¶ … consultation done for a CEO of a Fortune 500 company regarding use of internet by its employees. The consultation will look into internet usage by employees and possible ways to reduce illegal use of internet at the workplace.
Torts that the employees might be committing using the Workplace Internet
There are quite a number of torts that could be committed by employees at the workplace. Quite a number of legal cases have demonstrated these torts, for instance, the case Smyth vs. The Pillsbury Company, in the Federal Eastern District of Pennsylvania. In the case, the plaintiff, Mr. Michael Smyth filed a lawsuit against his the company he formerly worked for, The Pillsbury Company, claiming that he was wrongfully discharged, after the company fired him for sending electronic mails, that the company considered unprofessional and inappropriate, through the company's internet system (Muhl, 2003). Since Michael was an at-will staff, his lawsuit was really about whether his discharge had contravened the state's "public policy" and thus was an exception of the general rule that allowed for the firing of at-will employees for any reason at any time. The Federal Eastern District Court granted the defendant's (the Pillsbury Company) motion to dismiss the lawsuit for the plaintiff's failure to clearly state a claim. The court in its ruling claimed that the company did not commit the tort of invading the staff's privacy and thus didn't contravene public policy in discharging Smyth. This case shows that harassment torts can also be brought up against employees.
In another tort case, titled United States v. Simons, that was initially filed in the Federal Court in the Eastern District of the state of Virginia; the Federal government was prosecuting a Mr. Mark Simons, a CIA (Central Intelligence Agency) staff, for contravening the Federal child pornography legislations. The defendant, a staff at Central Intelligence Agency's Foreign Bureau of Information Services, is claimed to have in that capacity used the firm's computer systems and internet access to access break the law. The federal government alleged that during the agency's routine check of its systems capabilities, they found out that their computer network recorded a lot of activity outside the system. The manager of the system, then using the word "sex" searched through the network's activity logs, in the belief that his search would yield inappropriate conduct (Muhl, 2003). The search turned out to be fruitful as it returned several hits that came from Mark Simon's workstation. As the investigations progressed without the defender being informed, another IT (information technology) expert was instructed to access Mark Simon's (the defendant's) computer remotely so as to establish whether he had downloaded any inappropriate files or images. The search also returned with a number of hits that the systems manager classified as pornographic (Muhl, 2003). So, some of the other torts that can be committed by employees are pornography and child law torts. Thus, there are different kinds of torts that can be committed by employees.
Possible crimes that could be committed by Employees
Before the recent strengthened anti-cyber crimes laws, the two federal statutes that were commonly used to prosecute cyber criminals were the wire fraud law, which prohibited the utilization of interstate network communications facilities to further any scheme or as a tool to defraud, the other one which was used is the ITSP (Interstate Transportation of Stolen Property) statute. Of the 2 legislations, the more sweeping and thus most successful of them, is the wire fraud legislation. In fact many of the modern cyber criminal offenses were penalized under the wire fraud statute (Rasch, 1996). The legislation is wide in scope, and simply requires evidence of any type of artifice or scheme to defraud property or money, and the utilization of national or international communication wires to further the said scheme. Thus, almost every kind of fraud offenses can be persecuted using this law including, stealing of property or money that is of commercial value, thus the wire fraud offense offers a sufficient basis of criminal persecution. The most relevant offense however, with regards to employees' behavior in companies is through the use of communication networks such as the internet for fraud or theft. For instance, Legion of Doom gaming site members were prosecuted for two offenses; trespass into computers and unauthorized utilization of computer resources, this case provides a fine example of the manner through which cyber criminals can break into computer networks and use the data acquired for criminal purposes. Various different...
Internet Policy Diane Silversmith Internet Use Policy This memo provides justification for providing Internet access primarily as a business tool, but permitting incidental personal use at America West Finance. Extensive research uncovered significant issues related to Internet misuse that require immediate action. Further, the application of electronic surveillance was found to be an industry best practice that in necessary to protect a company's best interest. An evaluation of all Internet use options is
If the selling company has a good reputation, and the software happens to have a bug or two, our company would at least be assured of an avenue for recompense. One factor that should also be considered is whether our competitors are using the same type of technology to their benefit, and even more importantly to our detriment. It should not be a purchase just to 'keep up with the Joneses"
Internet THE NEXT GENERATION INTERNET The Internet was developed during the late 1960s and early 1970s as a network or computers capable of sustaining global communication. The original Internet, initially intended as and educational and governmental tool, has since reached a global commercial user base. The original Internet has proven a successful means of disseminating and communicating information to more than a billion users, thanks to technological advances. A new wave however, has
management styles used by JC Penney's management and pros and cons of each era of management. The paper begins with a general introduction of the management and then by answering the questions asked. The paper also evaluates company's management styles and problems faced by the company. Importance of innovative management style and a suitable style for JC Penney is also considered in the given paper. Management Penney being one of the
Suppose, for example, that the document requires, at some point, an import of a certain excel sheet or any other type of application. Potential technical failure . If the wikis are hosted either externally or on the internal server, a failure of the respective server may lead to the work in progress being lost. Overall, our productivity may decrease at company level if such events occur on a repeated basis and
Work Distraction The purpose of this memorandum is to inform the new company wide change of policy in monitoring employees. This information is a company directive and is expected to be followed and adhered to starting on today's date. Recent developments in technology have made our jobs and tasks easier in many aspects. The internet, mobile, communication and social media are great tools that should be taken advantage of when the situation
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now