• Non ci sono risultati.

Guarda Il controllo delle attività informatiche e telematiche del lavoratore: alcune considerazioni informatico giuridiche

N/A
N/A
Protected

Academic year: 2021

Condividi "Guarda Il controllo delle attività informatiche e telematiche del lavoratore: alcune considerazioni informatico giuridiche"

Copied!
2
0
0

Testo completo

(1)

Control of telematic and informatics workers' activities:

some legal-computing considerations.

GIOVANNI ZICCARDI University of Milano

giovanni.ziccardi@unimi.it

1. 1. The ontology of control in the technologic era: from Orwell to Kafka.

The control, through technological instruments, of human beings in general, and of the worker on the workplace – or outside the premises of the company – in particular, has always been strictly connected with technological evolution.

In the 70’s and in the 80’s, attention was focused, especially, on company telephones, on crown cars and on the activities performed in the company premises, for example introducing partitions made of transparent glass, windows and cameras.

The control system was “classic”, in a pure Orwellian style: a centre performing controls, in real time, through cameras, which were often placed in hidden places in order to permit a concealed surveillance. Beside technology, traditional techniques were still more efficient: the main method was in fact to resort to archives filled out with information provided especially, in those years, by informers acting from parishes and police stations. Working life, including union positions and political opinions of the worker kept under surveillance, was controlled through the aforementioned technologies; private life, save for exceptional cases, was controlled by collecting information and filling out dossiers and archives.

The Workers’ Statute tried, above all, to avoid these cases of concealed surveillance, which were considered, in those years, as the most invasive and deceitful methods of control.

(2)

G.ZICCARDI, Control of telematic and informatics workers' activities

LLI, Vol. 2, No. 1, 2016, ISSN: 2421-2695 II

Around the end of 90’s, attention moved increasingly towards cameras, which could not only register in real time, but were equipped with a technology permitting to memorize information also for long periods. This matter was immediately regulated in data protection statutes: even if the rules set forth in the Workers’ Statute were maintained, privacy laws intervened in this field, introducing a strict regulation with the aim to make visible that kind of controls.

Later, mobile phones, which allowed to take photos or films also unbeknown of the worker, arose as a new issue. These new technologies opened the modern era in connection with the development of internet, drones, company devices, spy software, phones which could be activated remotely (therefore allowing to put in discussion also the untouchable principle of the limited duration of the working time), GPS devices that may be

placed on the crown car or on the worker’s body.

The abovementioned elements created a framework permitting, nowadays, a range of controls that has never been experimented in the past.

Therefore, the ontology of control has been completely modified. From an Orwellian method, dangerous but easy to be predicted and opposed (it was a kind of evolution of the traditional “looking eye”), the technological evolution conducted to a Kafkian method of control, extremely fragmented, complicated, similar to a labyrinth, obscure and bureaucratized, made of intersections of working and private data and characterized by the presence of technical problems that the worker can hardly understand, by the presence of liability chains (granting to the system administrator a linchpin role or, in any case, a stronger position – a new kind of power – to people with more informatic competences) and by an almost disappeared separation between working and private life (as a consequence of the technological evolution).

The present control, performed through technological instruments, has become centralized and capillary (and often, as we will see, it begins from the control devices placed on the worker’s body), difficult to understand, technically advanced and, frequently, indiscriminate.

Riferimenti

Documenti correlati

In this graphic document that encompasses the entire city, the study area is represented as a ste- ep and difficult access area between the river wall on the right and the

The chapter begins by making practical suggestions about communicating a ter- minal diagnosis to a patient and family, then turns to treatment planning and making any decisions to

But the probabilistic approach to knowledge has also affected other areas of human inquiry and activity, especially the development of technology and consequently the rise of

The analysis of bibliographical production shows an accelerated growth in the number of publications on the topic, driven primarily by Anglo-Saxon countries (USA, UK and Canada)

The Second chapter analyses instead the provisions of the Constitution where the word security is quoted and gives account of the importance of it: it is one of the functions

, 2n} with n cycles all of length greater than 1, that is with all cycles of

[r]

One compound can have a higher affinity for the stationary phase with a particular mobile phase and will present a higher retention time than another metabolite with a lower