Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Electronic surveillance in the workplace
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Electronic surveillance in the workplace
Employer as Little Brother Introduction The term "Big Brother" is watching you refer to how the Federal Government can monitor your every move, if desired. From the amount you money you earn and how much you pay in taxes to who you are talking to and when on your telephone or cell phone. Now there is a new term beginning to common place, "Little Brother is watching you". This term refers to how an employer can monitor your actions on the job in an office environment due to the technology now available to the employer to monitor and read what you are doing on the company computer. And it is ironic that one such technology is a computer software program released in 1998 to monitor what the employee is doing on the company computer is actually called "LittleBrother". LittleBrother Created by the company "SurfControl", it uses a data base that has recorded over 45,000 internet web-sites that have been placed in the categories of productive, neutral or unproductive and has the capability to inform an employer if his/her employee's are working under those categories while on the job. This also includes the ability to read an employee's e-mails, sent and received, regardless of whether they have been deleted or not by the employee. And this is not a technological capability that companies are not seeking. As reported from a survey conducted by the Society of Human Resource Management in 1996. "36 percent of responding companies searched employee messages regularly and 70 percent said employers should reserve the right to do so.
In a world filled with technology we must ask ourselves, is technology taking us closer to the world of Big Brother? In the novel 1984 by George Orewell, Orwell has generated this unbelievable world in which no one would ever think to be possible, but then again pondering upon it our worlds are quite similar, it is slightly alarming. It was not noticed till recently that perhaps our technology is pulling us closer to the world of Big Brother. The technology used in the novel 1984 are correlated to the technology we use currently.
Is Big Brother watching our every computer move? Is the government (FBI, specifically) reading and filtering our email and where we go on the web? According to the critics of the FBI’s new CARNIVORE program, the answer is a resounding “yes”. However, according to FBI spokesperson John Collingwood (in a letter to the LA Times on August 7, 2000), CARNIVORE is not a government-backed spy program to invade the privacy of US citizens--it is an effective weapon (similar to phone taps) in the war against crime.
James Stacey Taylor's article, "In Praise of Big Brother: Why We Should Learn to Stop Worrying and Love Government Surveillance" begins reviewing the concept of "Big Brother" as it was originally presented in George Orwell's 1984. The Big Brother started off as a fictional character in 1984-- a dictator of Oceania within a totalitarian state. Set within a society in which everyone is under complete surveillance by the authorities, mainly by telescreens, the people are constantly reminded of this by the phrase “Big Brother is watching you” (Wikipedia) . Taylor goes on to explain some examples of recent surveillance technology and how it is applied in lives today. An interesting note and comparison between today’s technology and that of the telescreens in 1984, is that people could be sure that they could not be watched by Big Brother’s telescreens by going out of the cities into the country, where they only had to take care that their conversations were not monitored by hidden microphones (Taylor 227). He contrasts the two, highlighting the fact that “Such an escape is not impossible, for spy satellites can be used to monitor people wherever they go” (277). From there, Taylor perpetuates the framework for his position on the Big Brother notion. Taylor argues that, "rather than opposing such an expansion of surveillance technology, its use should be encouraged -- and not only in the public realm" (227). Taylor’s argument presented in a more formal construction is as follows:
Big Brother uses manipulation of language in order to limit expression. If one can't express feelings through language or literature, then self-expression is suppressed. In 1984, “Big Brother” wished to eliminate “Oldspeak” or standard English with Newspeak, which is a much diluted and simplified version. If the terminology isn't there, then the result would impact all literature that the common man comprehends. That being stated, people wouldn’t be capable of rebellion since they don't know what it is.
It is the way of life in this age, to search the internet for leisure, research and general amusement. When you are not able to communicate with someone face to face, you pick up the phone. When you venture out of your house for any reason and into populated areas, you are recorded by businesses, photographed by red light cameras, and recorded by traffic cameras. The government has the capacity to watch all of this use. Last year, Edward Snowden’s leaked documents proved it that Big Brother is indeed watching. (Orwell 1)
Big Brother is watching you (Orwell 3). Why is Big Brother so concerned with the surveillance of its citizens? In 1984, the journey of one individual, Winston Smith, is narrated. His life characterizes the recklessness and deprivation of totalitarianism governments have on not only individuals but communities by revealing the transformation of one monopolizing power to create a society of mindless, controlled civilians.... ...
Employers monitor email accounts and company computers mainly for two reasons. Reason one is that they don’t want their employees wasting company time for personal use. In most places, that is considered a very good reason, because if an employee is using company time for personal things, then work isn’t being done. Then it causes problems for everyone. Reason two is that employers want to make sure that employees aren’t doing anything illegal through either email or other internet sites.
Although this practice benefits the user as well, unrestricted profiling can become an alarming catastrophe. Unless the threat to internet users privacy are shown to exceed the benefits, we should not regulate the internet, rather we should educate the public how to be more responsible about their identities. Various web-based companies have developed techniques to document their customer’s data, enabling them to provide a more enhanced web experience. One such method called “cookies,” employs Microsoft’s web browser, Internet Explorer. It traces the user’s habits.
29 Privacy Rights Clearinghouse (2002) Employee Monitoring: Is There Privacy in the Workplace? . (6/3/2004)
Sometimes there is no middle ground. Monitoring of employees at the workplace, either you side with the employees or you believe management owns the network and should call the shots. The purpose of this paper is to tackle whether monitoring an employee is an invasion of privacy. How new technology has made monitoring of employees by employers possible. The unfairness of computerized monitoring software used to watch employees. The employers desire to ensure that the times they are paying for to be spent in their service is indeed being spent that way. Why not to monitor employees, as well as tips on balancing privacy rights of employees at the job.
One type of surveillance is employee monitoring. Many employers monitor their workers’ activities for one reason or another. Companies monitor employees using many methods. They may use access panels that requires employees to identify themselves to control entry to various area in the building, allowing them to create a log of employee movements. They may also use software to monitor attendance and work hours. Additionally, many programs allows companies to monitor activities performed on work computers, inspect employee emails, log keystrokes, etc. An emerging methods of employee monitor also include social network and search engine monitoring. Employers can find out who their employees are associated with, as well as other potentially incriminating information. (Ciocchetti)
There has always been surveillance of the general public conducted by the United States government, the usual justifications being upholding the security of the nation , weeding out those who intend to bring harm to the nation, and more. But the methods for acquiring such information on citizens of the united states were not very sophisticated many years ago so the impact of government surveillance was not as great. As a result of many technological advancements today the methods for acquiring personal information - phone metadata, internet history and more - have become much simpler and sophisticated. Many times, the information acquired from different individuals is done so without their consent or knowledge. The current surveillance of people
In this report, I will be addressing e-mail, Internet use, and privacy policies in my workplace; the current laws regulating employee e-mail and Internet privacy; the reasons to companies carry out e-mail and Internet use policies; the assumptions employees make about their privacy at work; and how these policies affect employee privacy at work.
How difficult (or easy) is it for an employer to prevent an employee working for others (or themselves), both during the employment and after it has ended? Refer to relevant cases and legislation.
One particular crime that could be committed by employees who use the internet at work is hacking. Hacking is one of the most well-known types of computer crimes, in this context, the term refers to the unauthorized access of another’s computer system (HG.org Staff, 2015). This means that if the employee in not allowed to use the internet, for personal use, than there is a possibility that they could get charged for such crime. Because the policy will state they do not have the authority to access the organizations computer system for personal use. In addition, they must know that all use of computers systems while at work will be monitor, including e-mails. Piracy and cyber terrorism are other crimes that one can face when using a computer