Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Electronic surveillance in the workplace
Employee surveillance crime prevention
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Electronic surveillance in the workplace
The Ethics of Workplace Surveillance
You get to work, login, check your email, and examine the values of your stocks. Have you done something wrong? Should your manager care about what you do with those couple of minutes? Hypothetically, if you consider 48 working days per year, with 40 hours per weeks (totally 9,600 hours of work a year), then the daily five minutes of personal internet usage mounts to approximately 24 hours (three working days) of wasted company time. In a capitalist economy, such inefficiency impedes the goal to maximize profit; therefore, compelling businesses to turn to rigorous surveillance to discourage inappropriate use of company resources and to promote productivity. As the American legislative and judicial culture has generally upheld companies’ proprietary rights to monitor their employees at the expense of employees’ privacy, civil libertarians have protested to what they claim to be direct violation of the employees’ right to privacy, which the First, Third, Fourth, and Fifth Amendment implicitly guarantee.
Civil libertarians celebrated a small victory on September 2001, when a federal appeals court judge, Alex Kozinski, ordered the administrative office to withdraw software tracking the online activities of all employees in his Ninth Circuit Court of Appeals. Because the recent September 11 terrorist attacks heightened national security paranoia, bureaucrats in the court’s administrative office proposed a surveillance policy entailing unrestricted administrative review of emails and Internet use of all 30,000 federal court employees, including judges. The panel of judges decided that the policy unreasonably assumed that employees had no expectation of priva...
... middle of paper ...
...eillance.htm>.
Gordon, Philip L. "Federal Judge's Victory Just the First Shot in the Battle Over Workplace Monitoring." Privacy Foundation Sep. 2001.
Marshall, Patrick. “Privacy Under Attack.” CQ Researcher. 15 Jun. 2001. <http://0-library.cqpress.com.sculib.scu.edu/cqresearcher/search.php>. (requires access to SCU library online databases)
Schulman, Andrew. "Fatline & AltaVista: 'Peer Pressure Employee Monitoring." Privacy Foundation Jun. 2001.
Schulman, Andrew. "One-Third of U.S. Online Workforce Under Internet/E-mail Surveillance." Privacy Foundation Aug. 2001.
Spinello, Richard. CyberEthics: Morality and Law in Cyberspace. Sudbury, MA: Jones and Bartlett Publishers, 2003.
Worsnop, Richard L. “Privacy in the Workplace.” CQ Researcher. 19 Nov. 1993. <http://0-library.cqpress.com.sculib.scu.edu/cqresearcher/search.php >.
Taylor, James Stacey. "In Praise of Big Brother: Why We Should Learn to Stop Worrying and Love Government Surveillance." Public Affairs Quarterly July 2005: 227-246.
Edward Snowden is America’s most recent controversial figure. People can’t decide if he is their hero or traitor. Nevertheless, his leaks on the U.S. government surveillance program, PRISM, demand an explanation. Many American citizens have been enraged by the thought of the government tracing their telecommunication systems. According to factbrowser.com 54% of internet users would rather have more online privacy, even at the risk of security (Facts Tagged with Privacy). They say it is an infringement on their privacy rights of the constitution. However, some of them don’t mind; they believe it will help thwart the acts of terrorists. Both sides make a good point, but the inevitable future is one where the government is adapting as technology is changing. In order for us to continue living in the new digital decade, we must accept the government’s ability to surveil us.
"Internet Privacy." Congressional Quarterly Researcher 8.41 ( Nov. 6, 1998 ). Busse Library, Cedar Rapids . 6 July 2003 <http://library.cqpress.com/cqresearcher>
Carr, Pete. “Tracking Is an Assault on Liberty, With Real Dangers.” The Wall Street Journal. 6 Aug. 2010. Web.
Emily often eats her favorite sandwich in a certain restaurant. Once, she mentioned the restaurant in a text message to her friend with whom she wanted to meet there. Then, she searched for some movies on the Internet. She did not believe to what she had seen. All of the pages she visited had small advertisement banners on the sides promoting near restaurants that offer the sandwich she likes. She was frightened and began to question what all the Internet knows about her and who all can access her private information. Since more and more of daily activities are moved to the online world, larger amount of private information is shared on the Internet. Schools, government offices, banks, and many other institutions frequently require the use of the Internet. Citizens of the United States who enter Internet web sites, often unwittingly, expose themselves to large scale tracking and personal information sharing from which they can hardly escape while putting their personal information in jeopardy of abuse; therefore, the United States should outlaw the sharing of personal information acquired through the Internet with third parties in order to protect citizens’ privacy.
Solove, Daniel J. “5 Myths about Privacy” Washington Post: B3. Jun 16 2013. SIRS. Web. 10
24 Privacy Rights Clearinghouse (2002) Employee Monitoring: Is There Privacy in the Workplace? . (6/3/2004)
LeRoux, Yves. "Privacy concerns in the digital world." 03 Oct 2013. Computer Weekly. 24 April 2014 .
Sometimes there is no middle ground. Monitoring of employees at the workplace, either you side with the employees or you believe management owns the network and should call the shots. The purpose of this paper is to tackle whether monitoring an employee is an invasion of privacy. How new technology has made monitoring of employees by employers possible. The unfairness of computerized monitoring software used to watch employees. The employers desire to ensure that the times they are paying for to be spent in their service is indeed being spent that way. Why not to monitor employees, as well as tips on balancing privacy rights of employees at the job.
One type of surveillance is employee monitoring. Many employers monitor their workers’ activities for one reason or another. Companies monitor employees using many methods. They may use access panels that requires employees to identify themselves to control entry to various area in the building, allowing them to create a log of employee movements. They may also use software to monitor attendance and work hours. Additionally, many programs allows companies to monitor activities performed on work computers, inspect employee emails, log keystrokes, etc. An emerging methods of employee monitor also include social network and search engine monitoring. Employers can find out who their employees are associated with, as well as other potentially incriminating information. (Ciocchetti)
Perhaps the founder of Facebook, Mark Zuckerberg, said it best when he claimed that privacy is no longer a “social norm.” Virtually everyone has a smart phone and everyone has social media. We continue to disclose private information willingly and the private information we’re not disclosing willingly is being extracted from our accounts anyway. Technology certainly makes these things possible. However, there is an urgent need to make laws and regulations to protect against the stuff we’re not personally disclosing. It’s unsettling to think we are living in 1984 in the 21st century.
Powell, Robert. "Four Ways Technology Invades Your Privacy." Lovemoney.com. N.p., 5 Oct. 2011. Web. 15 Apr. 2014.
A major reason the U.S. needs to increase restrictions on the type and amount of data collected on individuals from the internet is due to the fact that the United States government can track communications and browsing histories of private citizens without warrant or cause. After the terrorist attacks of September 11, 2001, ...
Novakovic, J. (2012). Responsibility in Application of ICT as Legal, Moral and Ethical Issues. Retrieved from http://ieeexplore.ieee.org.libaccess.hud.ac.uk/stamp/stamp.jsp?tp=&arnumber=6419151
Barbour, Ian Ethics in An Age Of Technology. Harper Collins Publishers Inc: New York, 1993