The Occupational Health And Safety Act

Good Essays
Problem 2 As employers in a federal government organization, Michael Scott and Dwight Shrute have an obligation to comply with the Personal Information Protection and Electronic Documents Act. The act relates to the collection of personal information and it requires employers to inform their employees in regard to what type of personal information is being collected. Mr. Scott and Mr. Shrute invested in “Keystroke Logger,” in order to monitor all employees’ outgoing email messages, without informing their employees that they were using the software. Furthermore, Mr. Scott and Mr. Shrute should have developed a privacy policy that outlined what was expected of their staff members in relation to their conduct on the internet. Mr. Scott and Mr. Shrute were also in violation of the Occupational Health and Safety Act when they stored cardboard file boxes by stairwells and emergency exits. The Occupational Health and Safety Act outlines the basic responsibilities of the employer. The basic responsibilities include; providing employees with policies and producers in order to sustain a safe work environment. “Without limiting the strict duty imposed by subsection (1), an employer shall, (a) provide information, instruction and supervision to a worker to protect the health or safety of the worker; (j) prepare and review at least annually a written occupational health and safety policy and develop and maintain a program to implement that policy” (S. 25(2)). It is evident that

Related Documents

  • Decent Essays

    I will pass policies that show employees how to construct strong passwords to log in to the system such as P0c0nt@s2132, in which shows not only letters but upper case, symbols, and numbers. As well as, a secret question and password must be provided to provide reassurance that the person logging in is who they say they are. Next would be to have the right and updated anti-virus and malware protections. This will help detect threats that enter the system. Locking your network and applying wired networks, which involves plugging into physical outlets or hacking modem ports.…

    • 700 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    They have to “make arrangements to ensure the health and safety of the workplace”, this includes “making arrangements for emergencies … and health surveillance” (healthyworkinglives.com). These regulations also give factory employees duties towards their own safety and the safety of others. They must work according to their training and instructions given to them. They must also notify the manager or the person responsible for health and safety of any danger to health and safety, such as a malfunctioning machine, or any problems with health and safety arrangements. Finally the Workplace Health, Safety, and Welfare Regulations means P&G has to make sure that the workplace is safe and suitable for the jobs being done there.…

    • 1244 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Obligations for businesses; Legal responsibilities come upon a business owner to implement safety in the workplace. Businesses are legally obliged to: Provide safe work premises, assess risks and implement appropriate measures for controlling them, ensure safe use of goods and substances, maintain safe machinery, provide safe work environment, have insurance and workers comp. available to employees. (WHS) obligations for workers: Comply with instructions given for safety, Use all (PPE) and be properly trained on how to use it, don’t place others at risk, don’t injure yourself. Workplace safety is not only important because it’s the law, it’s important because many people’s lives are in danger when it comes to workplace safety and health.…

    • 715 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    10). This quote shows that right at that point of the article, he/she is looking at the people that work within a company. Then the author also looks at the other group of people too, which are just the general audience (e.g. adults, parents, teachers, etc. ), because after the statement about how the companies should protect themselves the webpage article then states "Below are some key steps to protecting your computer…" ("Cyber Crime", n.d., Protections, para.…

    • 869 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Confidentiality Policy Employees are exposed to confidential or proprietary information on a daily basis. A confidentiality policy, along with a confidentiality agreement, seeks to protect proprietary information from disclosure to outside entities or individuals. Many companies require their employees to maintain some measure of confidentiality as to the work in which they are involved in at the company (J. J. Keller & Associates, 2012). Protection of company information is essential to its capacity to develop new products and services and gain economic advantages in the marketplace (Hammell J. W., 2015). a.…

    • 1462 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    With the increased use of technology and Internet, it is very important to focus on the privacy policy at workplace. Internet and e-mail policy referred to the policy that controls the usage and Internet browsing behavior at workplace, which would also deter from malfeasance activity within the organizations. Corporate governance is needed in order to maintain and evaluate process and policies. The governance should include the include monitoring the activities through electronic monitoring system. This can be done with collaborative work of human resource and IT department, conducting surprise audit on a monthly or weekly basis to better control the Internet usage by the employees.…

    • 1760 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    This is primarily because even though the basis of OSHA was founded on worker safety, it is through employer standards that the employees learn. With the Act, employers are not only required to give employees a safe place to work free from hazards, they are required to tell employees of all of their protections and obligations under the act (Hodgson, 1971). This is being done, but not in the manner of reading the rulebook per se, more in the way of re-wording the Act into an easy-to-deliver package that people will relate to and buy in to. Employers are also required to keep records of workplace injuries and employee exposure risks and hazards, as well as tell the employees if they are at risk of exposure to anything outside the limits set forth within the Act (Hodgson,…

    • 1203 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Each policy addresses one or more potions of the requirements spelled out in the scenario. The internet use policy would address that employee internet access will be monitored and the content will be filtered. The monitoring will provide detection of customer information or other controlled data that is being egressed out of the company. The content filtering would allow the company to limit access to websites that could be create a hostile work environment and limit access to sites that host malware. The external device use policy will provide direction to the IT department to limit or eliminate the ability for external devices to be recognized and used on a system by technological methods.…

    • 834 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Wisdom is supreme; therefore get wisdom. Though it cost all you have, get understanding” (New International Version). Therefore, it is imperative that one is fervently aware of the intrusions that can occur online. Internet users must take preventive measures against surveillance and online hackers. Thus, each individual must take the time to set up a computer firewall, antivirus software and security settings for each personal computer, social media site and email subscription they have.…

    • 1466 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    This standard asserts that an employer must prove two things before the are “off the hook” for vicarious liability of the hostile work environment. First the employer must show that they took reasonable actions in order to prevent or correct the harassment; second, they must show that the plaintiff did not take precautionary measures to avoid the harassment (Grover, Sperino, & Gonzalez, 2011). This standard can also be easily adapted into business’s practices in order to prevent vicarious liability. Most companies nowadays require employees to sit through online or video trainings about harassment in the workplace before they begin working. This covers the employers from the first prong of the Faragher/Ellerth defense as they have taken precautionary measures to prevent harassment in the workplace.…

    • 1926 Words
    • 8 Pages
    Decent Essays