Surveillance Software Privacy Legislation And Article Review

PAGES
2
WORDS
656
Cite

Employers should always be aware of what is considered a reasonable expectation of privacy. In certain industries, workplace monitoring may be necessary so that the company can protect itself. In the case of an organization that deals with the well being of children, even with thorough background checks performed it may still be necessary to monitor the employee's website usage or set up surveillance cameras in designated areas. Hillside, Inc. is a company that assists abused and neglected children and has a policy that any Web site an employee visits could be monitored. The company found that pornographic websites were access on its computers during off hours and set up surveillance cameras in a shared office in hopes of catching the perpetrator. The employees sharing the monitored office filed a lawsuit claiming their right to privacy was violated. Initially, a judgement was ruled in favor of Hillside, Inc. However, after an appeal by the plaintiffs, the ruling was overturned.

Workplace privacy is not a matter of whether or not an employee will be monitored because...

...

Given this, employees have an obligation to the company and to themselves to perform personal business from their home computers and not on the company's time using company property. By doing this, stress can be minimized while boosting employee morale making for a more productive workplace.
Bibliography

Dillenberger, Cassandra, "Workplace Privacy: A Changing Landscape," Contractor's

Business Management Report 10, (October 2009): 1, 10-12.

Friedman, Barry A. And Lisa J. Reed, "Workplace Privacy: Employee Relations and Legal Implications of Monitoring Employee E-mail Use," Employee

Responsibilities and Rights Journal 19, no. 2, (2007): 75-83.

Barry A. Friedman and Lisa J. Reed, "Workplace Privacy: Employee Relations and Legal Implications of Monitoring Employee E-mail Use," Employee Responsibilities and Rights Journal 19, no. 2, (2007): 76.

Cassandra Dillenberger, "Workplace Privacy: A Changing Landscape," Contractor's Business Management Report 10, (October 2009): 10-11.

Sources Used in Documents:

Bibliography

Dillenberger, Cassandra, "Workplace Privacy: A Changing Landscape," Contractor's

Business Management Report 10, (October 2009): 1, 10-12.

Friedman, Barry A. And Lisa J. Reed, "Workplace Privacy: Employee Relations and Legal Implications of Monitoring Employee E-mail Use," Employee

Responsibilities and Rights Journal 19, no. 2, (2007): 75-83.


Cite this Document:

"Surveillance Software Privacy Legislation And" (2010, August 10) Retrieved April 24, 2024, from
https://www.paperdue.com/essay/surveillance-software-privacy-legislation-9129

"Surveillance Software Privacy Legislation And" 10 August 2010. Web.24 April. 2024. <
https://www.paperdue.com/essay/surveillance-software-privacy-legislation-9129>

"Surveillance Software Privacy Legislation And", 10 August 2010, Accessed.24 April. 2024,
https://www.paperdue.com/essay/surveillance-software-privacy-legislation-9129

Related Documents
Privacy Abuse and Protection
PAGES 13 WORDS 3618

Privacy and Abuse Protection Efforts of Businesses Facts Many workforces in most nations all over the world are increasingly becoming global. These workforces cooperate, communicate, and link up in multinationals and global marketplaces via web-based applications across countries and territories. The phenomenon of globalization has removed quite a number of differences amongst peoples and nations both in workplaces and in other areas[footnoteRef:2]. However, some questions have been raised on the origins of

Studies done by the United States Defense Department have discovered the technology to be correct only fifty-four percent of the time. Furthermore, the study found that the systems could easily be compromised by alterations in weight, hair color, sunglasses, and even weather and lighting alterations (McCullagh & Zarate, 2002). Additionally, behavioral recognition software can often incorrectly identify movements, such as tree branches, and follow those objects instead of actual

Internet Privacy for High School Students The unrestrained stream of information is conceived necessary for democracies and market-based economies. The capability of the Internet to make available the vast quantity of information to practically everyone, irrespective of their locations thus entails large benefits. The Internet provides access to the greatest libraries of the world to the students even in the smallest towns and permit the medical specialists to analyze the patients

Confab, however, is an architecture that is able to bypass these limitations and combine both approaches. It is limited, though, and a true pervasive environment calls for complex preferences that can be easily manipulated by the end user. Moreover, all these approaches are not completely sufficient in meeting the challenges mentioned in section 3.2. For instance, PETs and privacy models do not explicitly contribute in a reduction of data collection, nor

But the failure must be corrected within 30 days from the time of notification of the violation. Criminal penalty will be imposed on a person who knowingly obtains and reveals identifiable health information and violates HIPAA Rules at a fine of $50,000 and up to 1 year imprisonment. The fine can increase to $100,000 and the imprisonment to 5 years if the violation involves false pretenses. The fine can

Employee Privacy Torts
PAGES 25 WORDS 8246

Employee Privacy Torts History of Employee Privacy Changing Trends of Employee Privacy Impact of Innovative Technology on Employee Privacy Role of Social Media towards Employee Privacy Impact of Changing Community/Society on Employee Privacy Adaptation to the new Environment pertaining to Employee Privacy Employee Monitoring and Surveillance Laws and Employer Policies for Text Messaging and Social Media Electronic Communication Privacy Act Monitoring of Employee Conversations over Telephone & Email Recommendations for creating Effective Policies Future Implications of Employee Privacy As years have passed and