Feeds

Changing room spy cam sparks privacy tsar blast

Hong Kong biz barons told snooping on staff is bad, mmkay

Providing a secure and efficient Helpdesk

Hong Kong privacy tsar Allan Chiang has been forced to clarify to bosses that it’s not OK to spy on their employees, after property company Hong Yip was found to have installed spy cameras in one of its buildings to monitor staff.

In a lengthy investigation report, the privacy commissioner revealed that two security guards in a building managed by Hong Yip had been fired for “unauthorised absences from duty” after a hidden camera caught them “lingering” in the staff changing room when they should have been doing official security guard stuff.

The two then took the case to the Office of the Privacy Commissioner for Personal Data (PCPD) after they found the obviously not very well-hidden camera.

Although Hong Yip maintains the spy cam was installed for security purposes – specifically to investigate complaints of trespassers distributing “promotional materials" in the car park – the commissioner found against the firm.

Here’s what Hong Kong privacy tsar Chiang had to say:

Covert monitoring by employers is generally regarded as highly privacy intrusive. Hence, covert monitoring should only be used when employers have no other alternative and if it is absolutely necessary to do so, eg, (a) there is a reasonable suspicion that an unlawful activity is about to be committed, is being committed or has been committed; (b) the need to resort to covert monitoring to detect or to collect evidence of that unlawful activity is absolutely necessary given the circumstances; and (c) the use of overt monitoring would likely prejudice the detection or the successful gathering of evidence of that unlawful activity.

He added that all employers should have a privacy policy on employee monitoring and that the policy should be clearly communicated.

In this instance Hong Yip escaped punishment as it had already dismantled the spy cam, although it is unclear what form of redress the two members of staff received. Presumably they’re not looking for their old jobs back.

An interesting footnote to the story, as reported by local paper The Standard, is that privacy chief Chiang was actually in charge of Hongkong Post in 2005 when six spy cameras were found at one of its branches. Chiang's statement regarding that breach is here. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Scrapping the Human Rights Act: What about privacy and freedom of expression?
Justice minister's attack to destroy ability to challenge state
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
4chan outraged by Emma Watson nudie photo leak SCAM
In the immortal words of Shaggy, it wasn't me us ... amirite?
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.