Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
How does technology threaten or influence privacy
How does technology threaten or influence privacy
How does technology threaten or influence privacy
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: How does technology threaten or influence privacy
Ethical Management of E-mail Privacy
As I am sitting at my work station in a crowded office building, I hear the wonderful sound of "You've got mail." In turn I open my E-mail mailbox and find a letter from a nearby employee. This letter contains the usual funny joke of the day and a short joke ridiculing the boss, as usual. Who was to know that my supervisor would eventually find this letter, which would lead to both the termination of my job and my fellow employee? Do you feel this is right?
Does this sound common? This may sound common because the issue of E-mail and privacy is very common and controversial in our advanced technological world. The determination of what is ethical or unethical is not simple or straightforward. Employers and employees may have seen the ethical and legal issues associated with E-mail privacy differently. E-mail has become indispensable in the modern=day workplace, more often employers are realizing that E-mail communication systems can increase the efficiency of communications internally. Along with this increase in the use of E-mail come legal issues involving employee privacy and monitoring. The laws addressing an employer's rights to monitor E-mail traffic and employees' rights to E-mail privacy are still evolving (Lyford 28).
After much research, I believe employers should have the right to check employee E-mail, because E-mail is a company resource and a property right. Organizations have an obligation to themselves, their employees, their business partners, customers and society at large to act in an ethically responsible manner regarding their E-mail policies. Companies have many justified reasons for searching employee files such as preventing personal use or abuse of...
... middle of paper ...
...ularity poses workplace privacy problems. Business First, Oct., 1-3.
Rainone, Sebastian M.; Spinior, Janice C.; et al (1998). Ethical Management of Employee E-mail Privacy. Information Strategy Spring , 17(3), 3,7,34.
Repa, Barbara Kate (1999, March 5). Computers and E-mail on the Job: They're. Retrieved June 15, 2006 from, Web site: Http://www.nolo.com/ChunkEMP/computers.html
Richard, Diane (1999, January). E-mail Ethics: Bosses Can Pry if They Want To. Corporate Report-Minnesota, 74-76.
Van Doren, Jeffrey A (1996). E-mail Monitoring Policies- A Must For Employers. Supervisory Management, 5.
Watson, Nathan (2001, December). The private workplace and the proposed "Notice of Electronic Monitoring Act": Is "notice" enough? Retrieved July 9, 2006 from Axia College University of Phoenix, InfoTrac OneFile via Thomson Gale.
Harris, David. “Electronic Mail Etiquette.” School of Computing. 1997. Queens University 14 July 2003 .
Print Lazar, Wendi S. “Limitations to Workplace Privacy: Electronic Investigations and Monitoring” Computer and Internet Lawyer (2012): SIRS. Web. The Web. The Web.
Hertenstein, Edward. "Electronic Monitoring in the Workplace: How Arbitrators Have Ruled." Dispute Resolution Journal, 52.4 (1997): 36.
Privacy in the Workplace Introduction Technology has developed in leaps and bounds over the past few decades. The case is that the law always has difficulty keeping pace with new issues and technology and the few laws that are enacted are usually very general and obscure. The main topic of this paper is to address the effect of technology on privacy in the workplace. We have to have an understanding of privacy before trying to protect it. Based on the Gift of Fire, privacy has three pieces: freedom from intrusion, control of information about one's self, and freedom from surveillance.1 People's rights have always been protected by the constitution, such as the Fourth Amendment, which protects people from "unreasonable searches and seizures".
Sometimes there is no middle ground. Monitoring of employees at the workplace, either you side with the employees or you believe management owns the network and should call the shots. The purpose of this paper is to tackle whether monitoring an employee is an invasion of privacy. How new technology has made monitoring of employees by employers possible. The unfairness of computerized monitoring software used to watch employees. The employers desire to ensure that the times they are paying for to be spent in their service is indeed being spent that way. Why not to monitor employees, as well as tips on balancing privacy rights of employees at the job.
Stead, Bette Ann. Privacy and Rights In The Work Place. Houston: University of Houston, College of Business Administration, 1998.
Ultimately, however, surveillance is only a tool that can be used both ethically and unethically. Employee monitoring, consumer data collection, and government surveillance provides great benefits, including improving company efficiency, providing commercial and health values, and protecting the nation from threats. However, when considering the extent to which surveillance can be done, the rights of the people affected must be taken into account. Finding the right balance between these two views is the key to maximizing the benefits of everyone involved.
Student José Amador likes to use his email account at yahoo.com. "I find paper so obsolete," he says. Amador is not worried about the privacy of this account. Perhaps he and the many other people that use yahoo email should be concerned, however. All users of Yahoo mail are having their actions tracked.
Whitman, M., & Mattord, H. (2011). Reading & cases in information security: law & ethics. (2011 custom ed., p. 264). Boston, MA: Cengage Learning.
This paper will discuss not only the rights of the employee in the workplace, but also the company’s obligation to ensure a safe working environment. An employee has the right to privacy in the workplace. However, these rights are fewer at work than in their personal life. There is debate on what is moral, ethical, and legal in regards to monitoring the actions of an employee in the workplace by the employer.
Making sure that there is no form of violence, harassment, or discrimination occurring at the workplace. However, the focus of this research paper is how electronic surveillance in the workplace is
The software they implemented would use various methods of monitoring in the workplace these include key logging, CCTV and recording telephone conversations. These methods can have various positive effects on a company but also some negative eff...
In Australia, Employers should implement best practice on how to maintain privacy in the workplace in accordance with the privacy standards set out in the Australian Privacy Principles (APPs) (Welcome to the Fair Work Ombudsman website. n.d.). Privacy is able to keep our own personal information private and also able to do things without any electronic monitoring in the workplace. Nowadays, many company increased the usage of technology such as internet and email in the workplace. This can create issues in privacy. When employees’ access to web browsing activities during working hours, the employer can be scrutinized it. Employers take this action due to fear lawsuit if employees act in inappropriate ways. Therefore, the best policy is to explain clearly how is appropriate to use email and internet at work and outline what type of use is prohibited in the workplace. Besides that, employer also needs to ensure the employee didn’t disclose or disseminate any important information to the competitors or
One particular crime that could be committed by employees who use the internet at work is hacking. Hacking is one of the most well-known types of computer crimes, in this context, the term refers to the unauthorized access of another’s computer system (HG.org Staff, 2015). This means that if the employee in not allowed to use the internet, for personal use, than there is a possibility that they could get charged for such crime. Because the policy will state they do not have the authority to access the organizations computer system for personal use. In addition, they must know that all use of computers systems while at work will be monitor, including e-mails. Piracy and cyber terrorism are other crimes that one can face when using a computer
Foxman, E. R., & Kilcoyne, P. (n.d.). Information technology, marketing practice, and consumer privacy: ethical issues. Journal of Public Policy & Marketing, 12(1), 106-119.