Information Technology - Legal Issues Term Paper

77). Electronic privacy law applies to employment and business records and information management in the workplace, with different rights and regulations depending on the specific communications medium involved. Generally, employee privacy rights to e-mail systems and telephone message recording and retrieval systems are determined by the employment contract or by the employment policies of the employer and are not subject to legal disputes initiated by employees ((Halbert & Ingulli p.78-80). The only exception giving employees privacy rights to communications is that (live) telephone conversations may not be intercepted or recorded without the permission of at least one person participating in the conversation by federal law. However, state law determines whether employers may record conversations in which they participate.

Approximately half the states allow any person in a conversation to record a telephone call without the knowledge or consent of the other person on the line; the other half require the consent of all parties to the conversation. Unlawful interception of protected communications is a federal criminal offense and may also expose the violator to civil penalties for invasion of privacy as well. The important distinction between live oral conversations and recorded communications applies at work because employees are not considered to have any such privacy rights in message retreival systems or e-mail systems provided by the employer (Halbert & Ingulli p.81). In ordinary (private) life, interception of recorded messages and e-mail transmissions or stored computer information is a federal criminal offense.

The 1996 case Smyth v. Pillsbury illustrates the general rule that employees do not have any resaonable expectation of privacy in their e-mail communications (Halbert & Ingulli p.78-9). In that case, the plaintiff was fired for personal...

...

Public employees at the municipal, state, and federal level have even fewer privacy rights, because their communications are potentially available to the public through the Freedom of Information Act (FOIA) of 1966, which also requires public employers to comply with strict rules of preserving business records and communications.
Ethically, many people do object to the right of employers to review what employees consider to be private communications, but the fact is that employers have both a legal right as well as justification in knowing how their employees spend their time at work and how they use the employer's equipment. In fact, most businesses do monitor employee communications (Halbert & Ingulli p.82). To the extent allowed by law and many include a specific notice warning employees of this in their employment contracts, as well as in their policies and procedures manuals, and very often, on computer sign-on screens. Employers are not legally required to provide such notices, but many choose to do so to discourage lawsuits which may result in legal costs even where the employee is unsuccessful. In general, the privacy rights of employees are limited to personal changing areas and to their personal belongings and cellular phones.

Sources Used in Documents:

References

Equal Employment Opportunity: Age Discrimination. United States Department of Labor website retrieved February 5, 2008, at http://www.dol.gov/dol/topic/discrimination/agedisc.htm

Friedman, L.M. (2005)

History of American Law.

New York: Simon & Schuster


Cite this Document:

"Information Technology - Legal Issues" (2008, February 06) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/information-technology-legal-issues-32420

"Information Technology - Legal Issues" 06 February 2008. Web.19 April. 2024. <
https://www.paperdue.com/essay/information-technology-legal-issues-32420>

"Information Technology - Legal Issues", 06 February 2008, Accessed.19 April. 2024,
https://www.paperdue.com/essay/information-technology-legal-issues-32420

Related Documents

Even worse, the technology supplying signals from NYFD commanders to firefighters in the field were never properly tested in high-rise emergency scenarios. Had they been appropriately tested in advance, the NYFD could probably have avoided the greatest loss of life among its service members in the organization's long history in September of 2001 because evacuation orders would have been received by hundreds of personnel inside the Twin Towers before

Information Technology Change Management in Home Health Care I hope enjoyed time holidays. Now back work . In team task week, a topic weekly focus debate paper labor unions change process. There sufficient information argue sides. Let . See: The labor union change process difficult employees management; I labor union make process a bit easier parties. Implementing Information Technology Change in a Health Care Facility There is a shift from the traditional institutionalized

Processing examples are conversion of encoded or typed words to printable format or running of computer programs such as the Statistical Package for Social Sciences (SPSS). Lastly, controlling ensures that all other four operations of the computer are efficiently working together, while at the same time, ensuring also that each operation does not interfere with the other operations. Examples of control measures in the computer are warnings or prompts

Information Technology Acts What were the advances in information technology that resulted in new ethical issues necessitating the creation of each act? One of the common challenges that most regulations will face is keeping up with the changes in the technology. As the law, is designed to provide everyone with some kind of protection against potential abuse. However, improvements in technology have transformed the way that everyone is living their daily lives.

Nanotechnology attempted to show the potential of this new technology and included the wide range of fields that are connected to the concept of the nanometer scale. These include machining, imaging, metrology or measurement, micromachines, instrumentation and machine tools, scanning probe microscopy, fabrication of components, nanoelectronics, molecular engineering, among others. (Journal Review: Nanotechnology) Another important step in the development of this technology in both a practical and theoretical sense was

Information Technology Acts While information technology today has many distinct advantages, it is also important to acknowledge that there are some specific potential drawbacks. These drawbacks relate especially to the right to privacy of people making use of information technology. Users of Internet subscription services, for example, expect certain privacy rights in terms of the contact and personal information they choose to divulge. At the same time, large institutions like learning