0% found this document useful (0 votes)
55 views16 pages

Dealing With Harrassment and Discrimination: Professional Ethics

The document discusses maintaining a healthy computing environment and preventing computer-related health problems. It recommends taking regular breaks from using a computer every 30 minutes to an hour to avoid straining the body. It also suggests using proper ergonomics like adjusting monitor height and having a separate keyboard and mouse when possible. The document emphasizes turning off computers when not in use to preserve hardware and practicing overall healthy habits to avoid issues like eyestrain, back pain, and worn-out equipment.

Uploaded by

Rhea Paguigbao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views16 pages

Dealing With Harrassment and Discrimination: Professional Ethics

The document discusses maintaining a healthy computing environment and preventing computer-related health problems. It recommends taking regular breaks from using a computer every 30 minutes to an hour to avoid straining the body. It also suggests using proper ergonomics like adjusting monitor height and having a separate keyboard and mouse when possible. The document emphasizes turning off computers when not in use to preserve hardware and practicing overall healthy habits to avoid issues like eyestrain, back pain, and worn-out equipment.

Uploaded by

Rhea Paguigbao
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Dealing with harrassment

and discrimination
Professional Ethics
Discrimination Harassment
Discrimination is any type of Harassment is illegal behavior
behavior that specifically towards a person that causes
targets an individual based on mental or emotional suffering,
a personal attribute, such as which includes repeated unwanted
their gender, size, age,  contacts without a reasonable
religion, ethnicity, ability, or purpose, insults, threats, touching,
sexuality. or offensive language.
How does it affect you?
Discrimination Harassment
• Sad or depressed
• Intense stress, depression and/or
• Lonely and different in ‘bad’ way
anxiety
• Embarrassed or upset about some part
• Sleep problems
of yourself
• loss in confidence
• Scared of being hurt by others
• Work/school performance to drop or
• Unable to concentrate on schoolwork
causing someone to have to take time
• Angry or like fighting back
off work/school
• Like there’s no hope
How to deal with Harassment and Discrimination
1. Tell directly to the person that is harassing or discriminating you to stop his/her
unwanted behavior.
2. Report the harassment to a manager, teacher, lecturer or someone in authority. 
3. Keep a diary of any incidents of discrimination or harassment. Record the date,
approximate time, location, parties involved, witnesses, and details of the improper
conduct or speech.
4. Keep any objects or pictures which were posted, left for you, or given to you in the
workplace that you believe were discriminatory or harassing.
5. Ask for support from your friends and family.
6. Keep yourself safe.
“Acceptable use” policies
for computing in the
workplace
Professional Ethics
Acceptable Use Policy
- agreement between two or more parties to a computer network community, expressing in writing
their intent to adhere to certain standards of behaviors with respect to the proper usage of specific
hardware and software services.

- An employee’s ability to intentionally or inadvertently compromise the security of your company


is one of the biggest reasons to consider implementing an acceptable use policy. An acceptable use
policy ensures employees understand their responsibilities and rights as well as the company’s
expectations of them regarding technology in the workplace. It also helps educate employees on
how to identify potential threats and keep themselves safe from cybercriminals.
As an employer, you probably provide your staff with access to hardware such as: 
• work computers;
• work phones; 
• a company email; 
• a social media page; and 
• software that stores confidential information.

With your employees constantly interacting with multiple company IT systems, it is crucial that you
develop an IT acceptable use policy for your workplace.
What does IT Acceptable Use Policy
Cover?
The content of the policy will vary depending on your industry and business practices, but some key features
include:
 outlining the acceptable use of company email;
 setting a code of conduct for employees that you will not tolerate bullying and
harassment through IT systems;
 prohibiting employees from accessing inappropriate websites;
 restricting the type of software that an employee may download without
permission;
 setting out what employees must do if they think a data breach has occurred;
 regulating how an employee must conduct themselves on both personal and
company social media channels; and
 notifying employees of how they are being monitored.
Reasons Why You Need an IT Acceptable Use Policy

1. Setting Clear Expectations With Your Employees


 By clearly setting expectations surrounding your IT systems,
employer will ensure that employees are aware of the appropriate
approach to your systems and processes. This will reduce the risk of
employees inadvertently causing harm because they are unaware of
the correct approach.

 You can also clearly set out the consequences of breaching your IT
acceptable use policy. These consequences might include
termination or disciplinary action.
Reasons Why You Need an IT Acceptable Use
Policy

2. Surveillance
 If you intend to monitor your employees’ behavior via IT systems or video cameras,
you must have an IT policy which details the type of surveillance you will be
conducting. 

Examples:

If your employees are using work devices for personal matters, or personal devices for work
matters, it is crucial to let them know the kind of monitoring that you perform. 
Reasons Why You Need an IT Acceptable
Use Policy

3. Protecting Your Organization from


Security Breaches
IT acceptable use policy that sets out: 
 how employees should respond to suspicious emails;
 the types of websites they can visit; and 
 what is acceptable for them to download.
Reasons Why You Need an IT Acceptable
Use Policy

4. Legally Protecting Your organization


● Under workplace health and safety laws, you have an obligation to
provide a workplace that is free of: 
• Discrimanation
• Bullying
• Harrasment

If one of your employees decides to harass another via an IT system and


employer do not have a policy that clearly prohibits this, employer could be held
legally responsible for the harm inflicted on the bullied employee.
Healthy computing
environment (ergonomics)
Professional Ethics
What is Healthy Computing
Environment

Healthy Computing is important to maintain a healthy


posture when using computer equipment. This is especially
true with children to prevent injuries from occurring later in
life. Appropriate placements of the monitor, keyboard, and
mouse are essential for healthy posture.
What are Healthy Computing Habit?

Turn off your computer if you’re not going to use it for


hours. Avoid leaving your computer on when you’re not
using it. The longer you have your computer on, the more
strain you are putting on your computer’s hardware. Avoid
wearing out your computer’s hardware right away by
making sure it has time to rest.
How do you maintain a healthy computer
environment?

Start practicing healthy computing habits today. Take active


breaks at least once per hour and take micro breaks from
your seat once every 30 minutes. Plus, try to alter your
posture even by just tilting your chair differently once every
two hours.
How To Prevent Computer Health
Problem?
Use a correctly set-up desktop computer instead of a laptop
as often as you can.
Use peripheral equipment, such as a docking station, separate
keyboard, mouse and laptop stand.
Take frequent breaks.
• Carry your laptop in a backpack or in wheel-along
luggage.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy