CEO Memo On Internet Use Essay

PAGES
8
WORDS
2628
Cite

¶ … consultation done for a CEO of a Fortune 500 company regarding use of internet by its employees. The consultation will look into internet usage by employees and possible ways to reduce illegal use of internet at the workplace. Torts that the employees might be committing using the Workplace Internet

There are quite a number of torts that could be committed by employees at the workplace. Quite a number of legal cases have demonstrated these torts, for instance, the case Smyth vs. The Pillsbury Company, in the Federal Eastern District of Pennsylvania. In the case, the plaintiff, Mr. Michael Smyth filed a lawsuit against his the company he formerly worked for, The Pillsbury Company, claiming that he was wrongfully discharged, after the company fired him for sending electronic mails, that the company considered unprofessional and inappropriate, through the company's internet system (Muhl, 2003). Since Michael was an at-will staff, his lawsuit was really about whether his discharge had contravened the state's "public policy" and thus was an exception of the general rule that allowed for the firing of at-will employees for any reason at any time. The Federal Eastern District Court granted the defendant's (the Pillsbury Company) motion to dismiss the lawsuit for the plaintiff's failure to clearly state a claim. The court in its ruling claimed that the company did not commit the tort of invading the staff's privacy and thus didn't contravene public policy in discharging Smyth. This case shows that harassment torts can also be brought up against employees.

In another tort case, titled United States v. Simons, that was initially filed in the Federal Court in the Eastern District of the state of Virginia; the Federal government was prosecuting a Mr. Mark Simons, a CIA (Central Intelligence Agency) staff, for contravening the Federal child pornography legislations. The defendant, a staff at Central Intelligence Agency's Foreign Bureau of Information Services, is claimed to have in that capacity used the firm's computer systems and internet access to access break the law. The federal government alleged that during the agency's routine check of its systems capabilities, they found out that their computer network recorded a lot of activity outside the system. The manager of the system, then using the word "sex" searched through the network's activity logs, in the belief that his search would yield inappropriate conduct (Muhl, 2003). The search turned out to be fruitful as it returned several hits that came from Mark Simon's workstation. As the investigations progressed without the defender being informed, another IT (information technology) expert was instructed to access Mark Simon's (the defendant's) computer remotely so as to establish whether he had downloaded any inappropriate files or images. The search also returned with a number of hits that the systems manager classified as pornographic (Muhl, 2003). So, some of the other torts that can be committed by employees are pornography and child law torts. Thus, there are different kinds of torts that can be committed by employees.

Possible crimes that could be committed by Employees

Before the recent strengthened anti-cyber crimes laws, the two federal statutes that were commonly used to prosecute cyber criminals were the wire fraud law, which prohibited the utilization of interstate network communications facilities to further any scheme or as a tool to defraud, the other one which was used is the ITSP (Interstate Transportation of Stolen Property) statute. Of the 2 legislations, the more sweeping and thus most successful of them, is the wire fraud legislation. In fact many of the modern cyber criminal offenses were penalized under the wire fraud statute (Rasch, 1996). The legislation is wide in scope, and simply requires evidence of any type of artifice or scheme to defraud property or money, and the utilization of national or international communication wires to further the said scheme. Thus, almost every kind of fraud offenses can be persecuted using this law including, stealing of property or money that is of commercial value, thus the wire fraud offense offers a sufficient basis of criminal persecution. The most relevant offense however, with regards to employees' behavior in companies is through the use of communication networks such as the internet for fraud or theft. For instance, Legion of Doom gaming site members were prosecuted for two offenses; trespass into computers and unauthorized utilization of computer resources, this case provides a fine example of the manner through which cyber criminals can break into computer networks and use the data acquired for criminal purposes. Various different...

...

have laws that penalize the stealing / misappropriation of data that can be classified as trade secrets. However, the proof of this offense would first require governments to give evidence that the data or information did indeed constitute a trade secret, and that there was an agreement between the defendant and the property owner that prohibited the sharing of that information (Rasch, 1996). All the elements mentioned in the instance above can be considered both white collar and blue collar based on the circumstances.
Corporation v. Employee Liability

Many companies, aware of the advantages in terms of performance and productivity that are inherent in the use of the internet, offer their workers access to such services. Of late however, the rising access to internet services has resulted in increased company liability (Employer Liability for Improper Computer Use by Employees). When employees misuse internet services provided by employers they in turn expose their employers and the companies they work for, to lawsuits and even in some cases criminal liability at the state and even federal levels. One of the legal doctrines that deal with such crimes is referred to as Respondeat superior; it held explicit liability to an employer or a corporation for the actions of an employee. The doctrine, which first came to the limelight in the early 1900s, stated that an employer could be held responsible for damages that came about because of an employee's actions if they occurred when he was acting on behalf of the employer or furthering a course for the company in which he was employed. It isn't surprising that that the liability defined by the doctrine in the last decade had been extended to employee's misuse of company-provided internet. For instance, foreseeable acts that could be carried out using the internet, even in cases that they would only benefit the employee, could result in the employer being held liable for damages (Employer Liability for Improper Computer Use by Employees). Moreover, the awareness of the employer about the act is in some cases not required to hold him or her liable. So basically, in most cases companies are held liable for actions of their employees.

Violations through Social Media

Social media sites are a menace to corporations and employers that desire to protect their trade secrets. The main challenge presented by social media sites, is the ease of using them and the lack of awareness for those using them that they are breaching the law in sharing such information. For instance, even though it is quite common for workers to vent against their companies or employers, there have quite a number of instances where employers have responded by discharging the employees because they posted defaming material or portrayed the company in negative light on social media sites (Warren and Pedowitz, 2011). In one example, a worker in Connecticut was fired when she made comments on her social media account calling her boos a scumbag after she entered into an argument with her. . Another example is of a waitress in the state of North Carolina, who was fired after she posted derogatory comments about a customer to their restaurants calling him cheap after he gave a tip that she regarded disappointing. Employees can also violate the law by posting their company's or their employer's confidential information or data such as internal sales figure, unannounced layoffs, or products being developed.

As mentioned above employees might use social media in such a way that it would be considered to have violated their duty to be loyal to their employer. One such example is the case of Hahn v. Onboard, L.L.C., where the defendant (Onboard Corporation) had paid Robert Hahn, the plaintiff, and other staffs to go to a trade conference to represent them. During, the said trade conference, Hahn organized a focus group as instructed and participated in several meetings on behalf Of Onboard, L.L.C. however, during the same conference, Robert Hahn took the opportunity to distribute personal cards for his website, blog and twitter account. Even though, the company had knowledge that Hahn had a website, a blog and a twitter account, they were not aware that he was distributing cards promoting them during the conference (Warren and Pedowitz, 2011). The court established that in the distribution of personal blog and website cards at the conference, the client violated his duty of loyalty to his company/employer and therefore denied the plaintiff's motion for summary judgment on the matter.

Privacy Rights of Employees

In cases of employee privacy rights in terms of internet usage, there is often a…

Sources Used in Documents:

References

Adams, C. (2004). The Right of Privacy of Employees with Respect to Employer -Owned Computers and E-mails. The Oklahoma Bar Journal, 75(28). Retrieved October 21, 2015, from http://digitalcommons.law.utulsa.edu/cgi/viewcontent.cgi?article=1062&context=fac_pub

Frayer, C. (2002). Employee privacy and internet monitoring: balancing workers' rights and dignity with legitimate management interests. Business Lawyer, 57(2), 857-878.

Human Resources Management: Employment Tips and Samples (n.d). Sample Internet and Email Policy for Employees. Retrieved October 21, 2015, from http://humanresources.about.com/od/policiesandsamples1/a/email_policy.htm

Muhl, C. (2003). Workplace e-mail and Internet use: employees and employers beware. Monthly Labor Review, 36. Retrieved October 21, 2015, from http://www.bls.gov/opub/mlr/2003/02/art3full.pdf
Rasch, M. (1996). Criminal Law and the Internet. The Internet and Business: A Lawyer's Guide to the Emerging Legal Issues. Computer Law Association. Retrieved from http://groups.csail.mit.edu/mac/classes/6.805/articles/computer-crime/rasch-criminal-law.html
Tucker Law Group -- Philadelphia, Pennsylvania Law Firm -- Miramar, Florida Law Firm (n.d.,) Employer Liability for Improper Computer Use by Employees -- Tucker Law Group -- Philadelphia, Pennsylvania Law Firm -- Miramar, Florida Law Firm. Retrieved October 22, 2015, from http://www.tlgattorneys.com/2011/06/employer-liability-for-improper-computer-use-by-employees/
Warren, M., & Pedowitz, A. (2011). SOCIAL MEDIA, TRADE SECRETS, DUTIES OF LOYALTY, RESTRICTIVE COVENANTS AND YES, THE SKY IS FALLING. Hofstra Labor and Employment Law Journal, 29(1). Retrieved, from http://scholarlycommons.law.hofstra.edu/cgi/viewcontent.cgi?article=1525&context=hlelj
Welcome to Texas Workforce Commission -- Texas Workforce Commission (n.d.). Internet, E-Mail, and Computer Use Policy. Retrieved October 21, 2015, from http://www.twc.state.tx.us/news/efte/internetpolicy.html
Yerby, J. (2013). Legal and ethical issues of employee monitoring. Online Journal of Applied Knowledge Management, 1(2). Retrieved, from http://www.iiakm.org/ojakm/articles/2013/volume1_2/OJAKM_Volume1_2pp44-55.pdf


Cite this Document:

"CEO Memo On Internet Use" (2015, October 24) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/ceo-memo-on-internet-use-2158862

"CEO Memo On Internet Use" 24 October 2015. Web.26 April. 2024. <
https://www.paperdue.com/essay/ceo-memo-on-internet-use-2158862>

"CEO Memo On Internet Use", 24 October 2015, Accessed.26 April. 2024,
https://www.paperdue.com/essay/ceo-memo-on-internet-use-2158862

Related Documents
Internet Policy
PAGES 5 WORDS 1358

Internet Policy Diane Silversmith Internet Use Policy This memo provides justification for providing Internet access primarily as a business tool, but permitting incidental personal use at America West Finance. Extensive research uncovered significant issues related to Internet misuse that require immediate action. Further, the application of electronic surveillance was found to be an industry best practice that in necessary to protect a company's best interest. An evaluation of all Internet use options is

If the selling company has a good reputation, and the software happens to have a bug or two, our company would at least be assured of an avenue for recompense. One factor that should also be considered is whether our competitors are using the same type of technology to their benefit, and even more importantly to our detriment. It should not be a purchase just to 'keep up with the Joneses"

Internet THE NEXT GENERATION INTERNET The Internet was developed during the late 1960s and early 1970s as a network or computers capable of sustaining global communication. The original Internet, initially intended as and educational and governmental tool, has since reached a global commercial user base. The original Internet has proven a successful means of disseminating and communicating information to more than a billion users, thanks to technological advances. A new wave however, has

management styles used by JC Penney's management and pros and cons of each era of management. The paper begins with a general introduction of the management and then by answering the questions asked. The paper also evaluates company's management styles and problems faced by the company. Importance of innovative management style and a suitable style for JC Penney is also considered in the given paper. Management Penney being one of the

Suppose, for example, that the document requires, at some point, an import of a certain excel sheet or any other type of application. Potential technical failure . If the wikis are hosted either externally or on the internal server, a failure of the respective server may lead to the work in progress being lost. Overall, our productivity may decrease at company level if such events occur on a repeated basis and

Employee Privacy Memos
PAGES 3 WORDS 879

Work Distraction The purpose of this memorandum is to inform the new company wide change of policy in monitoring employees. This information is a company directive and is expected to be followed and adhered to starting on today's date. Recent developments in technology have made our jobs and tasks easier in many aspects. The internet, mobile, communication and social media are great tools that should be taken advantage of when the situation