Featured Post

The Minutemen and Their World Free Essays

Robert A. Net in his book, â€Å"The Minutemen and Their World†, takes a closer glance at the American Revolution by researching...

Tuesday, May 12, 2020

Legal and Ethical Aspects of Electronic Monitoring and...

mANAGEMENT 350: hUMAN RESOURCE mANAGEMENT | â€Å"Legal and Ethical Aspects of Electronic Monitoring and Surveillance of Employees† | | By: Chakana Moore, Patricia Davis, Eric Luken, Michelle Dailey, Jeffrey Webb | | 11/21/2011 Electronic Monitoring and Surveillance Human Resource Management Research Project November 21, 2011 Legal and Ethical Aspects of Electronic Monitoring and Surveillance of Employees Introduction Workplace monitoring has been a point of discussion within businesses as Human Resource Management feels that there is a need to watch their employees and how they conduct themselves at all times during the work day. Unless a government employee, employees are subject to any monitoring the employer†¦show more content†¦Last exception is the â€Å"consent†. â€Å"Consent† exception applies to even when the sender of the intercepted communication has been assured that all email communications would remain confidential and privileged. In Smyth v The Pillsbury Company, Smyth sent emails to his supervisor that contained unprofessional comments from his home computer. Because his supervisor gave consent to the company to intercept the emails and the emails were later retrieved by the courts, Smyth was terminated and was not able to be protected under the consent exception. A second commonplace monitoring method used by employers is internet tracking . Internet tracking can be used to visit non-work websites like Facebook and Yahoo accounts. Statistics show over 90% of employees admits to visiting other websites doing work hours. About 76% of firms monitor internet use. This can help companies prevent employees from going to inappropriate sites which could possibly create legal issues. For instance, a New Jersey case contained a log that showed one employee accessing porn websites. This activity caused an employee to be arrested due to repeatedly logging on that site when told by his supervisor to stop. Also, this type of activity draws attention to companies and causes law enforcement to get involved and companies can be charged with aiding and abetting legal behavior if found with evidence. A third form of employeeShow MoreRelatedA Brief Note On Privacy And Electronic Monitoring2350 Words   |  10 Pages Moral Rights in the Work Place Research Question: Privacy and Electronic Monitoring in the Work Place? Introduction: Work is one of the most important and highly valued human activities in large part because it is necessary for so many other central human goods. Moral Rights and Work are connected because by the actions of others opportunities to work can be jeopardized. The expansion and proliferation of technology has dawned a new era. Employers can easily monitor various side ofRead MoreShould Privacy Be Careful Of Who Is Watching Privacy? Essay2177 Words   |  9 PagesEmployment Monitoring Employee monitoring has been on the rise since the boost for technology in the business world. Different Organizations engage in monitoring of employee’s to track performance and to avoid legal liability, protect business secrets and to address other concerns such as security. Certain monitoring practices are not upheld by employees because of the downfall it has on their satisfaction of privacy. Employers typically must not show some of their private monitoring duties whileRead MoreThe Value Of Digital Privacy In An Information Technology Age1799 Words   |  7 Pagesvolatile catalyst that continues to change the ethical, legal and personal landscape rights of digital privacy in the information technology age. The depth and pace of change that is occurring in the areas of capturing, aggregating, analyzing and using personal data is unprecedented and will continued to escalate as new risks emerge (Ottensmeyer, Heroux, 1991). In conjunction with these volatile catalysts of ch ange, there has never been an era where every aspect of activity in a company or enterprise isRead MorePrivacy and Citizens Data1498 Words   |  6 PagesIntroduction This is an era of massive violations of privacy rights and individual liberties due to the new technologies of surveillance, data mining, electronic monitoring, biometric chips, spamming, hacking, phishing, and security breaches at major private and public institutions. These new technologies make the protection of privacy rights far more difficult than in the pre-electronic past. Given the nature of the Internet, thousands or even millions of people can view these Twitter and Facebook postingsRead MoreElectronic Surveillance in the Workplace6778 Words   |  28 PagesElectronic surveillance in the workplace Electronic Surveillance in the Workplace: Concerns for Employees and Challenges for Privacy Advocates Anna Johnston and Myra Cheng Paper delivered 28 November 2002 International Conference on Personal Data Protection Hosted by Personal Information Dispute Mediation Committee, Korea Information Security Agency Seoul, Korea Ms Anna Johnston is the NSW Deputy Privacy Commissioner. Ms Myra Cheng is a Research amp; Policy Officer with Privacy NSWRead MoreNational Security vs. the Right to Privacy Essay1769 Words   |  8 Pages     Ã‚  Ã‚   Abstract: Electronic mail is quickly becoming the most prevalent method of communication in the world. However, e-mail systems in corporate, institutional, and commercial environments are all potential targets of monitoring, surveillance and ultimately, censorship.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Electronic mail is a phenomenon that has begun to pervade all aspects of our lives today. We use e-mail in our personal lives, at our schools, at our jobs, and everywhere in between. However, very few of us considerRead MoreEmployee Monitoring at Work3158 Words   |  13 PagesEmployee monitoring at work Outline: Evolution of employee monitoring Why do employers monitor their employees? Workplace Privacy and Employee Monitoring Types of employee monitoring ââ€" ª New way of monitoring Successful implementation of the monitoring system The Law Monitoring shouldn’t go too far My perspective conclusion Evolution of employee monitoring For many years, organizations have engaged in many practices in order to monitor their employees for the intention of controlRead MoreThe Value of Digital Privacy in the Information Technology Age1283 Words   |  5 Pagesbeen such a strong emphasis on capturing, analyzing, categorizing and using personal data that had been highly protected in the past for purposes of securing nations (Ottensmeyer, Heroux, 1991). Correspondingly, there has never been a time when every aspect of life in an organization is monitored, from personal computer and telephone use to the use of personal Wi-Fi and networking devices (Riedy, Wen, 2010). The first section of this analysis is to analyze three technologies that allow individuals toRead MorePrivacy in the Workplace Essay1624 Words   |  7 Pagespersonal aspects of privacy (Townsend Bennet, 2003). Employers have always monitored employees to insure good work performance and they sought to deter unproductive behavior through looking over the shoulder technology, but advances in technology have made recording even the minutest detail of an employees activities and behavior a simple task. Currently, employees have few privacy rights, especially while utilizing their employers communication systems. The corporations monitoring and recordingRead MoreEssay on Work Environment and Legal Issues1779 Words   |  8 Pagesdiscovering that employees are spending hours of wasted time surfing the Internet and sending inappropriate emails. Employers classify this type of behavior as, â€Å"Internet abuse,† and breaking company’s policies. While employees see this type of behavior harmless, employers see this as potential risks to their organization. Previous researched study show employees spend hours surfing the Internet and sending non-work related emails to co-workers, f amily, and friends. With millions of employees having access

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.