Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from essay:
According to the current laws, which are not really up to speed yet, an employer can monitor employee email if he or she has a legitimate business purpose for doing so. There is a belief that, because the employer has an email and computer system for employee use, the computer system (as well as the resulting email and browsing history) is the property of the employer. While this makes sense, some states have enacted 'right to privacy' laws so that companies cannot make this claim against their employees and cannot monitor what they do on the Internet during company time. It then becomes difficult to balance the need to supervise and control employees with the need to make sure that those same employees' rights are not being violated by their employers. There is no clear legal rule as to what is acceptable and what is not in the field of email or Internet monitoring in the workplace, which makes it very difficult for those who are trying to operate a business. Employers are left on their own to try to monitor their employees the best they can while making sure that they do not get too strict and get themselves into trouble with the courts (Boustani 2002).
The best thing that employers can do to protect themselves and keep their employees happy is to create good policies that deal with Internet usage and email, and then stick by them in all circumstances. It is also important that employers monitor their employees only for legitimate reasons, instead of just because they are nosy. If they have a suspicion that an employee is doing something wrong, monitoring them is understandable. Without the suspicion, though, it just seems as though an employer really is prying into an employee's private business. Another thing that the employer needs to do is to be realistic. If employees are in constant fear that they are being watched all of the time, they are not going to perform at the highest level they can because they will be too distracted by the idea of 'big brother' to really focus on their jobs (Monitoring 2002).
Since technology has made it possible to track almost all communication had by employees in the workplace it has raised legal issues as well, and none of that is actually surprising to people who work in all types of fields where computer use is required. What can be done about the monitoring of email and Internet usage, and how can employees keep their privacy at the same time that employers feel as though they are keeping their employees in line? The question becomes even more important when a person stops to consider that society as a whole can be monitored in stores, restaurants, hotels, and virtually anywhere that visual and audio equipment can be hidden.
There really is very little privacy anywhere in society today, and as soon as a person leaves his or her front door there is no longer an expectation of privacy. The problem of first amendment freedoms could potentially extend to everyone on the planet, not just those who work in an office from 8-5. It is important that email laws are developed and that Internet laws are created so that employee privacy and fairness is balanced with the need for employers to keep track of what is going on in their businesses. Society needs laws that fit the times and the situation, and Internet usage is rather unique. Without new laws on the books that protect employers, employees, and the rest of society, there will always be trouble with electronic media and the people who abuse it.
Boustani, Eric Bakri. (2002). An Employer's Approach to Email Policies. http://www.iplawyers.com/CyberCounsel/an_employer.htm.
Loney, Matt. (2002). Covert Staff Surveillance 'Illegal'. ZDNet UK. http://News.zdnet.co.uk/story/0,t269-s2108075,00.html.
Monitoring Your Employees' Email, Voicemail, Telephone and Internet Use. (2002). Nolo. http://www.nolo.com/lawcenter/ency/article.cfm/objectID/751CFB9F-5A4B-48FB-A85BC08E2D9862E5/catID/30960BF5-6C25-44B9-992E83CC50D5B17A.
Purdy, LeAnn. Email in the Workplace. (2000). http://pigseye.kennesaw.edu/~1purdy/.[continue]
"Internet Privacy The Main Issue" (2008, October 19) Retrieved December 2, 2016, from http://www.paperdue.com/essay/internet-privacy-the-main-issue-27503
"Internet Privacy The Main Issue" 19 October 2008. Web.2 December. 2016. <http://www.paperdue.com/essay/internet-privacy-the-main-issue-27503>
"Internet Privacy The Main Issue", 19 October 2008, Accessed.2 December. 2016, http://www.paperdue.com/essay/internet-privacy-the-main-issue-27503
Private and Legal Issues in Database Privacy and legal issues to consider for a database system An essential component in the success of managing database is that management should be concerned with ethical and legal issues associated with both the creation and use of those data in the databases. The use of the database technology provides access to all kind of information about customers, employees, and subjects. However, it has often become
GBMC Healthcare Hospital. The main issue relates to privacy and confidentiality issues considered essential components of fostering trust between healthcare consumers and providers. The issue arose the GBMC hospital did not strictly follow the rules of privacy and confidentiality. Because of its lack of complete control on the privacy issues, many pieces of private information of patients were stolen and compromised. Although GBMC hospital has been committed for 75 years
Internet censorship could also result in job losses since a court order may compel online search engines in America to block results or domain names. This could contribute to the instant death of some companies, particularly those with limited resources to fight potential legal cases. In addition, concerns have also been raised regarding the possibility of Internet censorship to weaken the protection provided by the Digital Millennium Copyright Act that
Internet: Privacy for High School Students An Analysis of Privacy Issues and High School Students in the United States Today In the Age of Information, the issue of invasion of privacy continues to dominate the headlines. More and more people, it seems, are becoming victims of identity theft, one of the major forms of privacy invasion, and personal information on just about everyone in the world is available at the click of
Ethics is an essential part of the individual condition. As an important person who starts up a large business as well as deals on a daily basis with other corporation at all arena of expansion so basically business ethics is lively and glowing plus hotly chat about in boardrooms all over the world. Furthermore for the majority of administration and boards know their accountability goes well beyond periodical results.
At the bottom line, the issue at hand is with the sanctity and safety of the students and the responsibility of the university to preserve and develop that. Moreover, many of these students are dallying into multi-dimensional virtual worlds that are beginning to closely resemble the physical world and that are having their own ethical issues arise (Wankel & Malleck, 2010). Universities need to educate themselves as to what those