Teicher, J ORCiD: 0000-0003-2783-2408In this article we examine changes to the Telecommunications (Interception and Access) Act 1979 (Cth) and the implications of those changes for the protection of workplace privacy. This examination is undertaken in the context of two factors: the absence of statutory protections for employee privacy in the workplace; and the development of sophisticated human resource management practices and increasing individualization of workplace relationships. We argue that instead of eroding privacy rights in the workplace, the federal government should implement a legal regime that poses the least threat to employees' dignity and rights to privacy in the context of work. © Australian Labour and Employment Relation...
The increased use of email and the internet in the workplace raises important legal questions for wo...
Processing personal data may be an incidental consequence but difficult to avoid in the day to day o...
ABSTRACT. This paper examines workplace sur-veillance and monitoring. It is argued that privacy is a...
In this article we examine changes to the Telecommunications (Interception and Access) Act 1979 (Cth...
More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D...
While technology has significantly increased productivity and efficiency in the workplace, concerns ...
The need to intercept and monitor communications arose in the context of security legislation. Howev...
In 2000, the Howard Liberal-National Coalition Government enacted the Privacy Amendment (Private Sec...
This article will examine issues as they relate to the privacy of employees’ lives given that nearly...
Today’s managers – drawing on the expertise of their IT professionals – can use technology for both ...
This article discusses the opposing dynamics in the modern workplace environment, specifically emplo...
grantor: University of TorontoThis thesis is a comparative study of the law relating to w...
Amid increasing concerns about the encroachment of work on private life, this article examines the e...
This paper explores the issues that arise from the surveillance of digital communications at the wor...
This paper focuses on the pivotal question of whether or not the right to privacy could be juxtapose...
The increased use of email and the internet in the workplace raises important legal questions for wo...
Processing personal data may be an incidental consequence but difficult to avoid in the day to day o...
ABSTRACT. This paper examines workplace sur-veillance and monitoring. It is argued that privacy is a...
In this article we examine changes to the Telecommunications (Interception and Access) Act 1979 (Cth...
More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D...
While technology has significantly increased productivity and efficiency in the workplace, concerns ...
The need to intercept and monitor communications arose in the context of security legislation. Howev...
In 2000, the Howard Liberal-National Coalition Government enacted the Privacy Amendment (Private Sec...
This article will examine issues as they relate to the privacy of employees’ lives given that nearly...
Today’s managers – drawing on the expertise of their IT professionals – can use technology for both ...
This article discusses the opposing dynamics in the modern workplace environment, specifically emplo...
grantor: University of TorontoThis thesis is a comparative study of the law relating to w...
Amid increasing concerns about the encroachment of work on private life, this article examines the e...
This paper explores the issues that arise from the surveillance of digital communications at the wor...
This paper focuses on the pivotal question of whether or not the right to privacy could be juxtapose...
The increased use of email and the internet in the workplace raises important legal questions for wo...
Processing personal data may be an incidental consequence but difficult to avoid in the day to day o...
ABSTRACT. This paper examines workplace sur-veillance and monitoring. It is argued that privacy is a...