Verified Document

Resolve Ethical Issues That Arise From The Intersection Of Law Compliance And Investigations Essay

Legal Compliance resolve ethical issues that arise from the intersection of Law, Compliance & Investigations

Ethics, law, and compliance

There is always a need to balance the individual's right to privacy with a government or business' right to investigate breaches of security, whether of a technical or non-technical matter. "New technologies make it possible for employers to monitor many aspects of their employees' jobs that "they could not previously, and "such monitoring is virtually unregulated. Therefore, unless company policy specifically states otherwise (and even this is not assured), your employer may listen, watch and read most of your workplace communication" (Fact Sheet 7, 2012, Privacy Rights Clearinghouse). Most companies take advantage of the fact that the law is on their side regarding workplace monitoring. "Of the 43% of companies that monitor e-mail, nearly three-fourths use technology to automatically monitor e-mail. And 28% of employers have fired workers for e-mail misuse" (Fact Sheet 7, 2012, Privacy Rights Clearinghouse). Employers monitor web-surfing and block specific websites to reduce...

Parts of this document are hidden

View Full Document
svg-one

For example, in the NJ case of Stengart v. Loving Care Agency, Inc. (2010) the court found that "the employee had a reasonable expectation of privacy in the use of a personal Web-based email account -- even though accessed from the employer's computer-where the use of such an account was not clearly covered by the company's policy and the emails contained a standard hallmark warning that the communications were personal, confidential, attorney-client communications" (Adams 2012). But in California, Holmes v. Petrovich Dev. Co. (2011) 191 the appellate court found in favor of the employer's right to monitor employee email, because the employee had been explicitly warned of the fact that her email correspondence from work would be monitored and the employer's computers "were to be used only…

Sources used in this document:
References

Adams, Mark. (2012). United States: Losing the expectation of privacy bit by bit, byte by byte

. Jeffrey, Mangles, Butler & Mitchell LLC. Retrieved: http://www.mondaq.com/unitedstates/x/190720/employee+rights+labour+relations/Losing+The+Expectation+Of+Privacy+Bit+By+Bit+Byte+By+Byte

Fact Sheet 7: Workplace privacy and employee monitoring. (2012). Privacy Rights

Clearinghouse. Retrieved: https://www.privacyrights.org/fs/fs7-work.htm
Grama, Joanna. (2012). ITNS and CERIAS CISSP Luncheon Series: Legal, regulations, compliance and investigations. Purdue University. Retrieved: http://www.purdue.edu/securepurdue/docs/training/LegalRegulationsComplianceInvestigations.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Elder Abuse Phenomenon Correlating Relationship
Words: 15855 Length: 58 Document Type: Term Paper

126). Although there are an increasing number of elderly in the United States today with many more expected in the future, the study of elder abuse is of fairly recent origin. During the last three decades of the 20th century, following the "discovery" of child abuse and domestic violence, scholars and professionals started taking an active interest in the subject of elder abuse. This increased attention from the academic

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now