27.02.2018 Views

HRM textbook

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

474 PART 5 EMPLOYEE RELATIONS<br />

FIGURE 14-6 Summary of Fair<br />

Discipline Guidelines<br />

Make sure the evidence supports the charge.<br />

Make sure the employee s due process rights are protected.<br />

Warn the employee of the disciplinary consequences.<br />

The rule that was allegedly violated should be reasonably related to the efficient<br />

and safe operation of the work environment.<br />

Fairly and adequately investigate the matter before administering discipline.<br />

The investigation should produce substantial evidence of misconduct.<br />

Apply all rules, orders, or penalties evenhandedly.<br />

The penalty should be reasonably related to the misconduct and to the employee s<br />

past work.<br />

Maintain the employee s right to counsel.<br />

Don t rob a subordinate of his or her dignity.<br />

Remember that the burden of proof is on you.<br />

Get the facts. Don t base a decision on hearsay or on your general impression.<br />

Don t act while angry.<br />

In general, do not attempt to deal with an employee s bad attitude. Focus on improving<br />

the specific behaviors creating the workplace problem.<br />

Employee Privacy<br />

For most people, invasions of privacy are neither ethical nor fair. 69 The four main<br />

types of employee privacy violations upheld by courts are intrusion (locker room<br />

and bathroom surveillance), publication of private matters, disclosure of medical<br />

records, and appropriation of an employee s name or likeness for commercial<br />

purposes. 70 (Breaching security of personnel files is a related problem, as we<br />

discussed in Chapter 5 [Recruiting]). One survey of security professionals ranked<br />

human resources last among departments securing such confidential data. 71 ) In<br />

practice, background checks, monitoring off-duty conduct and lifestyle, drug testing,<br />

workplace searches, and monitoring of workplace activities trigger most privacy<br />

violations. 72 Some employers, such as Eastman Kodak, are appointing chief privacy<br />

officers to ensure that the human resource management and other departments don t<br />

endanger the company by conducting inappropriate investigations of job applicants<br />

or employees. 73 We ll now look more closely at monitoring.<br />

Employee Monitoring<br />

Employee monitoring is pervasive. Biometrics using physical traits such as fingerprints<br />

or iris scans for identification is one example. Thus, New York s Bronx Lebanon<br />

Hospital uses biometric scanners to ensure that the employee who clocks-in in the<br />

More employers are using iris<br />

scanning to verify employee<br />

identity.<br />

Source: Tim Chapman/Getty Images USA, Inc..

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!