Contact us today!

Network Solutions Unlimited Blog

Save Money, Be Spied On?

Save Money, Be Spied On?

Although we’re in the habit of discussing ways to keep your business more secure, we unfortunately have to discuss how to keep yourself more secure against a business. Walmart recently filed a patent that could potentially be used to undermine the security of everyone there, from shoppers to employees. We took the time and dug into the jargon in the patent to give you a better look at the situation.

What “Listening to the Frontend” Has to Say
The patent, US010020004, depicts and describes a new method of data collection that could very well never be implemented. However, Listening to the Frontend, as it is titled, paints a concerning picture of how this technology could easily be abused at the expense of both customer, and Walmart employee. 

This is effectively a patent that stakes a claim to a particular method of recording the checkout process and the surrounding environment - sensing how many people are in line at a given time, so that another checkout aisle can be opened if needed. The goal is to increase customer satisfaction and cut back on costs, or as the patent puts it, “Tracking performance metrics for employees to ensure that the employees are performing their jobs efficiently and correctly can aid in achieving these cost savings and increases in guest satisfaction.” The system described in the patent would collect the data needed to determine many key metrics, including the efficiency of the bagging process based on audio input of the beep of the scanner and the rustling of the bags, the greetings that employees are using to interact with the guests, and even how long lines are at each checkout by analyzing the distance between the podium and the source of different sounds.

Did you catch that? Despite a statement that claimed with no uncertainty that this system would not be listening in on conversations between the customer and the employee, the patent itself disagrees somewhat by mentioning the system’s capability to “process the audio of the conversations to determine whether the employee stationed at the terminal is greeting guests.” It continues by clarifying, “If however the performance metric is based on the content of the conversation (e.g., was a specific greeting used or script followed), the system can process the audio detected by the sound sensors 102 (e.g., using speech recognition) to determine the performance metric.”

Why is Walmart Listening In?
The same reason most businesses to most anything - there’s money involved.

The patent makes it clear that the purpose of this system is to gather the performance metrics necessary to properly optimize the efficiency of the point-of-sale, which means that Walmart can get more customers out the door with less of their money left, and by doing so, make greater profits. Of course, this is not unexpected. Walmart is a business, after all, and so they will of course do whatever they have to in order to make as much money as they can. Even if shoppers don’t necessarily like how it is done, the idea of getting home sooner is a powerful motivation to shrug it off and adjust. If it means that less time is spent shopping, how bad could Listening to the Frontend really be?

Assistant Professor Ifeoma Ajunwa (of Cornell’s Industrial and Labor Relations School) has a few counterpoints, as she has recognized the amount of damage that this could lead to down the line.

The issues lie largely in the fact that Walmart’s employees have no union to protect their rights, which means that they pretty much don’t have the right to privacy in the workplace. Therefore, all Walmart has to do is establish that Listening to the Frontend had nothing to do with discrimination, and suddenly, the system can be legally installed without the employees being informed. Now think about anything you may have said about an employer when you thought nobody was listening - but we’re jumping ahead a bit.

For the moment, let’s play this out under the assumption that yes, these systems are intended to measure efficiency, exclusively, when they are installed. There is another concern that the study that Professor Ajunwa produced with her colleagues, Limitless Worker Surveillance, addresses that becomes extremely relevant: something called “mission creep.”

What is “Mission Creep?”
Technically speaking, this patent recognizes Listening to the Frontend as the idea for a productivity tool, a method of collecting the data necessary to adapt to changing circumstances so that the workflow can be optimized. If a line gets to be too long, other aisles will be opened up to account for the overflow - that kind of thing. Unfortunately, mission creep could quickly turn an okay thing into a potentially very bad thing - as it effectively refers to how technology can have its purpose changed, after it has already been implemented.

So, thanks to mission creep, even though the technology that is featured in Listening to the Frontend is officially meant to evaluate the length of lines and redistribute customers to keep traffic flowing, it could easily turn into a Big Brother-esque means of evaluating an employee’s performance while they work the register. This technology could clearly be used to collect the kind of data that could potentially “warrant” some form of corporate punishment.

Did you snap back at a crabby customer? Suspended. Are your lines consistently too long because you like to chat with the customers? Well, you’re fired.

How Else Surveillance can Affect Your Staff
Professor Ajunwa had more to say about the influence of systems like these. First of all, while these kinds of tactics are meant to increase productivity and efficiency, the opposite effect is just as common. On top of that, it can also make employees feel distrusted and unappreciated, which leaves them less engaged in their work. Guess what that doesn’t help to boost? Efficiency! Do you tend to work faster when you know that someone is watching?

Of course, Walmart is nothing more than a business, so of course they’re going to try to increase efficiency as much as possible. However, there are much better ways to do it than (potentially) secretly spying and evaluating their employees.

A Better Way
Here’s the thing about an employee - they won’t be surprised to learn they’re being watched if you tell them about it up front. So do that - make the announcement a part of a prospective hire’s onboarding process, and let them make the decision over whether or not they are comfortable. Inform them, again from the start, of the consequences of abusing, mishandling, or otherwise misbehaving with company equipment and time. Then, once everyone knows what will happen if they goof off, stay true to your word.

The problem that Walmart is having isn’t that they have the potential to listen in on their employees and customers, it’s that they aren’t being forthcoming about it, burying it in the legal jargon of a patent. That’s why people are concerned, more than any other reason.

People aren’t stupid - they get that there are valid and justifiable reasons for an employer to monitor the usage of their business’ computer network. They know that an employer will want to double-check that they aren’t checking their social media when they should be crunching numbers, or shopping when they should be ordering supplies, or watching some silly animal video when they should be watching a new training. There is a time and place for those things, and the office isn’t it

If you want a fair way to keep your employees honest about their use of work technology, without constantly overseeing them, Network Solutions Unlimited can help. We have the solutions to help you limit distractions and ensure efficiency, all while keeping your network secure. To learn more, call us at 217-428-6449.

Augmented Reality Growth Presents Interesting Appl...
Tip of the Week: 5 Ways to Make Using Word Better


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Saturday, October 20 2018

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Monitor Instant Messaging Shadow IT Saving Money Wireless Network Security Remote Computing Testing Social Media Best Practices Office Tips Specifications Productivity Experience Work/Life Balance Books Data VPN Gamification Computers Battery Windows 7 Automobile End of Support Electronic Medical Records Server Innovation Scam Flexibility Managed Service IT budget Proactive Television Data Security Audit Identities Comparison Display App Cloud Excel Computing Apple Remote Monitoring Storage Phone System Mobile Device Management PDF Windows Ink Update Education Cost Management Operating System Computer Fan Information The Internet of Things Efficiency Reputation Laptop Encryption Mobile Security Spam User Error Consultant Monitoring Network FAQ Communications Cortana Miscellaneous Outsourced IT Smart Technology Computing Infrastructure Email Data Recovery iPhone How To Connectivity Managed IT Vendor Management Fraud Personal Information Students Smartphones Computer Care Charger Passwords Hyperlink MSP Twitter Spam Blocking Physical Security CrashOverride Internet Device Security Humor SaaS IT Services Wasting Time IT Support Co-Managed Services Patch Management Upgrades Employer Employee Relationship Government Sports Spyware IT Support Hard Disk Drive Application Root Cause Analysis Travel Project Management Alert Virtual Reality Webinar Unsupported Software How to Adobe Small Business Managed IT Services Antivirus Downtime HIPAA Managing Stress Google Drive Gadgets Content Hiring/Firing Tech Term Customer Hacking Redundancy Managed IT Service Automation Worker Commute Business Advertising Tablets Save Money IT Management Printers USB Backup Virus Licensing Smartphone Mobility Value Edge Technology Employer-Employee Relationship Computer eWaste User Tips Training Upgrade Gmail Data Privacy Wireless Charging Amazon Black Market Transportation Assessment Cloud Computing Avoiding Downtime Cybercrime Updates Unified Threat Management Meetings Scalability Productivity Peripheral Telephone Business Owner Cleaning PowerPoint Conferencing Business Management Loyalty Malware Mobile Devices Users Proactive IT Mobile Evernote Privacy Devices Hybrid Cloud Password Blockchain Ransomware HaaS Screen Mirroring Document Management Printing Vendor Financial Microsoft Word File Sharing Monitors Google Docs Bluetooth Safety Data Storage Hard Drives Business Computing Lifestyle Chromecast Websites Holiday Chrome Tech Support Computer Accessories Legal Smart Tech Google Assistant Budget Best Practice Touchpad Data Management Internet exploMicrosoft Outlook Congratulations Private Cloud Unified Communications Recovery Browser Information Technology hacker Two Factor Authentication Emergency Data Backup Thank You Office 365 Save Time Credit Cards Software Shortcut Worker Wi-Fi Microsoft Office Keyboard Robot IoT Audiobook Settings Router Solid State Drive Content Filtering Accessory Workplace Tips Windows 10s iOS Administration Legislation Identity Financial Technology Professional Services Android Tip of the Week Data Theft Bandwidth Artificial Intelligence Phishing Streaming Media Internet of Things Microsoft Excel Communication Apps Software as a Service Files Troubleshooting Samsung Microsoft Two-factor Authentication Techology Dark Web Company Culture OneNote WannaCry Alexa for Business Augmented Reality Hosted Solutions Compliance Camera Memory WPA3 Wireless Technology WIndows Server 2008 Firewall Commerce NFL Public Computer Benefits Word Colocation History HBO Gifts App store Hackers Language Cache Entertainment Politics Telephone Systems Relocation File Storage Business Continuity Google Maps Data Loss Cast Identity Theft Sync VoIP Hosted Solution Regulation Ciminal Sales Hard Drive Emails Hardware Retail Computer Forensics Data storage Rootkit Business Intelligence Data Breach Marketing IT solutions BYOD Health Touchscreen Virtual Assistant Maintenance Networking Virtualization Wasting Money Social Engineering Collaboration Money Applications Workers Data Protection Managed IT Services Mobile Device Chromebook Content Filter Quick Tips IT Solutions Management Google Internet Exlporer Office Wireless Internet Managed Service Provider Public Cloud Video Games Analysis Disaster Recovery Business Technology WiFi Search Windows BDR Projects Windows 10 Bring Your Own Device Employee-Employer Relationship Security Going Green intranet Cybersecurity Risk Management Nanotechnology Windows 10 Vulnerability Big Data Facebook Law Enforcement