Verified Document

Employee's E-Mail In The Year Term Paper

One study by the ePolicy Institute found that 85% of employees admit to recreational surfing at work and seventy percent of employees admitted to receiving or sending adult-oriented personal e-mails at work, while 60% admitted to exchanging e-mail that could be considered racist, sexist or otherwise "politically incorrect" (Griffaton pp). In fact most traffic to Internet pornographic sites occurs during regular business hours, probably because Internet connections usually are faster in the workplace (Griffaton pp). Companies have taken note of these statistics and have adopted e-mail and Internet usage policies that contain provisions for continuous or random monitoring of usage (Griffaton pp). The ePolicy Institute study reports that 77% of employers monitor employees' e-mail and Internet use, in fact, 10% of workers with e-mail and Internet access, roughly 14 million people, are under continuous online surveillance (Griffaton pp). Approximately two thirds of employers have disciplined or terminated employees for violating electronic usage policies (Griffaton pp). Generally, employers monitor employees' e-mail because they wish to maintain their professional reputation and image, and also are concerned with employee productivity and business efficiency, since "cyberslacking accounts for 30 to 40% of lost worker productivity" (Griffaton pp). Therefore, monitoring assists employers in preventing and discouraging sexual or other illegal workplace harassment, defamation, copyright violations from the illegal downloading of software, music and movies, and the deliberate or inadvertent disclosure of trade secrets and other confidential information (Griffaton pp). According to the ePolicy Institute study, 68% of employers that monitor cite legal liability as their primary reason (Griffaton pp).

No federal or state statute currently prohibits employers from monitoring their electronic workplace, and although the federal Electronic Communications Privacy Act and similar state laws provide some limitations, these limitations can be overcome in the workplace through various exceptions in the statutes (Griffaton pp). The federal act prohibits the interception of electronic communications such as e-mail and defines "interception" to mean the "contemporaneous acquisition of the communication,"...

In reality, employees have little protection from the monitoring of their workplace electronic communications, for employers can freely obtain copies of e-mails from a network computer or the employee's hard drive without violating the act, and even when an employer intercepts electronic communications, monitoring is permitted when done in the "ordinary course of business" or when the employee has "consented" to it (Griffaton pp). Moreover, few states even require that employers notify their employees of monitoring (Griffaton pp). Although most employers tell their employees that they are being monitored, many employees let their guards down and find themselves the object of disciplinary action (McEvoy pp).
Given the above statistics, employers really have no choice but to monitor their employees' e-mail. E-mail sent from and received in a workplace is not private in the same sense as receiving a letter at home by postal delivery. The computer is owned by the company, and the company pays for Internet access for the purpose of doing business, therefore, e-emails should pertain to business and should be considered by any employee as company property.

Works Cited

Feeley, Stacey A. "E-mail monitoring in the workplace: the good, the bad and the ugly." Defense Counsel Journal. January 01, 2000. Retrieved August 05, 2005 from HighBeam Research Library Web site.

Giblin, Patrick. "You never know who might be reading your e-mail.

Knight-Ridder/Tribune Business News. February 10, 2005. Retrieved August 05, 2005 from HighBeam Research Library Web site.

Griffaton, Michael C. "Between the devil and the deep blue sea: monitoring the electronic workplace; employers should have detailed, understandable and fair computer, e-mail and Internet usage policies impartially administered." Defense Counsel Journal. January 01, 2003.. Retrieved August 05, 2005 from HighBeam Research Library Web site.

McEvoy, Sharlene A. "E-mail and Internet monitoring and the workplace: do employees have a right to privacy?" Communications and the Law.…

Sources used in this document:
Works Cited

Feeley, Stacey A. "E-mail monitoring in the workplace: the good, the bad and the ugly." Defense Counsel Journal. January 01, 2000. Retrieved August 05, 2005 from HighBeam Research Library Web site.

Giblin, Patrick. "You never know who might be reading your e-mail.

Knight-Ridder/Tribune Business News. February 10, 2005. Retrieved August 05, 2005 from HighBeam Research Library Web site.

Griffaton, Michael C. "Between the devil and the deep blue sea: monitoring the electronic workplace; employers should have detailed, understandable and fair computer, e-mail and Internet usage policies impartially administered." Defense Counsel Journal. January 01, 2003.. Retrieved August 05, 2005 from HighBeam Research Library Web site.
Cite this Document:
Copy Bibliography Citation

Related Documents

Employee E-Mail and Internet Privacy Policies the
Words: 639 Length: 2 Document Type: Essay

Employee E-Mail and Internet Privacy Policies The increased usage of the Internet and e-mail has changed the way companies do business. Nearly instantaneous communication can take place globally. Information on a countless number of topics can now be accessed from anywhere around the world. These technological developments have not only helped employees increase their efficiencies, but also has given them a new means of distraction from their duties. For this reason,

Email Privacy in the Workplace,
Words: 1542 Length: 4 Document Type: Term Paper

The courts have basically given businesses cart blanc with regard to the monitoring of what their employees say and do in their work email as well as on their work computers, even when they sign in to private web-based email accounts for private transmissions, as such events can be recorded by employers, as the computer being used has been designated by the courts as the domain of the employer

E-Mail in Business Communication E-Mail: History, Relation,
Words: 4599 Length: 15 Document Type: Essay

E-Mail in Business Communication E-mail: History, Relation, and Impact on effective Business Communication Email in Business Communication Electronic Mail Impact of Email to Business Communication Implications of Emails as Business Communication Tools Email is an important form of communication in today's organization that is increasingly seeing a geographical dispersal of the workforce. To communication tool has replaced traditional business letters and memos in preference for email memos. The research carried out a review of literature on

Three Basic Problems With Email Today
Words: 3201 Length: 10 Document Type: Essay

Constraints to Email and Potential Solutions Humankind has been communicating over increasingly lengthy distances over the millennia, beginning with drums and smoke signals, to relay runners and mounted messengers, to the telegraph and telephone and then, during the 1990s, the Internet and email. All of these communication media have their limitations, though, including the most popular written communication method today: email. Indeed, many observers believe that email will eventually spell

Employee Privacy Business Report the
Words: 1224 Length: 3 Document Type: Research Paper

This could be construed as a part of the atmosphere that exists in the work place. At which point, entity / individual can sue the employer for violating the law, by not properly monitoring their employees' email and internet activities. ("Workplace Privacy and Employee Monitoring" 2010) However, a larger concern that employers have is any email sent to someone by an employee can become a problem for them in the

Email Account for Personal Use.
Words: 1590 Length: 5 Document Type: Term Paper

Given the contend hazards that the employers facade, they should believe that applying email observing the strategies. Such policies demonstrate the employer's incompatible legal responsibilities. Constantly, employers who keep an eye on of email risks the judges finding either that the employer worked out power over an email mistreatment or that employees undergo an assault of privacy. However, failure to keep an eye on email schemes increases an evenly

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now