¶ … consultation done for a CEO of a Fortune 500 company regarding use of internet by its employees. The consultation will look into internet usage by employees and possible ways to reduce illegal use of internet at the workplace.
Torts that the employees might be committing using the Workplace Internet
There are quite a number of torts that could be committed by employees at the workplace. Quite a number of legal cases have demonstrated these torts, for instance, the case Smyth vs. The Pillsbury Company, in the Federal Eastern District of Pennsylvania. In the case, the plaintiff, Mr. Michael Smyth filed a lawsuit against his the company he formerly worked for, The Pillsbury Company, claiming that he was wrongfully discharged, after the company fired him for sending electronic mails, that the company considered unprofessional and inappropriate, through the company's internet system (Muhl, 2003). Since Michael was an at-will staff, his lawsuit was really about whether his discharge had contravened the state's "public policy" and thus was an exception of the general rule that allowed for the firing of at-will employees for any reason at any time. The Federal Eastern District Court granted the defendant's (the Pillsbury Company) motion to dismiss the lawsuit for the plaintiff's failure to clearly state a claim. The court in its ruling claimed that the company did not commit the tort of invading the staff's privacy and thus didn't contravene public policy in discharging Smyth. This case shows that harassment torts can also be brought up against employees.
In another tort case, titled United States v. Simons, that was initially filed in the Federal Court in the Eastern District of the state of Virginia; the Federal government was prosecuting a Mr. Mark Simons, a CIA (Central Intelligence Agency) staff, for contravening the Federal child pornography legislations. The defendant, a staff at Central Intelligence Agency's Foreign Bureau of Information Services, is claimed to have in that capacity used the firm's computer systems and internet access to access break the law. The federal government alleged that during the agency's routine check of its systems capabilities, they found out that their computer network recorded a lot of activity outside the system. The manager of the system, then using the word "sex" searched through the network's activity logs, in the belief that his search would yield inappropriate conduct (Muhl, 2003). The search turned out to be fruitful as it returned several hits that came from Mark Simon's workstation. As the investigations progressed without the defender being informed, another IT (information technology) expert was instructed to access Mark Simon's (the defendant's) computer remotely so as to establish whether he had downloaded any inappropriate files or images. The search also returned with a number of hits that the systems manager classified as pornographic (Muhl, 2003). So, some of the other torts that can be committed by employees are pornography and child law torts. Thus, there are different kinds of torts that can be committed by employees.
Possible crimes that could be committed by Employees
Before the recent strengthened anti-cyber crimes laws, the two federal statutes that were commonly used to prosecute cyber criminals were the wire fraud law, which prohibited the utilization of interstate network communications facilities to further any scheme or as a tool to defraud, the other one which was used is the ITSP (Interstate Transportation of Stolen Property) statute. Of the 2 legislations, the more sweeping and thus most successful of them, is the wire fraud legislation. In fact many of the modern cyber criminal offenses were penalized under the wire fraud statute (Rasch, 1996). The legislation is wide in scope, and simply requires evidence of any type of artifice or scheme to defraud property or money, and the utilization of national or international communication wires to further the said scheme. Thus, almost every kind of fraud offenses can be persecuted using this law including, stealing of property or money that is of commercial value, thus the wire fraud offense offers a sufficient basis of criminal persecution. The most relevant offense however, with regards to employees' behavior in companies is through the use of communication networks such as the internet for fraud or theft. For instance, Legion of Doom gaming site members were prosecuted for two offenses; trespass into computers and unauthorized utilization of computer resources, this case provides a fine example of the manner through which cyber criminals can break into computer networks and use the data acquired for criminal purposes. Various different...
Internet Policy Diane Silversmith Internet Use Policy This memo provides justification for providing Internet access primarily as a business tool, but permitting incidental personal use at America West Finance. Extensive research uncovered significant issues related to Internet misuse that require immediate action. Further, the application of electronic surveillance was found to be an industry best practice that in necessary to protect a company's best interest. An evaluation of all Internet use options is
If the selling company has a good reputation, and the software happens to have a bug or two, our company would at least be assured of an avenue for recompense. One factor that should also be considered is whether our competitors are using the same type of technology to their benefit, and even more importantly to our detriment. It should not be a purchase just to 'keep up with the Joneses"
Suppose, for example, that the document requires, at some point, an import of a certain excel sheet or any other type of application. Potential technical failure . If the wikis are hosted either externally or on the internal server, a failure of the respective server may lead to the work in progress being lost. Overall, our productivity may decrease at company level if such events occur on a repeated basis and
Investing these hours in high quality work is far more important than forcing them to be in the office, when there is ample evidence they are more productive working from home. Research Plan To fully quantify and evaluate the proposal of virtual teams with workers who can telecommute, I proposed the following stages of research: 1. Literature review of best practices in advertising agencies and creative teams as it relates to productivity
It is therefore vital that our employees learn to communicate effectively not only with their superiors, but also with each other. Effective interpersonal communication will also stimulate the creative process much more effectively, which will help us to meet industry challenges like the ones before us now. The strength of a company is in its employees. The strength of employees is in their communication skills. For managers, the suggestion is
This should also be performed by the department managers and by shift supervisors. The company should also discuss with cashiers advancement opportunities. If they know that by doing their job well, by meeting the quality standards imposed by the company, by improving customer service, helping reduce theft, and maintain cleanliness at normal levels, they could be advanced to higher positions, they might find this stimulating and might improve their
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now