Biometrics is the science and technology of measuring and analyzing biological data. It is used to uniquely identify individuals by their physical characteristics or personal behavior traits. It is used to allow employees access to certain areas and for general ID purposes. A biometrics system goes through three basic steps: 1. Acquiring data, 2. Encryption. 3. Analysis of data.
A CCTV (closed circuit TV) system is made up of a video camera monitoring device, a wire to carry the feed, and a monitor to view the feed or a storage system to save the feed. It can be a powerful deterrence in the workplace to monitor areas and employees. There are limits to using CCTV. For example, CCTVs cannot be used in private areas (bathrooms) and they should only be used for legitimate business uses.
Industrial Security Firms
There is a need for a Industrial Security Firm to protect companies from employee theft and help punish offenders. They operate on the private sector and offer both preventative and investigative services to help small companies prevent/limit employee theft. There are several legal implications of tracking/monitoring employees that companies and ISFs must follow in order for employees to maintain their reasonable expectation of privacy.
For more information and for a direct example of a hypothetical report written by an Industrial Security Firm, please click here: Contract With Industrial Security Firm.
RFID tags are used all over the world. They can be used to not only track products in a retail setting, but also vehicles, people, and pets. RFID tags have both read and write capabilities, meaning that it can be changed, updated, and locked. New RFID tags can store up to 2 KB of data and are composed of a microchip, antenna, and a battery.
Social Media Monitoring
Employers need to monitor social media to protect their businesses , customers, and employees. Yet are these policies legal in regard to monitoring employees?