Contact us today!
561-795-2000 
844-795-2001

Save Money, Be Spied On?

Save Money, Be Spied On?

Although we’re in the habit of discussing ways to keep your business more secure, we unfortunately have to discuss how to keep yourself more secure against a business. Walmart recently filed a patent that could potentially be used to undermine the security of everyone there, from shoppers to employees. We took the time and dug into the jargon in the patent to give you a better look at the situation.

What “Listening to the Frontend” Has to Say
The patent, US010020004, depicts and describes a new method of data collection that could very well never be implemented. However, Listening to the Frontend, as it is titled, paints a concerning picture of how this technology could easily be abused at the expense of both customer, and Walmart employee. 

This is effectively a patent that stakes a claim to a particular method of recording the checkout process and the surrounding environment - sensing how many people are in line at a given time, so that another checkout aisle can be opened if needed. The goal is to increase customer satisfaction and cut back on costs, or as the patent puts it, “Tracking performance metrics for employees to ensure that the employees are performing their jobs efficiently and correctly can aid in achieving these cost savings and increases in guest satisfaction.” The system described in the patent would collect the data needed to determine many key metrics, including the efficiency of the bagging process based on audio input of the beep of the scanner and the rustling of the bags, the greetings that employees are using to interact with the guests, and even how long lines are at each checkout by analyzing the distance between the podium and the source of different sounds.

Did you catch that? Despite a statement that claimed with no uncertainty that this system would not be listening in on conversations between the customer and the employee, the patent itself disagrees somewhat by mentioning the system’s capability to “process the audio of the conversations to determine whether the employee stationed at the terminal is greeting guests.” It continues by clarifying, “If however the performance metric is based on the content of the conversation (e.g., was a specific greeting used or script followed), the system can process the audio detected by the sound sensors 102 (e.g., using speech recognition) to determine the performance metric.”

Why is Walmart Listening In?
The same reason most businesses to most anything - there’s money involved.

The patent makes it clear that the purpose of this system is to gather the performance metrics necessary to properly optimize the efficiency of the point-of-sale, which means that Walmart can get more customers out the door with less of their money left, and by doing so, make greater profits. Of course, this is not unexpected. Walmart is a business, after all, and so they will of course do whatever they have to in order to make as much money as they can. Even if shoppers don’t necessarily like how it is done, the idea of getting home sooner is a powerful motivation to shrug it off and adjust. If it means that less time is spent shopping, how bad could Listening to the Frontend really be?

Assistant Professor Ifeoma Ajunwa (of Cornell’s Industrial and Labor Relations School) has a few counterpoints, as she has recognized the amount of damage that this could lead to down the line.

The issues lie largely in the fact that Walmart’s employees have no union to protect their rights, which means that they pretty much don’t have the right to privacy in the workplace. Therefore, all Walmart has to do is establish that Listening to the Frontend had nothing to do with discrimination, and suddenly, the system can be legally installed without the employees being informed. Now think about anything you may have said about an employer when you thought nobody was listening - but we’re jumping ahead a bit.

For the moment, let’s play this out under the assumption that yes, these systems are intended to measure efficiency, exclusively, when they are installed. There is another concern that the study that Professor Ajunwa produced with her colleagues, Limitless Worker Surveillance, addresses that becomes extremely relevant: something called “mission creep.”

What is “Mission Creep?”
Technically speaking, this patent recognizes Listening to the Frontend as the idea for a productivity tool, a method of collecting the data necessary to adapt to changing circumstances so that the workflow can be optimized. If a line gets to be too long, other aisles will be opened up to account for the overflow - that kind of thing. Unfortunately, mission creep could quickly turn an okay thing into a potentially very bad thing - as it effectively refers to how technology can have its purpose changed, after it has already been implemented.

So, thanks to mission creep, even though the technology that is featured in Listening to the Frontend is officially meant to evaluate the length of lines and redistribute customers to keep traffic flowing, it could easily turn into a Big Brother-esque means of evaluating an employee’s performance while they work the register. This technology could clearly be used to collect the kind of data that could potentially “warrant” some form of corporate punishment.

Did you snap back at a crabby customer? Suspended. Are your lines consistently too long because you like to chat with the customers? Well, you’re fired.

How Else Surveillance can Affect Your Staff
Professor Ajunwa had more to say about the influence of systems like these. First of all, while these kinds of tactics are meant to increase productivity and efficiency, the opposite effect is just as common. On top of that, it can also make employees feel distrusted and unappreciated, which leaves them less engaged in their work. Guess what that doesn’t help to boost? Efficiency! Do you tend to work faster when you know that someone is watching?

Of course, Walmart is nothing more than a business, so of course they’re going to try to increase efficiency as much as possible. However, there are much better ways to do it than (potentially) secretly spying and evaluating their employees.

A Better Way
Here’s the thing about an employee - they won’t be surprised to learn they’re being watched if you tell them about it up front. So do that - make the announcement a part of a prospective hire’s onboarding process, and let them make the decision over whether or not they are comfortable. Inform them, again from the start, of the consequences of abusing, mishandling, or otherwise misbehaving with company equipment and time. Then, once everyone knows what will happen if they goof off, stay true to your word.

The problem that Walmart is having isn’t that they have the potential to listen in on their employees and customers, it’s that they aren’t being forthcoming about it, burying it in the legal jargon of a patent. That’s why people are concerned, more than any other reason.

People aren’t stupid - they get that there are valid and justifiable reasons for an employer to monitor the usage of their business’ computer network. They know that an employer will want to double-check that they aren’t checking their social media when they should be crunching numbers, or shopping when they should be ordering supplies, or watching some silly animal video when they should be watching a new training. There is a time and place for those things, and the office isn’t it

If you want a fair way to keep your employees honest about their use of work technology, without constantly overseeing them, FRS Pros can help. We have the solutions to help you limit distractions and ensure efficiency, all while keeping your network secure. To learn more, call us at 561-795-2000.

Augmented Reality Growth Presents Interesting Appl...
Tip of the Week: 5 Ways to Make Using Word Better
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, August 16 2018

Captcha Image

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Internet Network Security Business Management Software Tech Term Cloud Business Computing Google Hardware User Tips Microsoft Cybersecurity Malware Windows Hackers Computer Hosted Solutions Mobile Devices Browser Cybercrime Productivity Smartphone Data Backup Innovation Apps Operating System Efficiency Android Data Recovery Data Security Money Business Business Continuity Smartphones Phishing Alert Outsourced IT Office 365 Law Enforcement Ransomware Email Internet of Things Mobile Device Management Vulnerability Backup Network Saving Money Managed IT Services IT Support Microsoft Office Disaster Recovery VoIP Server Best Practice IT Support Chrome Data IT Services Windows 10 Information Technology Computers Upgrade Virtualization Managed Service Provider Blockchain Managed IT Two-factor Authentication Unsupported Software Telephone Systems Communications Windows 10 Tech Support App Employer-Employee Relationship Router Gadgets Cloud Computing Spam Applications Google Drive Information Collaboration Small Business Users Google Docs Hacking WiFi Patch Management Wireless Charging Devices OneNote Google Assistant Artificial Intelligence Gmail Save Money Application Government Audit Data Breach Robot Safety Data Protection Miscellaneous Travel Wireless Technology The Internet of Things Social Media Holiday Excel VPN Fraud iPhone Cost Management Risk Management Managed IT Services Data Management Augmented Reality Productivity WannaCry Facebook Commerce User Error Wi-Fi Sports Quick Tips Update Shortcut Cortana Politics Networking Hosted Solution Proactive IT Automation SaaS Avoiding Downtime Password BDR Mobile Security Data Storage Bring Your Own Device iOS WIndows Server 2008 Project Management Samsung PowerPoint Communication Windows Ink Going Green Social Gifts Touchpad Computing Windows 10s HBO Computer Care Nanotechnology Identity Comparison Legal Screen Mirroring Hybrid Cloud Licensing Updates Files Encryption Microsoft Excel IT budget DDoS Unified Threat Management Antivirus Wireless Internet Outlook Google Maps Spyware Recovery Meetings Value Credit Cards Humor App store Passwords Disaster Solid State Drive Budget Root Cause Analysis Data Privacy Specifications Virus Emails Cast Amazon Microsoft Word Computer Fan File Sharing Upgrades Gamification Hard Disk Drive Emergency IT Management Software as a Service Apple Administrator Maintenance Reputation Streaming Media Point of Sale Hard Drive Sales Proactive Lithium-ion battery Marketing BYOD Virtual Assistant Tablets Storage Data storage Social Engineering Memory Sync Evernote History IT Solutions Remote Computing Edge Health Access Identity Theft Computer Forensics FAQ NFL eWaste Chromecast Chromebook Retail Websites Webinar Alexa for Business Identities Settings Telephony Consultant Financial Wireless Data Loss Ciminal Search Internet Exlporer Workplace Tips Remote Monitoring Vendor Management Management Charger Mobility Word Transportation Device Security Printing Conferencing Laptop Data Theft IT solutions Legislation Language Uninterrupted Power Supply Touchscreen Adobe Workers Private Cloud Virtual Reality Work/Life Balance Compliance Mobile Device Crowdsourcing Employer Employee Relationship Current Events Electronic Medical Records Benefits Phone System Save Time End of Support HaaS Regulation Relocation Computer Accessories Battery Smart Technology Flexibility Music Instant Messaging Hacker es Personal Information Twitter PDF Scalability Analytics Keyboard Thank You Entertainment Mobile Computing Black Market Cleaning Bandwidth Cache Automobile Office Text Messaging Big Data Training Managing Stress Monitors Congratulations USB Worker Television CrashOverride Scam Office tips How To Books Company Culture Education Hiring/Firing Advertising Video Games Experience