Ethical Issues In Business Related To Computer And Information Technology Term Paper

PAGES
5
WORDS
1450
Cite

¶ … ethics of business regarding computer technology. The writer focuses on the issue of email privacy and whether employers have the right to read and act on private email sent by employees from their workstations. The writer explores both sides of the issue and the laws that have pertained thus far. There were four sources used to complete this paper. The technological explosion of the last few decades has taken the world to heights that were never before imagined. Today, with the click of a mouse one can handle their stocks, plan their vacations, and purchase goods from around the world and chat with others across the ocean. It is an era of wonder and excitement but it brings with it ethical questions that have never before been asked. The technological explosion has allowed businesses to go global in their efforts. Communication has become instantaneous with the click of a button. Employees can discuss projects and communicate with their superiors and their subordinates alike. With this ability comes a question of privacy and ethics. Recent court cases have centered on what the rights are of a company when it comes to the private email of an employee. The debate focuses on whether or not a company has the right to open, read, intercept or act on email information that has been sent or received on a work owned computer. The answer is yes but there will be many debates about the issue before it becomes universally accepted. If the company owns the computer, and the internet service by which the email is sent and received, then the product (email) being transferred through the company means belongs to the company.

According to a study conducted for Elron Software by NFO Worldwide, a research firm in Stamford, Conn., 85% of workers say they use company e-mail to send and receive personal messages, and 56% of employees who have access to the Internet say they receive e-mail that is sexist, racist, or of an inappropriate religious nature. Worse yet, one in ten receives e-mail that contains confidential company information (Bronwyn, 1999). "

These statistics illustrate the magnitude of the issue revolving around email privacy rights. An employee who is job hunting and planning on leaving the current company might shoot off a resume to a potential...

...

These and other issues have begun to surface, leading to the ethical question regarding email and ownership.
Many court cases have been heard about the ethics of monitoring email and online activity because the employees who bring the action feel it is a violation of their privacy. The businesses counter with the fact that email is no different than a company circulated memo. If it is done using company equipment, which a company computer is, then the company has the right to own anything that is contained within it.

A recent study by the American Management Association concluded that two-thirds of businesses in the country monitor their employee email on a regular basis. Surveillance technology has developed software allowing the electronic monitoring of email and the software sales for such products is expected to increase (Kelly, 2001). There are several reasons for the monitoring of employee email including concern over legal liability and the desire to monitor productivity of their paid work hours. "Beyond productivity concerns, employers scrutinize employee email and web usage to avoid or mitigate potential legal liability for workplace sexual-harassment claims. Courts are increasingly finding employers liable for sexually harassing, hostile work environments when their employees use company equipment to transmit offensive e-mail or sexually explicit pictures (Kelly, 2001). "

The premise of the rulings is that the company owns the equipment and the service by which the offenses are being sent therefore the company is responsible legally. This provides a solid argument for the rights of the company to invade and intercept email for the purpose of monitoring their company liability exposure.

LEGAL BACKING

In most cases the courts have upheld the right of employers to monitor and intercept and act on any electronic transmission to or from one of their employees on company property. It has been considered a condition of employment for many years.

Firms in Europe and the U.S. spend millions of U.S. dollars on lawsuits arising out of employee abuse of computers (Cases, 2002). " Because…

Sources Used in Documents:

References

Kelly, Eileen P (2001). Electronic monitoring of employees in the workplace., National Forum, pp 4.

Author not available (2000). TELLING ALL ABOUT INTERNET MONITORING POLICY CAN KEEP YOUR OFFICE LITIGATION-FREE., PR News.

Author not available (2002). DEALING WITH COMPUTER-RELATED DISCIPLINARY CASES., Africa News Service,.

Bronwyn Fryer (1999). Tech/Computers And The Web: E-Mail: Backbone Of The Info Age Or Smoking Gun?., Your Company, pp 73+.


Cite this Document:

"Ethical Issues In Business Related To Computer And Information Technology" (2002, December 03) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/ethical-issues-in-business-related-to-computer-140699

"Ethical Issues In Business Related To Computer And Information Technology" 03 December 2002. Web.26 April. 2024. <
https://www.paperdue.com/essay/ethical-issues-in-business-related-to-computer-140699>

"Ethical Issues In Business Related To Computer And Information Technology", 03 December 2002, Accessed.26 April. 2024,
https://www.paperdue.com/essay/ethical-issues-in-business-related-to-computer-140699

Related Documents

4. Conclusions In the article Ethical Issues in Information Technology, author Richard T. DeGeorge points out the existence of five interrelated ethical issues: issues in the usage of technology in business, issues in the it business, issues related to the Internet, issues in e-business and issues affecting the social background. Each of the five categories presents several ramifications. The article has a general coverage, an informal writing and throughout its 24

Nanotechnology attempted to show the potential of this new technology and included the wide range of fields that are connected to the concept of the nanometer scale. These include machining, imaging, metrology or measurement, micromachines, instrumentation and machine tools, scanning probe microscopy, fabrication of components, nanoelectronics, molecular engineering, among others. (Journal Review: Nanotechnology) Another important step in the development of this technology in both a practical and theoretical sense was

Now that people interact with social media on their wireless phones, that opens up a whole new series of issues, hence those involved in the law and with the ethical issues will "need to abandon some of the presumptions we once made in e-contracting in light of peoples' changing behavior" (Moringiello). Meanwhile, what exactly constitutes Internet abuse in the workplace and what role does ethics play? There are some working

The company's consistent top line revenue growth also illustrates it has been successful in transforming its supplier network into one that operates more on knowledge, less on purely price or product decisions. As a result the company is capable of competing more at the process level and less at the purely price-driven one (Reese, 2007). In terms of the company's factors for success, the greater opportunities is to move into

Information Technology Acts What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act? One of the common challenges that most regulations will face is keeping up with the changes in the technology. As the law, is designed to provide everyone with some kind of protection against potential abuse. However, improvements in technology have transformed the way that everyone is living their daily lives.

The need for continually creating and updating the security techniques and technologies involved in an enterprise system is the ethical responsibility of the IT professional. In order to successfully protect the information and intellectual property assets of a firm, an IT professional also needs to make a personal commitment to stay as current as possible on existing and future technologies (Pemberton, 1998). This commitment needs to be supported by the