Employee Privacy Essays (Examples)

825+ documents containing “employee privacy”.


Sort By:

Reset Filters
Employee Privacy
PAGES 4 WORDS 1267

Employee Privacy
The objective of this study is to read the case Deal V. Spears United States Court Of Appeals, Eighth Circuit, 980 F. 2D 1153 (1992) and to answer the questions of whether it is lawful to monitor the telephone conversation of an employee if the employee has given prior consent and to answer if in this case whether Deal give her employer consent in this case? This study will additionally examine whether due to the recent burglary of the store, whether the employer had a legitimate business reason to record and review the employee's phone calls made or received at work. Finally, this study will consider what, under the Watkins precedent, is the extent to which an employer can monitor personal phone calls to employees within the ordinary course of business exemption of the federal wiretapping law where is no evidence of express consent here.

Background

The basis of the complaint….

Employee Privacy Torts
PAGES 25 WORDS 7119

Employee Privacy Torts
Issues relating to employee privacy have been at the forefront of businesses for many years. This has been fuelled by the dynamic workplace which changes constantly and also by employees and employers being more litigation-conscious. Technology has also spurred on employee privacy issues with e-mail and the internet being related to heightened concerns about vulnerability of employers to litigation. Many employers have thus exacerbated their concerns relating to employee privacy and especially monitoring of employee behavior. Employee privacy is respected in many of the large corporations. However, there still exist some breaches in employee privacy. Small business owners are at most risk as a result of their increased monitoring practices and close employer-employee interaction.

Historical background

oberson v. ochester Folding Box Company

One of the major cases that brought employee privacy to the limelight was oberson v. ochester Folding Box Company

Franklin Mills Co. decided to appeal the decision. The appellate found….

Employee Privacy Torts
PAGES 25 WORDS 8246

Employee Privacy Torts
History of Employee Privacy

Changing Trends of Employee Privacy

Impact of Innovative Technology on Employee Privacy

ole of Social Media towards Employee Privacy

Impact of Changing Community/Society on Employee Privacy

Adaptation to the new Environment pertaining to Employee Privacy

Employee Monitoring and Surveillance

Laws and Employer Policies for Text Messaging and Social Media

Electronic Communication Privacy Act

Monitoring of Employee Conversations over Telephone & Email

ecommendations for creating Effective Policies

Future Implications of Employee Privacy

As years have passed and the human race has penetrated into the epoch of twenty first century, the technological advancements have conquered almost every facet of human life, especially the workplace. The widespread platform of the internet has become the integral part of a person's life, in the same manner as businesses are employing technological advancements to perform numerous activities like internet infrastructure, maintenance of computers and so on. It means that the human race is residing in a magnificent era where the flow of….

This will prevent visitation to illicit websites such as pornographic and gambling websites; prevent usage of ecommerce sites such as Amazon or Ebay; or to prevent the use of general recreational or social sites such as Facebook and Myspace. Other companies may elect, with all legal protection, to prevent any web navigation beyond those sites which are essential to conducting business.
hy do companies implement e-mail and Internet use policies?

Most companies determine to use such monitoring policies based on the calculated view that the loss of privacy will promote greater workplace efficiency by discouraging inappropriate use of company resources and time. Among the reasons supplied for using email and web-use monitoring, the text by iBrief (2001) offers the needs to preserve the company's professional reputation, the maintenance of employee productivity, preventing sexual harassment or cyberstalking, preventing defamation, preventing illegal company disclosure and preventing copyright infringement. (iBrief, 1)

hat assumptions might employees….

Employers may unequivocally monitor any message that utilizes company-provided email" (Sherman, 2007, pg. 649). Problems arise when the employer attempts other methods monitoring as Sherman notes; "The law is not clear, however, when an employer accesses an employee's webmail" (Sherman, pg. 649). Similar to the Deal v Spears case, the employer must take certain precautions in order to secure the right of monitoring. Many companies have developed policies and guidelines that are communicated to the employee in order to meet those requirements, but there are plenty of employee rights organizations that worry about infringement of employee privacy.
As technology can afford anonymity so to can it provide evidence that see through such anonymity. Thomas Jefferson once wrote; "Laws and institutions must go hand in hand with the progress of the human mind. As that becomes more developed, more enlightened, as new discoveries are made... And opinions change with the change….

This could be construed as a part of the atmosphere that exists in the work place. At which point, entity / individual can sue the employer for violating the law, by not properly monitoring their employees' email and internet activities. ("Workplace Privacy and Employee Monitoring" 2010)
However, a larger concern that employers have is any email sent to someone by an employee can become a problem for them in the future. Where, an employee may tell a customer something in an email, then delete it and deny they said anything. The problem for the employer is that email correspondence can be retrieved later on, after the person has deleted the email. This can be used as evidence that the company knowingly knew what was occurring, because of the email record. If there were any kind of laws broken, law enforcement has a right to view all email correspondence with a….

Employee Privacy
Avoid liability invasion privacy Essay Question: List discuss ways employers avoid liability invasion privacy. Essay 350 words length APA format. There -text citation essay.

List and discuss different ways employers can avoid liability for invasion of privacy

Employers often justify intrusions into employee privacy based upon safety concerns: concerns about jeopardizing the health of the public can be used to allow drug and alcohol tests. Even lifestyle habits may be restricted, based upon the additional healthcare costs they can incur employers. Weight restrictions may be allowed if maintaining a certain weight is a safety hazard at some jobs, which is why "49 states allow weight standards that do not violate the ADA" (Bennett-Alexander & Hartman 2009: 682). Dating employees or the employees of a competitor business and moonlighting at another organization (which could reveal trade secrets or result in employees working too many hours to be productive) may be prohibited as….

Employee E-Mail and Internet Privacy Policies
The increased usage of the Internet and e-mail has changed the way companies do business. Nearly instantaneous communication can take place globally. Information on a countless number of topics can now be accessed from anywhere around the world. These technological developments have not only helped employees increase their efficiencies, but also has given them a new means of distraction from their duties. For this reason, many companies have developed e-mail and Internet policies.

At my job, our e-mail policy states that e-mails should not include illegal or libelous statements. E-mail is to be used for business purposes only and e-mail communications are the property of the company. For this reason, the company may access sent and received from work computers at any time, this includes deleted e-mails that are stored on the company's servers. The Internet policy is similar in that the Internet is also to….

Employee Privacy Memos
PAGES 3 WORDS 879

Work Distraction
The purpose of this memorandum is to inform the new company wide change of policy in monitoring employees. This information is a company directive and is expected to be followed and adhered to starting on today's date.

Recent developments in technology have made our jobs and tasks easier in many aspects. The internet, mobile, communication and social media are great tools that should be taken advantage of when the situation depends. However, this way of conducting business and relying on technology has some drawbacks as well. It has been learned from the Executive Leadership Branch of this company that nearly 1.5 hours of the work day are at risk from employee distractions related to emails, online browsing and phone calls.

Management will now be responsible for monitoring all employee's emails and phone calls. This will be done not for acquiring personal information, rather to discover work-related violations and abuse of our….

Privacy in the Workplace
PAGES 5 WORDS 1595

Privacy in the Workplace
The importance of privacy has risen over the years and its handling has become extremely crucial lately. Defaulting organisations have been faced with serious legal actions and thus, companies have taken a higher interest in the conversations of their workforce. However, this effort of the employer aimed at monitoring the activities of workers isn't as smooth as it should be due to the right of the employee to personal privacy.

The right of the workers to workplace privacy has caused several court cases recently, mostly due to the digital revolution of business communication i.e. emails, memos etc. Technological developments have made it possible for all form of digital communication as well as Internet use in the workplace to be placed under surveillance. Although employees have their reservations about this, the employers are protected by the law. However, other actions of the workers like confidential discussions and their private….

Privacy Do We Have in
PAGES 5 WORDS 1593

This will pevent the employee fom claiming that they had thei basic civil ights violated.
In the futue, once new changes ae intoduced (fom tansfomations in technology), is when thee will be new policies implemented. Duing this pocess, eveyone will have to go though a new couse that will explain these guidelines. Afte they have finished, is when they will sign anothe disclosue document.

If the kind of appoach was used by employes, it will help to avoid many of the legal challenges that ae impacting fims. This is because executives ae taking the Iowa Supeme Cout guidelines and ae going beyond them. In the event that they ae sued, the fim can demonstate that they ae doing above what is equied (when it comes to these challenges). It is at this point, that an employe can stike a balance between monitoing the activities of staff membes and potecting thei pivacy.

Refeences

Though….

Acceptable Use Policy at Cincom Systems
Policy for Cincom Systems

Cincom Systems' customers are the foundation of our success. This acceptable IT use policy statement is designed to provide our employees with the agility and flexibility to meet customer needs with accuracy and speed, while also protecting our IT systems, data, and records. This document defines the baseline of expectations for Cincom employees in interacting with all Cincom computing systems, platforms, Virtual Private Network (VPN) connections and partner sites as well. Every employee is expected at a minimum to ensure their activities on all Cincom IT systems don't jeopardize the confidentiality of customer data, financial data generated from Cincom operations, product and project development plans, and costing data of projects. As Cincom engages in confidential projects with governments globally in addition to the U.S. Department of Defense, any employee using data on these projects are required to have a valid DoD….

One study by the ePolicy Institute found that 85% of employees admit to recreational surfing at work and seventy percent of employees admitted to receiving or sending adult-oriented personal e-mails at work, while 60% admitted to exchanging e-mail that could be considered racist, sexist or otherwise "politically incorrect" (Griffaton pp). In fact most traffic to Internet pornographic sites occurs during regular business hours, probably because Internet connections usually are faster in the workplace (Griffaton pp). Companies have taken note of these statistics and have adopted e-mail and Internet usage policies that contain provisions for continuous or random monitoring of usage (Griffaton pp).
The ePolicy Institute study reports that 77% of employers monitor employees' e-mail and Internet use, in fact, 10% of workers with e-mail and Internet access, roughly 14 million people, are under continuous online surveillance (Griffaton pp). Approximately two thirds of employers have disciplined or terminated employees for violating….

Employee Monitoring
PAGES 4 WORDS 1353

Ethical Implications of Employee Monitoring
In recent years information technology (IT) has transformed workplaces tremendously. For instance, employers worldwide have embraced the use of technology to monitor the activities employees engage in during working hours and to increase the amount of work done on online business platforms. This was largely influenced by findings from numerous studies that established that if left unsupervised, employees tend to waste a lot of time and resources online. In fact, one Survey by Websense reported that one third of employees used the internet for personal reasons, which translates to costs of about $85 billion in America due to lost work time (Papini, 2007). Some employees may also use company resources for their own gain, which violates the organization's rules and procedures and decreases their productivity. According to a study done by the Work Surveillance Project of the Privacy Foundation[footnoteef:1], of the 100 million online workers….

Employee Layoff
A friend in California has just lost his job in a layoff together with 98 other employees in the same private sector company. The company's administrators have told him that he was included in the recent layoff because of his refusal to take a lie detector test regarding some drugs that were found in his company locker. He also declined to take a drug test since he was afraid that a positive result would make the state child protection agency to take away custody of his children. This situation is an example of a scenario with legal ramifications on the basis of several regulations such as Polygraph Protection Act, Worker Adjustment and etraining Notification Act, Privacy laws, Drug Testing laws, and OSHA.

Generally, the use of lie detector tests in the workplace is not geared towards determining whether an employee is telling the truth but to examine whether the worker's….

image
4 Pages
Case Study

Business - Law

Employee Privacy

Words: 1267
Length: 4 Pages
Type: Case Study

Employee Privacy The objective of this study is to read the case Deal V. Spears United States Court Of Appeals, Eighth Circuit, 980 F. 2D 1153 (1992) and to answer…

Read Full Paper  ❯
image
25 Pages
Research Paper

Business - Law

Employee Privacy Torts

Words: 7119
Length: 25 Pages
Type: Research Paper

Employee Privacy Torts Issues relating to employee privacy have been at the forefront of businesses for many years. This has been fuelled by the dynamic workplace which changes constantly and…

Read Full Paper  ❯
image
25 Pages
Research Paper

Careers

Employee Privacy Torts

Words: 8246
Length: 25 Pages
Type: Research Paper

Employee Privacy Torts History of Employee Privacy Changing Trends of Employee Privacy Impact of Innovative Technology on Employee Privacy ole of Social Media towards Employee Privacy Impact of Changing Community/Society on Employee Privacy Adaptation to…

Read Full Paper  ❯
image
3 Pages
Thesis

Careers

Employee Privacy Balancing Employee Privacy

Words: 832
Length: 3 Pages
Type: Thesis

This will prevent visitation to illicit websites such as pornographic and gambling websites; prevent usage of ecommerce sites such as Amazon or Ebay; or to prevent the use…

Read Full Paper  ❯
image
3 Pages
Research Proposal

Careers

Employee Privacy Since the 1992

Words: 969
Length: 3 Pages
Type: Research Proposal

Employers may unequivocally monitor any message that utilizes company-provided email" (Sherman, 2007, pg. 649). Problems arise when the employer attempts other methods monitoring as Sherman notes; "The law…

Read Full Paper  ❯
image
3 Pages
Research Paper

Careers

Employee Privacy Business Report the

Words: 1224
Length: 3 Pages
Type: Research Paper

This could be construed as a part of the atmosphere that exists in the work place. At which point, entity / individual can sue the employer for violating…

Read Full Paper  ❯
image
2 Pages
Essay

Careers

Employee Privacy Avoid Liability Invasion Privacy Essay

Words: 546
Length: 2 Pages
Type: Essay

Employee Privacy Avoid liability invasion privacy Essay Question: List discuss ways employers avoid liability invasion privacy. Essay 350 words length APA format. There -text citation essay. List and discuss different ways…

Read Full Paper  ❯
image
2 Pages
Essay

Careers

Employee E-Mail and Internet Privacy Policies the

Words: 639
Length: 2 Pages
Type: Essay

Employee E-Mail and Internet Privacy Policies The increased usage of the Internet and e-mail has changed the way companies do business. Nearly instantaneous communication can take place globally. Information on…

Read Full Paper  ❯
image
3 Pages
Term Paper

Careers

Employee Privacy Memos

Words: 879
Length: 3 Pages
Type: Term Paper

Work Distraction The purpose of this memorandum is to inform the new company wide change of policy in monitoring employees. This information is a company directive and is expected to…

Read Full Paper  ❯
image
5 Pages
Essay

Business

Privacy in the Workplace

Words: 1595
Length: 5 Pages
Type: Essay

Privacy in the Workplace The importance of privacy has risen over the years and its handling has become extremely crucial lately. Defaulting organisations have been faced with serious legal actions…

Read Full Paper  ❯
image
5 Pages
Case Study

Careers

Privacy Do We Have in

Words: 1593
Length: 5 Pages
Type: Case Study

This will pevent the employee fom claiming that they had thei basic civil ights violated. In the futue, once new changes ae intoduced (fom tansfomations in technology), is when…

Read Full Paper  ❯
image
5 Pages
Research Paper

Business

Employee it Acceptable Use Policy

Words: 1577
Length: 5 Pages
Type: Research Paper

Acceptable Use Policy at Cincom Systems Policy for Cincom Systems Cincom Systems' customers are the foundation of our success. This acceptable IT use policy statement is designed to provide our…

Read Full Paper  ❯
image
5 Pages
Term Paper

Careers

Employee's E-Mail in the Year

Words: 1326
Length: 5 Pages
Type: Term Paper

One study by the ePolicy Institute found that 85% of employees admit to recreational surfing at work and seventy percent of employees admitted to receiving or sending adult-oriented…

Read Full Paper  ❯
image
4 Pages
Research Paper

Careers

Employee Monitoring

Words: 1353
Length: 4 Pages
Type: Research Paper

Ethical Implications of Employee Monitoring In recent years information technology (IT) has transformed workplaces tremendously. For instance, employers worldwide have embraced the use of technology to monitor the activities…

Read Full Paper  ❯
image
2 Pages
Case Study

Careers

Case Study on Employee Layoff

Words: 704
Length: 2 Pages
Type: Case Study

Employee Layoff A friend in California has just lost his job in a layoff together with 98 other employees in the same private sector company. The company's administrators have told…

Read Full Paper  ❯