Michelle Violates The Company's Policy And Her Essay

¶ … Michelle violates the company's policy and her suspicions turn out to be unfounded, then Jerry can sue the company for violation of privacy rights as provided by Electronic Communication privacy Act and by various amendments under U.S. constitution. The ECPA clearly indicates that employers cannot intercept personal communication while they are allowed to view communication that happens occurs ordinarily in the course of daily work (Business law, p. 528). Secondly the company policy also clearly indicates that employees cannot expect privacy when using company email account but their privacy will be protected when using web-based email services. In this case, Michelle would be intercepting communication that occurred through a personal account and if she turns out to be wrong, she can come under fire. However there may be an exception to her situation based on reasonable suspicion. She can provide evidence of Jerry unstable condition and violent behavior which could have put some employees in danger and had already been a source of stress in the workplace. Workplace violence is a potentially explosive situation which can put many lives in danger and also result in major problems for the employer who is responsible for hiring suitable candidates after careful background check. Failure to check the background can lead to violence in the

...

Similarly the inability to pay attention to unstable behavior or signs of distress exhibited by an employee could also bring the employer under fire. For this reason Michelle has adopted the right approach and could use this to justify her actions. But Jerry could still have the law on his side based on violation of privacy rights provided under ECPA and the Constitutional amendments.
ANSWER 2:

Michelle cannot and must not refer to what she found in Jerry's personal email but she can take the following steps to confront Jerry and possible reach a suitable resolution.

a. Michelle must refer to recent examples of unstable behavior demonstrated by Jerry to first explain why she is concerned about his behavior.

b. Without mentioning any names, Michelle must explain that Jerry's behavior is causing stress in the workplace and hurting employees morale

c. She must carefully listen to the reasons that Jerry may provide and also the way he reacts to the accusations. If he becomes overly defensive, this needs to be noted because it can later be brought to attention if Michelle resorts to email interception.

d. All these steps must be taken for two important reasons: first they would give Jerry an indication that his behavior is not going unnoticed and he may therefore become more careful about his behavior in the future. Secondly it may also bring him to his senses in case; he is really planning revenge against someone. Thirdly, it may allow Michelle a chance to see if Jerry needs to see a psychiatrist and she may thus refer the case to the concerned people for further evaluation of Jerry's mental state.

ANSWER 3:

There have been scenarios at our workplace in…

Sources Used in Documents:

References:

Miller, R.L. & Jentz G.A. (2011). Business Law Today 9th Edition. Mason, OH. Cengage.


Cite this Document:

"Michelle Violates The Company's Policy And Her" (2011, May 16) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/michelle-violates-the-company-policy-and-84618

"Michelle Violates The Company's Policy And Her" 16 May 2011. Web.25 April. 2024. <
https://www.paperdue.com/essay/michelle-violates-the-company-policy-and-84618>

"Michelle Violates The Company's Policy And Her", 16 May 2011, Accessed.25 April. 2024,
https://www.paperdue.com/essay/michelle-violates-the-company-policy-and-84618

Related Documents

Acceptable Use Policy AUP Policy Review: Los Angeles Unified School District With continuously evolving technologies, it is important for organizations to set up standards that helps mitigate potential liability in regards to staff potentially of using or misusing such technologies. It is obvious that an Acceptable Use Policy (AUP) is a very important policy within modern organizations in order to define what acceptable employee behavior when accessing company resources is. AUP's help

Transaction Under Each of the Five Ethical Theories Ethical fundamentalism: Juanita's behavior is clearly in contravention of a normative code of ethics since each of the world's religions proscribe bribery. The Bible, for instance, as does the Koran goes on in depth about the severity of perverting justice and bring officials or any one involved in the jurisprudence sector. Utilitarianism Utilitarianism is somewhat stickier in application. If Juanita's behavior provides the greatest amount

Sexual Harassment
PAGES 7 WORDS 2227

Sexual harassment is not something that has a sole effect on the accuser and the victim. This type of behavior has an influence on everything around them. Sexual harassment policies are put in practice to make sure there is a safe environment and lessen employer liability. There are approaches that can be performed in order to display the commitment that is from people in high places. With that said, this

Figure 1 portrays three of the scenes 20/20 presented March 15, 2010. Figure 1: Heather, Rachel, and Unnamed Girl in 20/20 Program (adapted from Stossel, 2010). Statement of the Problem For any individual, the death of a family member, friend, parent or sibling may often be overwhelming. For adolescents, the death of person close to them may prove much more traumatic as it can disrupt adolescent development. Diana Mahoney (2008), with the

As Geisel (2004) notes: Income-tax deductions are worth the most to high-bracket taxpayers, who need little incentive to save, whereas the lowest-paid third of workers, whose tax burden consists primarily of the Social Security payroll tax (and who have no income-tax liability), receive no subsidy at all. Federal tax subsidies for retirement saving exceed $120 billion a year, but two thirds of that money benefits the most affluent 20% of

" According to the American Civil Liberties Union (ACLU). A "national security letter" (NSL) is basically a written demand by the FBI or other federal law enforcement agencies for a group or organization to turn over records or data or documents, with no warrant attached to the demand. They are given out without probably cause or any justice-related back-up, and have been used extensively since the Patriot Act; they are