enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. Surveillance abuse - Wikipedia

    en.wikipedia.org/wiki/Surveillance_abuse

    Surveillance abuse is the use of surveillance methods or technology to monitor the activity of an individual or group of individuals in a way which violates the social norms or laws of a society. During the FBI 's COINTELPRO operations, there was widespread surveillance abuse which targeted political dissidents , primarily people from the ...

  3. Closed-circuit television - Wikipedia

    en.wikipedia.org/wiki/Closed-circuit_television

    Closed-circuit television (CCTV), also known as video surveillance, [1] [2] is the use of closed-circuit television cameras to transmit a signal to a specific place on a limited set of monitors. It differs from broadcast television in that the signal is not openly transmitted, though it may employ point-to-point , point-to-multipoint (P2MP), or ...

  4. Employee monitoring - Wikipedia

    en.wikipedia.org/wiki/Employee_monitoring

    Employee monitoring is the (often automated) surveillance of workers' activity. Organizations engage in employee monitoring for different reasons such as to track performance, to avoid legal liability, to protect trade secrets, and to address other security concerns. [1]

  5. Apple accused by US labor board of imposing illegal workplace ...

    www.aol.com/news/apple-accused-us-labor-board...

    A U.S. labor board issued a complaint accusing Apple of violating employees' rights to organize and advocate for better working conditions by maintaining a series of unlawful workplace rules.

  6. Computer surveillance in the workplace - Wikipedia

    en.wikipedia.org/wiki/Computer_surveillance_in...

    Computer surveillance in the workplace is the use of computers to monitor activity in a workplace. Computer monitoring is a method of collecting performance data which employers obtain through digitalised employee monitoring. Computer surveillance may nowadays be used alongside traditional security applications, such as closed-circuit ...

  7. Mass surveillance in the United States - Wikipedia

    en.wikipedia.org/wiki/Mass_surveillance_in_the...

    The Communications Assistance for Law Enforcement Act (CALEA), passed in 1994, requires that all U.S. telecommunications companies modify their equipment to allow easy wiretapping of telephone, VoIP, and broadband Internet traffic. [101] [102] [103] In 1999 two models of mandatory data retention were suggested for the US.

  8. Surveillance - Wikipedia

    en.wikipedia.org/wiki/Surveillance

    The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet. [9] In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by federal law enforcement agencies.

  9. Workplace privacy - Wikipedia

    en.wikipedia.org/wiki/Workplace_privacy

    Workplace privacy is related with various ways of accessing, controlling, and monitoring employees' information in a working environment. Employees typically must relinquish some of their privacy while in the workplace, but how much they must do can be a contentious issue. The debate rages on as to whether it is moral, ethical and legal for ...