websites their workers visit and the electronic communications they send. This video lesson is part of the “Ethics Toolkit,” which encourages employees from top to bottom of the organization to behave in an ethical and upright manner at work. In this lesson, viewers will learn employers’ rights to block or limit access to certain websites, track web activity, monitor email messages, and perhaps even monitor phone calls. Learners will also consider the issue of drug testing and learn about the instances when an employer cannot infringe on an employee’s privacy.
Overview
COURSE DIFFICULTY
COURSE DURATION
6m
Skills Learned
After completing this online training course, students will be able to:
Understand the Importance of Privacy in the Workplace
Identify Key Legal and Ethical Standards Related to Employee Privacy
Implement Best Practices for Protecting Employee Personal Information
Recognize Privacy Risks and How to Mitigate Them
Human Resources Professionals, Compliance Officers, Managers, Team Leaders, Employees Interested in Workplace Ethics
None
01. Introduction to Workplace Privacy
02. Legal Framework Surrounding Employee Privacy
03. Ethical Considerations in Employee Monitoring
04. Best Practices for Maintaining Privacy
05. Case Studies and Real-World Applications
SKILLS LEARNED
Skills Learned
After completing this online training course, students will be able to:
Understand the Importance of Privacy in the Workplace
Identify Key Legal and Ethical Standards Related to Employee Privacy
Implement Best Practices for Protecting Employee Personal Information
Recognize Privacy Risks and How to Mitigate Them
WHO SHOULD ATTEND
Human Resources Professionals, Compliance Officers, Managers, Team Leaders, Employees Interested in Workplace Ethics
PREREQUISITES
None
COURSE OUTLINE
01. Introduction to Workplace Privacy
02. Legal Framework Surrounding Employee Privacy
03. Ethical Considerations in Employee Monitoring
04. Best Practices for Maintaining Privacy
05. Case Studies and Real-World Applications