Workplace Privacy Essays (Examples)

Filter results by:

 

View Full Essay

Privacy in the Workplace

Words: 1595 Length: 5 Pages Document Type: Essay Paper #: 14259801

Privacy in the Workplace

The importance of privacy has risen over the years and its handling has become extremely crucial lately. Defaulting organisations have been faced with serious legal actions and thus, companies have taken a higher interest in the conversations of their workforce. However, this effort of the employer aimed at monitoring the activities of workers isn't as smooth as it should be due to the right of the employee to personal privacy.

The right of the workers to workplace privacy has caused several court cases recently, mostly due to the digital revolution of business communication i.e. emails, memos etc. Technological developments have made it possible for all form of digital communication as well as Internet use in the workplace to be placed under surveillance. Although employees have their reservations about this, the employers are protected by the law. However, other actions of the workers like confidential discussions and…… [Read More]

Bibliography

Cox, S., Goette, T., & Young, D. (2005). Workplace Surveillance and Employee Privacy: Implementing an Effective Computer Use Policy. Communications of the IIMA.

Muhl, C., (2003). Workplace e-mail and Internet use; employees and employers beware. Monthly Labor Review. 2, 36-45.

Smith, D., & Burg, J. (2012). What Are the Limits of Employee Privacy? Retrieved from GP Solo: http://www.americanbar.org/publications/gp_solo/2012/november_december2012privacyandconfidentiality/what_are_limits_employee_privacy.html
View Full Essay

Employee Privacy Torts

Words: 8246 Length: 25 Pages Document Type: Essay Paper #: 78841111

Employee Privacy Torts

History of Employee Privacy

Changing Trends of Employee Privacy

Impact of Innovative Technology on Employee Privacy

ole of Social Media towards Employee Privacy

Impact of Changing Community/Society on Employee Privacy

Adaptation to the new Environment pertaining to Employee Privacy

Employee Monitoring and Surveillance

Laws and Employer Policies for Text Messaging and Social Media

Electronic Communication Privacy Act

Monitoring of Employee Conversations over Telephone & Email

ecommendations for creating Effective Policies

Future Implications of Employee Privacy

As years have passed and the human race has penetrated into the epoch of twenty first century, the technological advancements have conquered almost every facet of human life, especially the workplace. The widespread platform of the internet has become the integral part of a person's life, in the same manner as businesses are employing technological advancements to perform numerous activities like internet infrastructure, maintenance of computers and so on. It means that…… [Read More]

References

Baker, D., Buoni, N., Fee, M. & Vitale, C. (2011). Social Networking and Its Effects on Companies and Their Employees. Retrieved from: http://www.neumann.edu/academics/divisions/business/journal/Review2011/SocialNetworking.pdf

Bergh, N.V.D. (2000). Emerging Trends for Eaps in the 21st Century. Haworth Press, Incorporated.

Campbell, D. (2007). The Internet 2007: Laws and Regulatory Regimes. USA: Lulu.com.

Cate, F.H. (1997). Privacy in the Information Age. USA: Brookings Institution Press.
View Full Essay

Employee Privacy Torts

Words: 7119 Length: 25 Pages Document Type: Essay Paper #: 96826900

Employee Privacy Torts

Issues relating to employee privacy have been at the forefront of businesses for many years. This has been fuelled by the dynamic workplace which changes constantly and also by employees and employers being more litigation-conscious. Technology has also spurred on employee privacy issues with e-mail and the internet being related to heightened concerns about vulnerability of employers to litigation. Many employers have thus exacerbated their concerns relating to employee privacy and especially monitoring of employee behavior. Employee privacy is respected in many of the large corporations. However, there still exist some breaches in employee privacy. Small business owners are at most risk as a result of their increased monitoring practices and close employer-employee interaction.

Historical background

oberson v. ochester Folding Box Company

One of the major cases that brought employee privacy to the limelight was oberson v. ochester Folding Box Company

Franklin Mills Co. decided to appeal…… [Read More]

References

Anderson v. City of Philadelphia, 845 F. 2d 1216 (1988).

Borse v. Piece Goods Shop, 963 F.2d 611 (1991).

Burlington Industries, Inc. v. Ellerth, 524 U.S. 742 (1988).

City of Ontario v. Quon, 130 S.Ct. 2619, 560 U.S. (2010).
View Full Essay

Employee Handbook Privacy Section ABC Widget Company

Words: 1173 Length: 4 Pages Document Type: Essay Paper #: 43580439

Employee Handbook Privacy Section

ABC Widget Company: Employee Handbook Privacy Section

What privacy rights issues should be addressed?

In the Age of Information, there are increasing concerns being voiced about what can legitimately be expected to be kept private, and how these issues affect employees' rights in the workplace. According to Hayden, Hendricks and Novak (1990, most adults spend approximately one-half of their waking hours in the workplace today, and it is therefore not surprising that employment practices affect a broad range of privacy rights. With the sole exception of polygraph ("lie-detector") testing, there are not many areas of workplace activities that are addressed by the U.S. Constitution or national privacy laws. As a result, employers in the United States have a great deal of flexibility in collecting data on their employees, regulating their access to personnel files, and disclosing the contents of employee files to those outside the organization.…… [Read More]

References

Backer, T.E. & O'Hara, K.B. (1991). Organizational change and drug-free workplaces:

Templates for success. New York: Quorum Books.

Hayden, T., Hendricks, E. & Novik, J.D. (1990). Your right to privacy: A basic guide to legal rights in an information society. Carbondale, IL: Southern Illinois University Press.

Muhl, C.J. (2003). Workplace E-Mail and Internet Use: Employees and Employers Beware An
View Full Essay

Employee Privacy Business Report the

Words: 1224 Length: 3 Pages Document Type: Essay Paper #: 98905767

This could be construed as a part of the atmosphere that exists in the work place. At which point, entity / individual can sue the employer for violating the law, by not properly monitoring their employees' email and internet activities. ("Workplace Privacy and Employee Monitoring" 2010)

However, a larger concern that employers have is any email sent to someone by an employee can become a problem for them in the future. Where, an employee may tell a customer something in an email, then delete it and deny they said anything. The problem for the employer is that email correspondence can be retrieved later on, after the person has deleted the email. This can be used as evidence that the company knowingly knew what was occurring, because of the email record. If there were any kind of laws broken, law enforcement has a right to view all email correspondence with a…… [Read More]

Bibliography

Work Place Privacy and Employee Monitoring. (2010). Retrieved March 7, 2010 from Privacy Rights website:

http://www.privacyrights.org/fs/fs7-work.htm

Saunders, K. (2003). Practical Internet Law for Business. Boston, MA: Artech House.
View Full Essay

Employee Privacy Balancing Employee Privacy

Words: 832 Length: 3 Pages Document Type: Essay Paper #: 53808244

This will prevent visitation to illicit websites such as pornographic and gambling websites; prevent usage of ecommerce sites such as Amazon or Ebay; or to prevent the use of general recreational or social sites such as Facebook and Myspace. Other companies may elect, with all legal protection, to prevent any web navigation beyond those sites which are essential to conducting business.

hy do companies implement e-mail and Internet use policies?

Most companies determine to use such monitoring policies based on the calculated view that the loss of privacy will promote greater workplace efficiency by discouraging inappropriate use of company resources and time. Among the reasons supplied for using email and web-use monitoring, the text by iBrief (2001) offers the needs to preserve the company's professional reputation, the maintenance of employee productivity, preventing sexual harassment or cyberstalking, preventing defamation, preventing illegal company disclosure and preventing copyright infringement. (iBrief, 1)

hat assumptions…… [Read More]

Works Cited:

iBrief. (2001) Monitoring Employee E-Mail: Efficient Workplaces Vs. Employee Privacy. Duke L. & Technology Review, 26.

Privacy Rights Clearinghouse (PRC). (2009). Fact Sheet 7: Workplace Privacy and Employee Monitoring. Privacy Rights.org. Online at http://www.privacyrights.org/fs/fs7-work.htm
View Full Essay

An Ethical Workplace Dilemma Technology and Monitoring

Words: 1080 Length: 3 Pages Document Type: Essay Paper #: 32003103

Monitoring Employee Communications

The workplace is highly complex, and while there is a great deal of emphasis placed on practical aspects such as management of resources and operational strategies, there is less attention paid to ethical issues. With the evolution technology, there is an increasing potential for businesses to benefits from its application, concurrently, there are many different ethical issues which may need to be considered (Tavani, 2013). An increasingly controversial issue has been the rights of employees to privacy when using workplace computers for personal communications (Blanchard, 2016). This may be argued as becoming increasingly complex, as not only are employees using the workplace equipment, they may also be using their own devices which are attached to workplace networks, or where employees may placer information that can be accessed on social media (Buettner, 2015). The ability to monitor employee communications, need for commercial confidentially, and the desire of employees…… [Read More]

References

Blanchard, O. (2016) 'Employee Privacy in Light of New Technologoes: An Ethocal and Strategic Framework', Cornell HR Review. Available at:  http://www.cornellhrreview.org/wp-content/uploads/2016/05/CHRR-2016-Blanchard-Employee-Privacy.pdf .

Buchanan, D. and Huczynski, A. (2011) Organisational Behaviour. Harlow: FT/Prentice Hall.

Buettner, R. (2015) 'Analyzing the Problem of Employee Internal Social Network Site Avoidance: Are Users Resistant due to their Privacy Concerns?', in Proceedings of the 48th Hawaii International Conference on System Sciences. Available at:  https://pdfs.semanticscholar.org/1fc9/66c9ff1b59f41c198f297fa3f186b1578bbc.pdf .

Chyssides, G. D. and Kaler, J. H. (1998) An Introduction to Business Ethics. London: Thompson Business Press.
View Full Essay

Workplace Are Job Knowledge Tests Cognitive Ability

Words: 1575 Length: 4 Pages Document Type: Essay Paper #: 84569419

workplace are job knowledge tests, cognitive ability tests, and personality tests.

Job Knowledge Tests

Achievement tests or job knowledge tests are composed of questions designed to measure technical or professional expertise in a specific area of knowledge. Therefore job knowledge tests assess the knowledge of the test taker at the point in time of the assessment. Job knowledge tests are most often utilized in conditions that require applicants to possess a specific set or type of information prior to being hired (Dye, eck, & McDaniel, 1993). Job knowledge tests are useful for positions that require some type of specialized skill or technical knowledge. Typically this type of skill or knowledge has been acquired over a long period. Given this, job knowledge tests are not appropriate to use when the applicants will are going to be trained in the areas tested following their selection. The most common format of job knowledge…… [Read More]

References

American Psychological Association. (2011). Rights and responsibilities of test takers:

guidelines and expectations. In, American Psychological Association (APA). Retrieved November, 29, 2011, from http://www.apa.org/science/programs/testing/rights.aspx

Anastasi, A. (1967). Psychology, psychologists, and psychological testing. American Psychologist, 22(4), 297-306.

Anastasi, A. & Urbina, S. (1997). Psychological testing (7th ed.). Upper Saddle River:
View Full Essay

Privacy Do We Have in

Words: 1593 Length: 5 Pages Document Type: Essay Paper #: 51177081

This will pevent the employee fom claiming that they had thei basic civil ights violated.

In the futue, once new changes ae intoduced (fom tansfomations in technology), is when thee will be new policies implemented. Duing this pocess, eveyone will have to go though a new couse that will explain these guidelines. Afte they have finished, is when they will sign anothe disclosue document.

If the kind of appoach was used by employes, it will help to avoid many of the legal challenges that ae impacting fims. This is because executives ae taking the Iowa Supeme Cout guidelines and ae going beyond them. In the event that they ae sued, the fim can demonstate that they ae doing above what is equied (when it comes to these challenges). It is at this point, that an employe can stike a balance between monitoing the activities of staff membes and potecting thei…… [Read More]

references cited in the paper in APA guideline format
View Full Essay

Workplace Drug Screening Opinion

Words: 1173 Length: 3 Pages Document Type: Essay Paper #: 28102510

Drug Testing in the Workplace

Most employers in the United States are not required to do drug testing on either current or potential employees, although the majority have the right to do so (United States Department of Labor, 2010). Drug testing is not required under the Drug-Free Workplace Act of 1988. The Act can be confusing and challenging for employers, however, since it essentially states that any organization receiving federal grants or contracts must be drug-free but does not contain language that specifically allows for drug testing (Thompson euters 2011). Many state and local governments limit or prohibit drug testing unless required for certain jobs with state or Federal governments.

As far back as 1997, the American Civil Liberties Union was deploring the use of drug testing in the workplace, citing an increase of 277% over a ten-year period (American Civil Liberties Union, 1997). Drug testing remains a controversial issue…… [Read More]

References

Drug-free workplace policy builder. Section 7: Drug testing. (2010). U.S. Department of Labor.

Retrieved from http://www.dol.gov/elaws/asp/drugfree/drugs/screen92.asp

Drummer, O.H. (2006). Drug testing in oral fluid. Clinical Biochemist Reviews 27(30), pp. 147-

Privacy in America: Workplace drug testing. (1997). American Civil Liberties Union.
View Full Essay

Privacy for High School Students

Words: 12892 Length: 40 Pages Document Type: Essay Paper #: 13864282

Internet: Privacy for High School Students

An Analysis of Privacy Issues and High School Students in the United States Today

In the Age of Information, the issue of invasion of privacy continues to dominate the headlines. More and more people, it seems, are becoming victims of identity theft, one of the major forms of privacy invasion, and personal information on just about everyone in the world is available at the click of a mouse. In this environment, can anyone, especially high school students, reasonably expect to have any degree of privacy? High school students, after all, are not protected by many of the same constitutional guarantees as adults, but their needs for privacy may be as great, or greater, than their adult counterparts. To determine what measure of privacy, if any, high schools students can expect at home and school today, this paper provides an overview of the issue of…… [Read More]

References

Alarming Number of Teens Addicted to the Internet. (2001, February 1). Korea Times, 3.

Albanes, R., Armitay, O., Fischer, B., & Warner, J. (1998). Marijuana, Juveniles, and the Police: What High-School Students Believe about Detection and Enforcement.

Canadian Journal of Criminology, 40(4), 401-20.

Black's law dictionary. (1990). St. Paul, MN: West Publishing Co.
View Full Essay

Privacy Protection Commenting on the

Words: 2121 Length: 5 Pages Document Type: Essay Paper #: 6734567



Confab, howeve, is an achitectue that is able to bypass these limitations and combine both appoaches. It is limited, though, and a tue pevasive envionment calls fo complex pefeences that can be easily manipulated by the end use.

Moeove, all these appoaches ae not completely sufficient in meeting the challenges mentioned in section 3.2. Fo instance, PETs and pivacy models do not explicitly contibute in a eduction of data collection, no is that thei intent o pupose. Although anonymous data collection is based on the assumption that if data is collected anonymously then it cannot be linked with any individual, and if data cannot be elated to an individual then it poses no theats in tems of pivacy. Thus, detailed pivacy policies and safeguads fo data ae not seen as citical in this model. By collecting anonymous data, one may ague that a tue minimum amount of pesonal data is…… [Read More]

references that can be easily manipulated by the end user.

Moreover, all these approaches are not completely sufficient in meeting the challenges mentioned in section 3.2. For instance, PETs and privacy models do not explicitly contribute in a reduction of data collection, nor is that their intent or purpose. Although anonymous data collection is based on the assumption that if data is collected anonymously then it cannot be linked with any individual, and if data cannot be related to an individual then it poses no threats in terms of privacy. Thus, detailed privacy policies and safeguards for data are not seen as critical in this model. By collecting anonymous data, one may argue that a true minimum amount of personal data is being collected. However, ensuring complete anonymity remains both technically and practically difficult.

For example, mix zones and changing pseudonyms are used to maintain anonymity but it is also possible to break the anonymity and track a user in a mix zone. Pervasive computing, then, needs other, more robust means to minimize the amount of data collection. Moreover, there are usability and efficiency issues that arise with any of these approaches. Testing, for example, is typically done in a controlled environment under limited conditions. The effectiveness of many of these solutions, then, has not been adequately tested under typical, real-world, conditions. In a true pervasive computing environment, users will move extensively between different computing environments and will interact with various devices (e.g. starting from small portable hand held device to large wall sized displays), and applications. It is difficult to predict how privacy solutions will perform in a true user-environment under more typical conditions.

Thus, it will be necessary to find and incorporate a unique privacy model that accentuates both social and legal norms, while ensuring the technical ability to protect privacy.

Newman, a. 2008, Protectors of Privacy: Regulating Personal Data in the Global Economy, Cornell University Press.
View Full Essay

Forms of Bullying That Lead to Violence in the Workplace

Words: 786 Length: 2 Pages Document Type: Essay Paper #: 85376911

Workplace Bullying

Bullying is not limited to the halls of higher learning as we have come to expect. Unfortunately, workplace bullying is a very real phenomenon in workplaces and worksites across the globe. This paper will focus on the issue of workplace bullying that can lead to violence as well as strategies to help negate bullying and manage it in the work environment.

Bullying is a form of aggression which can manifest in both subtle and overtly aggressive ways. Workplace Bullying.org identifies several forms of bullying that may lead to violence in the workplace including:

Spreading malicious rumors, gossip, or innuendo that is not true

Undermining or deliberately impeding a person's work

Withholding necessary information or purposefully giving the wrong information

Making jokes that are 'obviously offensive' by spoken word or e-mail

Intruding on a person's privacy by pestering, spying or stalking

Criticizing a person persistently or constantly

Blocking applications…… [Read More]

References

Adams, A., & Crawford, N. (1992). Bullying at work: how to confront and overcome it. London: Virago.

Chappell, D., & Martino, V. (2000). Violence at work (2nd ed.). Geneva: International Labour Office.

Workplace Bullying: Psychological Violence? | WBI. (n.d.). Workplace Bullying Institute. Retrieved November 11, 2011, from http://www.workplacebullying.org/2009/05/04/workplace-bullying-psychological-violence/
View Full Essay

Employee Privacy Rights in the Workplace

Words: 1650 Length: 6 Pages Document Type: Essay Paper #: 59182565

privacy in the workplace encourages contempt.

Legitimate Limits

Economic reasons for supervision.

Reasons of inter-employee, and employee-customer safety.

Reasons of performance.

Definition of excessive supervision/invasion of privacy.

Examples of excessive supervision/invasions of privacy.

Legal consequences/ramifications.

Effects of legal yet employee-perceived insufficient privacy.

Effects on performance

Effects on Morale

Possible psychological/health effects

Ultimate Employee Contempt results from:

Illegal/unethical supervision and invasion of privacy.

Legal yet excessive supervision/surveillance or what employees view as excessive invasion of privacy.

Conclusion: Employees view invasion of privacy with contempt that transfers to contempt for employers and supervisors.

Employer Surveillance, Lack of Privacy and Employee Contempt

In today's modern age, employers across the board have begun to resort to increasingly invasive methods to monitor the performance and behavior of their employees. Previously a realm of banks and retail establishments, employee monitoring has become the norm in most large and many small businesses -- aimed at everything from…… [Read More]

Works Cited

Houston, Justine. Barnes, James. Keynes, Amanda. (1999). "Examination of the Issue of Electronic Monitoring of Employees." Retrieved on October 10, 2004, from,  http://www.swlearning.com/bcomm/lehman/lehman_13e/good_example_long_report.pdf 

James, Geoffrey. (2004). "Employee Monitoring: How to Respect Privacy Rights and Prevent Morale Backlash." Retrieved on October 10, 2004, from, http://www.privacyknowledgebase.com/privacyAdvisor018_s.jsp

NWI. National Work rights Institute. (2000). "Electronic Monitoring in the Workplace." Retrieved on October 10, 2004, from, http://www.workrights.org/issue_electronic/em_legislative_brief.html

Stanford University. (2004). "Monitoring in the Workplace: Health Concerns." Web site. Retrieved on October 10, 2004, from, http://cse.stanford.edu/classes/cs201/current/Projects/electronic-monitoring/health.html
View Full Essay

Staffing Privacy Staffing and Privacy

Words: 1698 Length: 6 Pages Document Type: Essay Paper #: 32534117

iegele indicates that "employers often wish to know whether they are entitled to contact an applicant's references and what obligations they may have in this regard. ith respect to obtaining consent to contact such references, it is accepted that an applicant who lists references on a job application or resume is implicitly consenting to a prospective employer contacting and obtaining information from those references. Similarly, it is generally accepted that an applicant who lists former employers is deemed to be giving consent to have those employers contacted for references." (iegele, p. 3)

Conclusion:

This speaks to the fundamental condition in the relationship between employer and prospective employee. The latter must make available willingly certain information that would otherwise be considered private and protected. This is part and parcel to the process of attempting to gain employment and provides the prospective employer with avenues to determine the suitability of the individual…… [Read More]

Works Cited:

Draper, H. (2012). Facebook Privacy Issues Arising in Hiring Process. Biz Journals.

Fleischer, M. (2010). A Legal Landmine: Privacy Issues in the 21st Century. Med Team Support Staffing.

Forster, E. & Garakani, G. (2007). Critical Issues in the Hiring Process. Blaney McMurtry Barristers & Solicitors, LLP.

Waggott, G. (2011). Law Note -- Pre-Hiring Background Checks. McMillan.ca.
View Full Essay

Email Privacy in the Workplace

Words: 1542 Length: 4 Pages Document Type: Essay Paper #: 65125726

The courts have basically given businesses cart blanc with regard to the monitoring of what their employees say and do in their work email as well as on their work computers, even when they sign in to private web-based email accounts for private transmissions, as such events can be recorded by employers, as the computer being used has been designated by the courts as the domain of the employer to be used by the employee only for the purpose of legitimate business commerce.

Though there are still a limited number of court cases that document the firing of employees, as legitimate on the grounds of their use of employee computers to engage in non-work related communications, they do exists and they are being determined in the favor of the employer. These cases will likely serves as a bridge that will continue to severely limit the "privacy" of individuals, i.e. clearly…… [Read More]

Works Cited

Clochetti, Cory a. Monotoring Employee E-Mail: Efficient Workplaces vs. Employee Privacy.

Duke L. & Tech. Rev. 0026 http://www.law.duke.edu/journals/dltr/articles/2001dltr0026.html.

Froomkin, a. Michael. "The Death of Privacy?." Stanford Law Review 52.5 (2000): 1461.

Rich, Lloyd L. Right to Privacy in the Workplace in the Information Age All Good Layers Legal Resource Directory October, 31, 2007  http://www.allgoodlawyers.com/guestbookview.asp?key=97
View Full Essay

Employee Privacy Avoid Liability Invasion Privacy Essay

Words: 546 Length: 2 Pages Document Type: Essay Paper #: 56012249

Employee Privacy

Avoid liability invasion privacy Essay Question: List discuss ways employers avoid liability invasion privacy. Essay 350 words length APA format. There -text citation essay.

List and discuss different ways employers can avoid liability for invasion of privacy

Employers often justify intrusions into employee privacy based upon safety concerns: concerns about jeopardizing the health of the public can be used to allow drug and alcohol tests. Even lifestyle habits may be restricted, based upon the additional healthcare costs they can incur employers. Weight restrictions may be allowed if maintaining a certain weight is a safety hazard at some jobs, which is why "49 states allow weight standards that do not violate the ADA" (Bennett-Alexander & Hartman 2009: 682). Dating employees or the employees of a competitor business and moonlighting at another organization (which could reveal trade secrets or result in employees working too many hours to be productive) may…… [Read More]

References

Bennett-Alexander, D.D., & Hartman, L.P. (2009). Employment law for business (6th ed.).

New York, NY: McGraw-Hill.

Goldberg, C. (2012). Can my employer's wellness program really ask me to do that? Common

Health: WBUR. Retrieved from:
View Full Essay

Ethics Privacy Rights in the

Words: 1088 Length: 3 Pages Document Type: Essay Paper #: 66198936

However, that was not an option, and it points to the rigidity of the corporation and its rules.

Harrah's defense of their policy is utilitarian in its outlook and its purpose. It stresses utility (beauty) over values or concerns of personal beliefs and personal privacy. A Harrah's spokesman for the "Personal Best" program noted, "Harrah's customers, people who are loyal to the Harrah's brand name, expect a certain quality of product, a certain quality hotel room, quality of food, and, yes, a certain quality in the appearance of the people who are serving them food and beverages'" (Chmela). It seems this stance is both rigid and extremely discriminatory against female employees, where a different appearance level is required. The policy does not require male beverage employees to wear makeup or style their hair, and it does not allow any flexibility in the policy. Harrah's only purpose is to create a…… [Read More]

References

Chmela, Holli. "Personal Best' Not up to Par." Washington Times. 11 Jan. 2005. http://www.washtimes.com/upi-breaking/20-8556r.htm

Guidos, Rhina. "Fired Bartender Sues Harrah's Over Makeup Policy." Reno Gazette-Journal. 7 July 2001.

Kravets, David. "Court to Decide Case on Makeup." Reno Gazette Journal. 22 June 2005. http://www.rgj.com/news/printstory.php?id=102344
View Full Essay

Drug Free Workplace in Favor

Words: 2623 Length: 8 Pages Document Type: Essay Paper #: 15910707

What further makes interpretation of results difficult to precisely define quantify is that the amount of drug stores depends on the nature of the drug itself, the duration of the ingestion of the drug, and the composition of the tissue holding the drug and the frequency of use. The greater the incidence of drug use the more permanent the level of toxins and chemicals in tissues throughout the body, and therefore the greater the probability of catching chronic drug users in drug testing. Thea difficult part of using drug tests periodically is the longitudinally there may be peaks and valleys to the incidence of drug abuse. Companies have begun surprise inspections of their workers in the most potentially dangerous occupations including forklift workers, construction workers, airline pilots, and heavy equipment workers.

Despite these shortcomings of tests, the advances made in drug testing technologies are gradually overcoming these obstacles related to…… [Read More]

References

Alleyne, B.C., P. Stuart, and R. Copes. (1991) Alcohol and other drug use in occupational fatalities. Journal of occupational medicine (Baltimore) 33(4):496-500, 1991.

Gerber, J.K. And G.S. Yacoubian, Jr. (2002). An assessment of drug testing within the construction industry. Gerber, J.K. And G.S. Yacoubian, Jr. J Drug Education 32(1):53-68

Koch, K. (1998). "Drug Testing." November 20, 1998

Kelly, T.H., R.W. Foltin, and M.W. Fischman. (1991) Effects of alcohol on human behavior: implications for the workplace. Drugs in the workplace: research and evaluation data. Vol. 11, National Institute on Drug Abuse. Rockville, Maryland 1991. pp. 129-146.
View Full Essay

Employee Privacy Since the 1992

Words: 969 Length: 3 Pages Document Type: Essay Paper #: 99494449

Employers may unequivocally monitor any message that utilizes company-provided email" (Sherman, 2007, pg. 649). Problems arise when the employer attempts other methods monitoring as Sherman notes; "The law is not clear, however, when an employer accesses an employee's webmail" (Sherman, pg. 649). Similar to the Deal v Spears case, the employer must take certain precautions in order to secure the right of monitoring. Many companies have developed policies and guidelines that are communicated to the employee in order to meet those requirements, but there are plenty of employee rights organizations that worry about infringement of employee privacy.

As technology can afford anonymity so to can it provide evidence that see through such anonymity. Thomas Jefferson once wrote; "Laws and institutions must go hand in hand with the progress of the human mind. As that becomes more developed, more enlightened, as new discoveries are made... And opinions change with the change…… [Read More]

References

Foley, J.P. (ed.); (1900) the Jeffersonian cyclopedia: A comprehensive collection of the views of Thomas Jefferson, pg. 726

Sherman, M.A.; (2007) Webmail at work: The case for protection against employer monitoring, Touro Law Review, Vol. 23, No. 3, pp. 647-683

United States Court of Appeals; (1992) Sibbie Deal; Calvin Lucas, Appellees v. Newell Spears; Juanita Spears, doing business as White Oak Package Store, Appellants, 980 F.2d 1153, 61 USLW 2353, 8 IER Cases 105

Williams, K.R.; (2008) Protecting what you thought was yours: Expanding employee privacy to protect the attorney-client privilege from employer computer monitoring, Ohio State Law Journal, Vol. 69, No. 2, pp. 347-390
View Full Essay

Lockheed Martin What Privacy Rights Issues Must

Words: 614 Length: 2 Pages Document Type: Essay Paper #: 88228009

Lockheed Martin

What privacy rights issues must be addressed?

Over the last few years, the issues of privacy and employee testing have been increasingly brought to the forefront. This is because firms are requiring more of their applicants and want to see if they are a good fit for the organization (based upon intense competition from the global workplace). In the case of Lockheed Martin, there are a number of privacy rights that must be taken into consideration to include: the use of third party providers and determining the impact of the test on the facility. ("Avoiding Legal Issues in Pre-Employment Testing," 2009)

The use of third party providers is designed to give firms with the ability to distance themselves from the testing process. As these organizations will administer the exam and they are careful about what kinds of data is collected from employees. Moreover, they also have policies in…… [Read More]

References

Avoiding Legal Issues in Pre-Employment Testing. (2009). Vault.com. Retrieved from: http://blogs.vault.com/blog/workplace-issues/avoiding-legal-issues-in-pre-employment-testing/
View Full Essay

How Social Media Has Added Conflict to Workplaces

Words: 1817 Length: 5 Pages Document Type: Essay Paper #: 18925325

Social Media/Workplace Conflict

Every day, most of us create permanent records of our lives and the things we do through our Internet use, emails, texts, tweets, blogs, and similar technology. Information intended for friends and family can sometimes be disseminated more widely than expected or planned. Unless one avoids these technologies altogether -- a difficult feat in today's society -- one can no longer be assured that a private life is truly private. Further complicating the issue is the use of these technologies in the workplace. The line between our public and private selves continues to blur. Current legislation is aimed at protecting privacy rights of employees in balance with employers' concerns about the use of social media during work hours and, in some cases, with the use of employer-owned devices. Legal issues can quickly become complex and there is not sufficient practical guidance to help employers navigate an increasingly…… [Read More]

References

Dorsch, M. (2012). Tweeting the election. State Legislatures (38)4, pp. 28-30.

Folger, J.P., Poole, M.S., and Stutman, R.K. (2001). Working through conflict: strategies for relationships, groups, and organizations, 4th ed. Boston: Allyn and Bacon.

Freifeld, L. (2012). Social media at work. Training 49(6), p. 7.

Hearing, G.A., and Ussery, B.C. (2012). The times they are a changin': The impact of technology and social media on the public workplace, part I. Florida Bar Journal 86(3), pp. 35-39.
View Full Essay

Risk in Terms of Privacy Than Our

Words: 760 Length: 2 Pages Document Type: Essay Paper #: 82180043

risk in terms of privacy than our medical records...do you agree? Or, are your financial records more at risk, especially given events in the news lately. Which is greater in your mind (yes, you have to pick one)? Why?

Although keeping your medical records private is important, I believe that it is more important to keep your financial records private. Identity theft is one of the most prolific crimes of the modern era. As soon as someone has your information, they can hack into your bank account and take all your money or apply for credit cards in your name, leaving you broke. It is also very difficult to prove identity theft.

Drug testing in Sports; Drug testing in the construction industry; Drug testing for retail employees; Random drug testing for all employees; what principles can you pull about the pros and cons of drug testing from these different situations?…… [Read More]

View Full Essay

Human Resource Management & Workplace

Words: 1960 Length: 6 Pages Document Type: Essay Paper #: 19443582



The U.S. Supreme Court has given employers "little choice" in the matter, Boyd explains. If a company "can prove" they took "reasonable care" in order to prevent or to correct inappropriate behavior, under the law they have (in many cases) "safe harbor" from punitive damages (Boyd, p. 332). The author states that sexual harassment training "…has evolved to become an ornate administrative display which has the appearance of concern…" but which in fact is "expedient in that it mitigates employer liabilities in any future court cases" (p. 332).

Charles a. Pierce, Professor of Management at the University of Memphis, offers another approach for HR managers in his article published by Human Resources Management. He asserts that "nearly 10 million workplace romances develop annually" in the U.S. And "about 40% of employees" have had a workplace romance (Pierce, et al., 2009, p. 448). The reasonable and logical point of Pierce's article…… [Read More]

Works Cited

Appelbaum, Steven H., Marinescu, Ana, Klenin, Julia, and Bytautas, Justin. (2007). Fatal

Attractions: The (Mis) Management of Workplace Romance. International Journal of Business Research, VII (4), 31-43.

Boyd, C. (2010). The Debate Over the Prohibition of Romance in the Workplace. Journal of Business Ethics, 97(2), 325-338.

Mathis, Robert L., and Jackson, John H. (2007). Human Resource Management. Florence, KY:
View Full Essay

Physical Privacy on February 9th

Words: 1089 Length: 4 Pages Document Type: Essay Paper #: 46158602



Burlington Nortern and Santa Fe Railway Company spokesman stated, "Te settlement is consistent wit te practice we've been following," said Ricard Russack. He also states tat te companies apologized to it's employees for running te tests and tey stopped all testing wen to suit was filed as tey were ordered.

Many in te political and medical filed and te Equal Employment Opportunity Commission temselves feel tis is a landmark settlement wic will alt any future discriminations. "Tis was te rigt result. It gives people reassurance tat te potential arms of genetic testing are going to be taken very seriously in our society," said Wylie Burke, ead of te Department of Medical History and Etics at te University of Wasington in Seattle. (Wasington Post) "Tis landmark settlement provides important new protection against te emerging treat of genetic discrimination," Senator Edward Kennedy (Wasington Post) "Te Commission will continue to respond aggressively to…… [Read More]

http://www.washingtonpost.com/ac2/wp-dyn/A34877-2001Apr18?language=printerWired News

Kristen Philipkoski

http://wired-vig.wired.com/news_drop/news_lycatalog/story/0,2149,42971,00.html
View Full Essay

Psychological Testing in the Workplace

Words: 715 Length: 3 Pages Document Type: Essay Paper #: 44609974

Often, psychological testing is used to determine a candidate's approach to conflict resolution, identify the candidate's stress factors and coping mechanisms, or to possibly identify potential management skills and preferences. These and other insights are very important to potential employers, especially when it pertains to the higher-level professions and when the company has a large amount of money and a large commitment on the line.

The article concludes that psychological testing in the workplace is a good thing and that it serves a very necessary function. The disconnect between the employers' understanding of these tests and the employees' understanding is emphasized in the article as it tries to debunk the common negative myths surrounding the practice. The author's perspective is unique in that she works in the testing and test administration industry herself and is likely used to having to answer questions regarding psychological testing in the workplace on a…… [Read More]

Article Analyzed:

Botero, Ingrid Murro. (1996). "Psychological Testing Need Not Be Feared." Phoenix Business Journal, July 19, 1996.

Available online at: http://www.bizjournals.com/phoenix/stories/1996/07/22/smallb3.html
View Full Essay

Ethics Privacy and the Workplace

Words: 2519 Length: 8 Pages Document Type: Essay Paper #: 92497806

Technology / Privacy / orkplace

There is a rapidly increasing use of technological monitoring in the workplace, and while technology in general has been highly beneficial to companies, the use of some technologies has raised privacy and ethical concerns among employees. This paper reviews the available literature when it comes to workplace monitoring of employees and the ethical implications of that monitoring.

Is Privacy in the orkplace a Dying Notion?

The right to privacy is a nice idea, and in some instances and circumstances in the United States an individual can reasonably expect to have his or her privacy respected. ebsites, for example, notify users frequently that their privacy is important and it is being protected. However, when it comes to the workplace, in an age of increased reliance on electronic technology, management has been able to "…monitor virtually all workplace communications" that employees have access to.

Findlaw asserts that…… [Read More]

Works Cited

Davidson College. (2002). Descriptions of Ethical Theories and Principles. Retrieved March 8, 2015, from http://www.bio.davidson.edu.

Esikot, I.F. (2012). Globalization vs. Relativism: The Imperative of a Universal Ethics.

Journal of Politics and Law, 5(4), 129-134.

Internet Encyclopedia of Philosophy. (2010). Consequentialism. Retrieved March 8, 2015,
View Full Essay

How Companies Use Unethical Technologies in the Workplace

Words: 597 Length: 2 Pages Document Type: Essay Paper #: 87559772

Ethics in Technology

There has been a rapidly increasing use of technology in the workplace, but while some technological advances have benefitted companies, other technologies have raised serious concerns about employee privacy.

Consequentialism and Privacy Abuses

One of the issues that arises often in the workplace when it comes to employee privacy and employer technological overreach is when employers use certain electronic surveillance practices (monitoring personal phone calls and voice messages) to basically eavesdrop on their employees (Findlaw). In fact personal privacy laws affirm that an employer may not monitor an employee's personal phone calls; albeit the company can monitor a personal call if the employee knows it is being monitored and agrees (Findlaw). One ethical theory that applies to this situation is the consequentialism, which posits that the consequence of an action determines its moral value.

One complicating aspect of this is that a manager may believe that it…… [Read More]

Works Cited

FindLaw. (2010). Privacy in the Workplace: Overview. Retrieved February 8, 2015, from  http://employment.findlaw.com .

Velasquez, M., Andre, C., Shanks, T., and Meyer, M.J. (2000). Ethical Relativism. Markkula Center for Applied Ethics, Santa Clara University, Retrieved February 8, 2015, from http://www.scu.edu.
View Full Essay

Student Searches Free Speech and Expression and Privacy in the Wired Age

Words: 1422 Length: 4 Pages Document Type: Essay Paper #: 68396652

Student Searches, Free Speech & Expression, and Privacy in the Wired Age

Student searches and in-school discipline for off-campus conduct

Free Speech and Expression on and off campus

Privacy in the wired age on and off campus. (Facebook, twitter, myspace, blogs, cellphones)

What are a students' constitutional rights when it comes to searches and seizures, on and off campus discipline, free speech, expression, and privacy in the wired age when on and off campus? How are students protected by the United States Constitution and Bill of Rights when it pertains to the three items listed above?

Students are often subject to rules and regulations that are associated with school codes of conduct and those rules and regulations are sometimes not reflective of constitutional rights to free speech and free action inside the laws. These long list of potential violations are printed by institutions and are made available to students, in…… [Read More]

In short students and especially minor students and their parents should make themselves aware of the codes of conduct the student is expected to uphold and live within those guidelines even if they feel the guidelines are overreaching as students have little recourse because even most public institutions such as public schools are still considered voluntary and enrollment in them requires certain standards to be upheld. This is not to say it is likely that all new students will read and memorize a code of conduct but they must beware that violations especially that hurt others will not likely be tolerated. It is not likely that the constitutional protection of students will be expanded, rather to the contrary laws that protect others from immoral, unethical and/or illegal or harmful behaviors in a public forum such as the internet, across email, and cell phones will likely be expanded. It also must be made clear that the intent to harm another does not have to be present for that harm to be done or for the individual(s) responsible to be held accountable for it. In other words consider yourself under public scrutiny when you are enrolled in any institution and act accordingly, upholding the law and the moral and ethical standards associated with your role as a student.

Wheeler, T. (2011). Facebook Fatalities: Students, Social Networking, and the First Amendment. Pace Law Review, 31(1), 182-227. Retrieved from EBSCOhost.

Williamson, L. (2009). Private Rants Become Public When Aired Online. InsideCounsel, 20(211), 67-68. Retrieved from EBSCOhost.
View Full Essay

Why Do Employees Resist Integrating New Technology While Performing Work Duties in the Workplace

Words: 3234 Length: 10 Pages Document Type: Essay Paper #: 10588152

employees resist integrating new technologies into workplace duties, and what can be done to prevent employee resistance to technology changes?

You know, I'm all for progress. It's change I object to." - Mark Twain

The Key Question to be addressed: The salient topic of this paper approaches the question of why there is a predictable and often across-the-board degree of resistance from employees when it comes to approaching - and adapting to - new technologies in the workplace. Moreover, the issue of resistance to workplace change - technology-related workplace change in particular - cries out for a close examination from several perspectives.

Firstly, this paper will discuss the issue of why people often fear any type of dramatic or workplace change, and are frequently reticent to go along with significant adjustments and modifications in lifestyle or workplace situations. The psychological reasons for human resistance to change is an important foundation…… [Read More]

References

Bradford, M. (2000). Technology changes risks dramatically. Business Insurance, 34, 3.

Brenner, M.; Fontana, C.; & Godbout, Nathalie (2003). Change Management.

Destination CRM. http://www.destinationcrm.com/print/default.asp?ArticleID=3656.

Canton, Erik J.F.; de Groot, Henri L.F; & Nahuis, Richard. (2000). Vested Interests and Resistance to Technology Adoption. Netherlands Bureau for Economic Policy.
View Full Essay

Multicultural Workplaces Face When Competing in the

Words: 1478 Length: 4 Pages Document Type: Essay Paper #: 95934412

multicultural workplaces face when competing in the current market. As multiculturalism begins to have more of a presence in management and leadership positions, organizations will need to address issues unique to them and modify their leadership strategies. Implementing cultural programs would be one such strategy, and it would require organizations to evolve, look inward, and make transformational change in order to create and improve multicultural employee retention. Such a strategy would create 'grooming' or succession processes for proteges; preparing employees from within the corporate structure for career advancement into leadership positions. Studies show that the benefits would be mutually beneficial in that the employee would feel appreciated which could translate into long-term gains for the organization. This will be a theoretical paper addressing the many factors contributing to the lack of ommunication clarity in multicultural workplaces and whether managers in global organizations have a greater tolerance for ambiguity.

1. Do…… [Read More]

References

Bouma, G.D. (2002). The research process. 4th Ed. Melbourne: Oxford University Press.

Cohen, L. Manion, L. And Morrison, K. (2000). Research Methods in Education. Routledge Falmer. London.

Easterby-Smith, M., Thorpe, R. And Lowe, A. (2002). Management Research: An introduction. 2nd Ed. London: Sage.

Saunders, M., Lewis, P. And Thornhill, A (2003). Research methods for business students. 3rd Ed. London: Prentice Hall.
View Full Essay

Healthcare Responses Workplace Relationships

Words: 471 Length: 2 Pages Document Type: Essay Paper #: 75351541

conflict can have many negative implications for an organization if it is mismanaged, some conflict is necessary for an organization to move forward. Conflict must be managed in an effective way so it generates positive policies rather than personal animosity and in-fighting between staff members.

Pinpointing the sources of conflict is essential: is the conflict due to the fact that nurses are understaffed? Are unpleasant shift times being unfairly allocated? s there a personality conflict? Addressing the root cause, particularly if it is an institution-wide, systemic issue, can be a powerful way to address conflict and reduce the likelihood of conflict being stirred up yet again in the future.

Creating mentorship programs can address specific conflict-related issues such as workplace hazing or the tendency of more experienced nurses to 'eat their young' or act cruelly to less experienced subordinate nurses. "There are mentors who believe that if they are hard…… [Read More]

Information sharing between hospitals and physician groups. (2010). Horty Springer.

Retrieved from:

http://www.hortyspringer.com/audioconferences/information-sharing-between-hospitals-and-physician-groups/
View Full Essay

Employers and Employees Often Have

Words: 1391 Length: 4 Pages Document Type: Essay Paper #: 36302053

A consistent policy applied to all employees and applicants makes it far less likely that a business will be subject to litigation losses.

The old cliche is that "All is fair in love and war," but one might add that this includes the area of business as well. Businesses exist to make a profit and for many businesses if this means sacrificing the privacy of one or all of its employees means greater profits than it is a small price to pay. Fortunately, there are those in the business world who are aware of this philosophy and who take positive steps to develop a set of ethical standards to govern the operation of business (Tabak). The underlying attitude supporting these ethical standards is that the maintaining of ethical standards in regard to protecting the privacy of the individual is important in order to protect both the organization and its employees…… [Read More]

Works Cited

Baglione, Stephen L. "Productivity vs. privacy for an organization's workforce." Journal of Academy of Business and Economics (2009).

Carpenter, Christopher S. "Workplace Drug Testing and Worker Drug Use." Health Services Research (2006): 795-810.

City of Ontario v. Quon. No. 130 S. Ct. 2619. U.S. Supreme Court. 17 June 2010.

Sproule, Clare M. "The Effect of the U.S.A. Patriot Act on Workplace Privacy." Cornell Hotel and Restaurant Administration Quarterly (2002): 65-73.
View Full Essay

Regulating Internet Policy Regulating Internet

Words: 957 Length: 3 Pages Document Type: Essay Paper #: 84684063

In the United States and other part of the world where internet is rapidly developing, cyber threats have continued to be on the increase. Essentially, online shopping has become a modern way of doing business, and in the United States, millions of people purchase goods and services online. To make an online shopping, individuals will need to submit their credit cards or other private information to make a purchase. Some private organizations even ask for the social security number and bank information of consumers before allowing them to make purchase of good and services. In the face of continuous use of internet for variety of activities, private consumers are increasingly facing the internet privacy threats because their private information could be compromised while sending their private data online. In the face of threats to internet privacy, effective regulations to enhance internet privacy are very critical. Although, the government have made…… [Read More]

Falzone, a. (2013). Regulation and Technology Harvard Journal of Law & Public Policy. Vol 36.

Lugaresi, N.(2010). Electronic privacy within the workplace: Transparency & Responsibility. International Review of Law, Computers & Technology. 24 (2) 163-173.

Jacquelyn M. & Polito, R.(2012). Ethical Considerations within the Internet Use of the Electronic Protected Health Information. Neurodiagn J. 52:34-41.
View Full Essay

Business Ethics How Important Is an Individual's

Words: 3263 Length: 10 Pages Document Type: Essay Paper #: 46623316

Business Ethics

How important is an individual's privacy in the workplace? Is an individual's privacy in the workplace the most important consideration to be taken into account? hat constitutes privacy in a workplace environment? Do the goals and the mission of the organization supersede an individual's desire to protect his or her privacy? Is it ethical for an employer to collect and disperse personal information from employees without their knowledge? How does the philosophy of utilitarianism play into this issue? This paper delves into those questions and provides supporting information for the resolution of this issue.

After careful review of the textbook for this course, after reviewing additional scholarly resources and taking into consideration a utilitarian approach to this issue -- and after researching the Australian laws regarding workplace privacy -- this paper takes the position that an individual's privacy is indeed vitally important (and must by law be protected)…… [Read More]

Works Cited

Doyle, Carolyn, and Bagaric, Mirko. (2005). Privacy Law in Australia. Annandale, AU:

Federation Press.

Fair Work Ombudsman. (2011). Best Practice Guide / Workplace Privacy. Retrieved September

25, 2012, from http://www.fairwork.gov.au.
View Full Essay

Standard for Performance Appraisals Performance

Words: 2067 Length: 6 Pages Document Type: Essay Paper #: 29304001



Personnel record

Personnel records are data pertaining to employees which consist of factual and comprehensive information of employee. All employee information is kept in systematic order which assists human resources manager to make an effective decision about employee. Typically, personnel records consist of employee past records, medical report and employee progress. Personnel record also consist of payroll records, leave records, and benefit record and turnover record. Training and development record contains training schedule, transfer cases, and appraisal reports. Health and safety record contains medical history, safety provisions, sickness reports, and insurance reports. The service record contains essential records that consist of bio-data, family information, residential information, and marital status, academic qualifications, past address and employment records. While some critics argue that personnel records is a waste of time and money, however, Yoder (1942) provides several benefits that organization could derive from personnel record:

Personnel record assists managers to identify crucial…… [Read More]

References

Ahmed, S. (2005).Analysis of Workplace Surveillance in a Quest for Ethical Stance. Journal of Business Systems Governance and Ethics .2(4).

American Bar Association.(2001).Employment: Proof of Discrimination. Mental and Physical Disability Law Reporter. 25( 5): 826-831.

Aswathapp, K. (2005).Human Resource and Personnel Management. (4th Edition) Tata McGraw-Hill Education.

Aswathapp, K (2010). Employment Law for Human Resource Practice. Tata McGraw-Hill Education.
View Full Essay

Violence on College Campuses Virginia Tech Could

Words: 1242 Length: 4 Pages Document Type: Essay Paper #: 37248408

Violence on College Campuses

Virginia Tech could probably have avoided the terrible massacre of 2007 had its officials taken more timely and effective action with Seung Hui Cho. He had a very long record of mental illness dating back to middle school, including fantasies of violence and murder, and he had received psychiatric treatment in the past. His behavior at Virginia Tech was so disturbing to students and faculty that a court ordered him to undergo a psychiatric evaluation in 2005, although he refused all counseling. University officials did not discuss his case with each other or even with his parents for fear of violating state and federal confidentiality laws, although their interpretation of these was mostly incorrect. Even though medical and psychiatric records are confidential by law, there is an exception for students like Cho who are deemed a danger to themselves and others. Not only did he receive…… [Read More]

REFERENCES

Burlin, S. And J. Gammage (2007). "Laws Limit Schools Even After Alarms," Philadelphia Inquirer, April 19, 2007.

Corey, G. et al. (2011). Issues and Ethics in the Helping Professions, 8th Edition. Cengage Learning.

Mass Shootings at Virginia Tech, April 16, 2007 (2007). Report of the Review Panel Presented to Governor Kaine, Commonwealth of Virginia.

McMurray, J. (2008). "Colleges Are Watching Troubled Students," Associated Press, March 28, 2008.
View Full Essay

Right of Employers to Engage in Electronic

Words: 1210 Length: 4 Pages Document Type: Essay Paper #: 22596817

right of employers to engage in electronic surveillance of their employees remains an area of intense legal dispute. However, overall the courts have been expanding, rather than limiting the rights of employers to use new technology to monitor worker behavior. Workers cannot assume that they have an expectation of privacy in the public environment of the workplace. "New technologies make it possible for employers to monitor many aspects of their employees' jobs, especially on telephones, computer terminals, through electronic and voice mail, and when employees are using the Internet. Such monitoring is virtually unregulated" (Fact sheet, 2011, Privacy ights).

Because employers own workplace computers and phones, they have a right to monitor employee's use of these devices. The one exception to this rule was in a New Jersey Supreme Court case where attorney-client privilege prevented an employer from reading the communications sent by an employee to her counsel on a…… [Read More]

References

Fact sheet 7: Workplace privacy and employee monitoring. (2011, April). Privacy Rights.

Retrieved April 29, 2011 at http://www.privacyrights.org/fs/fs7-work.htm#computermonitoring

Introduction: Privacy in the workplace. (2011). Cyberlaw. Harvard University.

Retrieved April 29, 2011 at  http://cyber.law.harvard.edu/privacy/Module3_Intronew.html
View Full Essay

Monitoring How Employees Use Information Systems

Words: 2493 Length: 10 Pages Document Type: Essay Paper #: 82913511

Electronic Surveillance on-The-Job: The Pros and Cons of Employee Monitoring

Modern technology has allowed employers many new capacities, including the capacity to electronically oversee employees every action while on-the-job. In recent years many employees have argued that surveillance while on-the-job is a violation of their right to privacy. Employers argue however that employees should not have a right to privacy in the workplace, especially as the employer pays them to perform a duty for the employer. Despite this almost 100% of employees likely report at one time or another engaging in some personal business while at work.

Unfortunately, there are few laws that side with the employee at this time. Most laws argue in favor of the employer, as long as the employer tells the employee of their plans about employee surveillance at the workplace. Below we'll discuss what types of surveillance corporations are now using to protect themselves, and…… [Read More]

References

Alderman, L. (1994, December). Safeguard your secrets from your boss. Money, 31-32.

American Management Association AMA. (2005). 2005 Electronic Monitoring &

Surveillance Survey: Many Companies Monitoring, Recording, Videotaping and Firing employees. American Management Association, May 2005. Retrieved June 11, 2005: http://www.amanet.org/press/amanews/ems05.htm

Crampton, S.M, & Mishra, J.M. (1998). "Employee monitoring: Privacy in the workplace?" SAM Advanced Management Journal, 63(3):4.
View Full Essay

Employment Law What Are Some

Words: 464 Length: 1 Pages Document Type: Essay Paper #: 74098045

If they employees agree to it as a condition of employment, rug tests can be conducted without probable cause, although in terms of 'due process,' usually an employee cannot be terminated without a justifiable cause, such as because of his or her privately political views or race. But still, some employment contracts have 'morals clauses,' for instance, if a hired actor's behavior inhibits his or her ability to do his or her job, like to be a corporate spokesperson for a children's toy company.

Employees cannot be subjected to unwarranted workplace surveillance like voyeurism, however. "In a couple of related workplace privacy lawsuits won by employees, employers claimed 'drugs' as the reason they secretly videotaped employees in company locker rooms. but, instead of revealing illegal drug use or sales, the hidden cameras embarrassingly exposed employees changing their clothes. In so many words, the courts found this to be a blatantly…… [Read More]

Works Cited

Employee Workplace Privacy Rights." (2008). Employee Issues. Com Retrieved 12 Jan 2008 at  http://employeeissues.com/workplace_privacy.htm 

Right to privacy: An overview." (2008). Legal Information Institute.

Cornell University: School of Law. Retrieved 12 Jan 2008 at http://www.law.cornell.edu/wex/index.php/Privacy
View Full Essay

Employer Best Practices & Policies

Words: 1945 Length: 7 Pages Document Type: Essay Paper #: 77783309

Company Policy

Draft a company policy on use of the internet by employees. Draft it in the form of a memo to employees.

Take into consideration the following issues:

Is it realistic to believe that all personal use of the internet at work can be prohibited? How do you deal with this?

Do employees have a reasonable expectation of privacy in, e.g., an email they might send at work? A website they might visit? How could your policy deal with this?

Dear Acme employees,

It has become necessary to address the employee use of internet and internet tools for personal reasons while on company time and/or company equipment. While Acme wishes to respect your privacy and allow you to fill any idle time you might have between calls or during your lunch break, bear the following in mind:

All computers and phones on Acme property are subject to be monitored…… [Read More]

Mind you, the employee cannot be forced to do ANY of those things. However, unflattering comments could be construed as harassment (sexual, general harassment, bullying, etc.) and the employer would be on the hook for vicarious liability (potentially) if they stand by and do nothing. Basically, the employee does not HAVE to do anything about the blog but the company and/or people facing ridicule could take action and Acme's hand will be forced. No complaint? Technically not an issue…yet.

 https://www.nolo.com/dictionary/vicarious-liability-term.html 

 http://www.nolo.com/legal-encyclopedia/preventing-sexual-harassment-workplace-29851.html
View Full Essay

Rhetoric of Explanation a Trend in Technology and Society

Words: 3364 Length: 11 Pages Document Type: Essay Paper #: 44935918

Technology and Society

All print media including books, newspapers and magazines are in deep trouble today thanks to new developments in technology, as are traditional methods of classroom instruction and school curricula. To that extent the Internet can be described as a revolutionary invention that has altered and transformed the way information is presented and conceived. Individuals are learning and creating innovative ways to contribute to relevant knowledge at an excessive speed, and the estern world has become dependent on this technology and also more aware of its negative side. hether the technology in our surroundings is causing human beings to become distracted, affecting our communication skills, or making them stupider is a question that has to be addressed.

This memorandum will describe these issues of trivialization and the 'shallow-ing out' of contemporary American culture, most of which are either as deliberately exaggerated and sensationalized as the Internet itself or…… [Read More]

WORKS CITED

Corey, G. et al. Issues and Ethics in the Helping Professions, 8th Edition. Cengage Learning, 2011.

Milliken, J. Brands and Social Media Participation; United Breaks Guitars. Coreographytv, 2010.

http://www.youtube.com/watch?v=YNpry5iSTBo&feature=related

Morozov, Evgeny. "Losing Our Minds to the Web." Prospect, June 22, 2010.
View Full Essay

Communication Vitruvius Sportswear Case Study

Words: 890 Length: 3 Pages Document Type: Essay Paper #: 34718688

Dennis should have first confronted Zack about the issue to find out what was going on. If he could not get any satisfaction there then taking the issue to Tim would have been appropriate. Another solution that could have taken place would be for Dennis to report the issue to an ethics hotline in order to have it investigated by neutral parties. This of course could only happen if the company has such a line and policy in place. This type of system helps by providing employees with a way to report things that happen within the company without having to have confrontational discussions with possible offending parties.

eason

If an electronic mail (e-mail) system is utilized within a business, the employer owns it and is permitted to look at its contents whenever it wants. Messages that are sent inside the company as well as those that are sent from…… [Read More]

Reference

Workplace Privacy and Employee Monitoring. (2011). Retrieved from http://www.privacyrights.org/fs/fs7-work.htm#4
View Full Essay

Resolve Ethical Issues That Arise From the Intersection of Law Compliance and Investigations

Words: 696 Length: 2 Pages Document Type: Essay Paper #: 75440494

Legal Compliance

resolve ethical issues that arise from the intersection of Law, Compliance & Investigations

Ethics, law, and compliance

There is always a need to balance the individual's right to privacy with a government or business' right to investigate breaches of security, whether of a technical or non-technical matter. "New technologies make it possible for employers to monitor many aspects of their employees' jobs that "they could not previously, and "such monitoring is virtually unregulated. Therefore, unless company policy specifically states otherwise (and even this is not assured), your employer may listen, watch and read most of your workplace communication" (Fact Sheet 7, 2012, Privacy ights Clearinghouse). Most companies take advantage of the fact that the law is on their side regarding workplace monitoring. "Of the 43% of companies that monitor e-mail, nearly three-fourths use technology to automatically monitor e-mail. And 28% of employers have fired workers for e-mail misuse"…… [Read More]

References

Adams, Mark. (2012). United States: Losing the expectation of privacy bit by bit, byte by byte

. Jeffrey, Mangles, Butler & Mitchell LLC. Retrieved:  http://www.mondaq.com/unitedstates/x/190720/employee+rights+labour+relations/Losing+The+Expectation+Of+Privacy+Bit+By+Bit+Byte+By+Byte 

Fact Sheet 7: Workplace privacy and employee monitoring. (2012). Privacy Rights

Clearinghouse. Retrieved: https://www.privacyrights.org/fs/fs7-work.htm
View Full Essay

E-Mail Monitoring Affects Employee Stress

Words: 5744 Length: 13 Pages Document Type: Essay Paper #: 34773416

Often companies find that when they first install filtering software or routers, the sites and communications employees need to do their jobs cannot be done. What is needed then is a gradual move to include those sites and types of communications with outside suppliers, buyers, customers, resellers, services organizations and other key constituents. The use of monitoring however is prevalent, according to the American Management Associated; fully 76% of companies from their 2005 survey on this subject actively monitor the use of websites and filter them based on content (American Management Association 2005). The momentum in businesses t measure, monitor and modify their Acceptable Use Policies is now in full-swing, and the development of these policies must be governed by the broader strategic needs of the company on the one hand and the need to ensure an acceptable environment for employees to work in on the other (Pauli, 2001).

Method…… [Read More]

View Full Essay

Know the Answers Before You Ask

Words: 2770 Length: 3 Pages Document Type: Essay Paper #: 52092073

law should be used as a tool for shaping a shared moral climate? Why or why not? Should moral values be written into the law and enforced? Can you think of any examples where a change in the law seemed to improve the moral climate of society?

In general, I would say that the government should stay away from enforcing a moral climate in the sense that there has to be the question asked whether someone is harmed or not. However, "harm" is a very loaded term when it comes to some topics and this includes some things that are entirely legal. For example, adultery is assailed as a wrong thing to do. It can obviously break up relationships/marriages and any kids in the mix can be greatly impacted. However, while such tawdry details may (or may not) matter when a divorce or child custody hearing is done, it is…… [Read More]

Retrieved from http://www.youtube.com/watch?v=elD1IBevvWM

Does the Nick Naylor character utilize the same forms of arguments he previously advocated? What about the Senate Committee? What strategies are they using to gain their points? Do you think there are any problems with the way the Senate Committee conducts the public discourse?

He does shift quite a bit in that he turns the attention to different things. For example, as a way to deflect about cigarettes being bad, he points to the fact that cheese can clog arteries and fatten people. He is also asked whether he would let his son smoke. Again, he deflects and says that it would be illegal. When the question shifts to what would happen if his son was 18, he admits he would buy him one. The questioning of the committee was a little unseemly because the questions were made personally. It is a textbook case of a Senator or other person in government using strident or even incendiary questions. Going after someone's family or the feelings for the same is below the belt and should never happen. The Senator should have stuck to the facts, the studies and so forth and not been such a crass person. Their strategy is to use "gotcha" questions and/or to get the person to say something controversial so as to discredit them. The admission by Naylor that he would give his son a cigarette would surely be used against them both in that committee and outside of it.
View Full Essay

SOPA and Pipa Legislation

Words: 2341 Length: 7 Pages Document Type: Essay Paper #: 20029675

SOPA & PIPA Legislation

File sharing involving copyright infringement began as peer-to-peer operations, sometimes with the involvement of a central server that acts as a search engine. Recently there has been a rise in file sharing where the infringing content is actually stored on the central server, such as the now-defunct megaupload.com. Consequently, there is a conflict between the rights of content owners and the rights of ordinary users of the internet. The conflict here is that efforts to eliminate sites that enable online infringing may also eliminate legitimate internet activity. In the fall of 2011 the SOPA (Stop Online Piracy Act) and PIPA (Protect Intellectual Property Act) proposals were introduced into the U.S. Congress. Almost certainly, the SOPA and PIPA proposals to go after file sharers go too far in the other direction in violating the free speech rights of individual users and handing the web even more over…… [Read More]

WORKS CITED

Corey, G. et al. Issues and Ethics in the Helping Professions, 8th Edition. Cengage Learning, 3011.

Howard, Alexander. "What You Need to Know About the Stop Online Piracy Act in 2012." The Huffington Post, December 23, 2011.

Ranney, Karen. "Digital Thieves Are Stealing from Me." The Hill, December 13, 2011.

 http://thehill.com/blogs/congress-blog/technology/198981-digital-thieves-are-stealing-from-me
View Full Essay

Legal Aspects of Professional Psychology

Words: 1541 Length: 5 Pages Document Type: Essay Paper #: 50460802

Legal Aspects of Professional Psychology

All psychologists are required to follow the ethical guidelines found in the 2002 Ethical Principles of Psychologists and Code of Conduct of the American Psychological Association (APA), commonly known as the Ethics Code. Other important ethical guidelines are found in the 2007 Competing Development Achievement Levels (DALs) of the National Council of Schools and Programs in Professional Psychology (NCSPP) and the Assessment of Competing Benchmarks Work Group of the APA. These ethics codes cover compliance, privacy and confidentiality, assessment, therapy, research and publications, and there are also special guidelines for dealing with children, minorities, culturally diverse populations, forensic psychology and gay and lesbian clients. Both the Ethics Code and state laws require psychologists to maintain the confidentiality of clients and their records, apart from legal requirements to report verified or suspected child abuse or clients who are a danger to others. Psychologists can only provide…… [Read More]

REFERENCES

Arnaut, G.L.Y. And D.A. Hill (2010), "Ethical and Legal Issues," in J.C. Thomas and M. Hersen (eds). Handbook of Clinical Psychology Competencies. Springer, pp. 73-94.

Corey, G. et al. (2011). Issues and Ethics in the Helping Professions, 8th Edition. Cengage Learning.

Wulach, James S. And David L. Shapiro (2005), "Ethical and Legal Considerations in Child Custody Evaluations," in Gunsberg and Hymowitz (Eds.), A Handbook of Divorce and Custody Forensic Development and Clinical Perspectives. New Jersey: The Analytic Press pp. 45-56.
View Full Essay

Retail Store's HR Manager

Words: 3199 Length: 7 Pages Document Type: Essay Paper #: 67989826

Performance Management

Job description for Retail Sales Associate

In today's 'brick and mortar' retail environments, one of the most critical objectives is to create an excellent customer experience. Management of the customer experience is a concept being embraced globally by retailers and has even become part of mission statements for corporations. Thus, Starbucks is renowned for the unique experience it creates for customers, the computer giant Dell focuses on positive customer interactions, Valero Energy is directed towards quality, value and convenience for its retail customers, and Toyota lists dealer support and positive experiences for customers in its mission statement (Michelli 2007; Verhoef et al., 2009).

Duties of sales associates have a variety of aspects. These include the environment of their assigned area -- including maintenance of stock, safety, and cleanliness of the area as well as simply making the area 'shoppable'. The associate must know their products and their department,…… [Read More]

Bibliography

(n.d.). Development Process. Trade. Retrieved from: http://www.orau.gov/pbm/handbook/1-1.pdf

Court, L., & Warmington, C. (2004). The workplace privacy myth: why electronic monitoring is here to stay. Employment and Labor Law, 1(1), 1-20.

Farooq, M., & Khan, M.A. (2011). Impact of Training and Feedback on Employee Performance. Far East Journal, 23-33. Retrieved from: http://www.fareastjournals.com/files/fejpbv5n1p2.pdf

Frayer, C. (2002). Employee privacy and internet monitoring: balancing workers' rights and dignity with legitimate management interests. Business Lawyer, 57(2), 857-878.
View Full Essay

Wal-Mart Benefit Plan Analysis Wal-Mart

Words: 5041 Length: 15 Pages Document Type: Essay Paper #: 59852544

Wal-Mart is also deemed to be a company that greatly mistreats and discriminates against its employees but there has apparently been no reliable empirical data to back that up (Van iper, 2008).

The article concludes by conceding to some Wal-Mart critics. First, Wal-Mart cites Ohio University professor ichard Vedder, who points out that Bureau of Labor Statistics Data holds that Wal-Mart's wage structure lags behind the retail sector as a whole (Van iper, 2008)

elative to what Wal-Mart pays its employee and the benefits they bestow, a third source was widely condemnatory of Wal-Mart and insisted that it could and should be paying its employees more…a lot more. The average associate at Wal-Mart, per this story, makes an average of not quite twelve dollars an hour. If annualized, that would be below the United States poverty line. The story's author insists that wages and benefits are not higher simply because…… [Read More]

References

Blodget, H. (2012, February 16). Walmart Should Pay Its Employees More - Business Insider. Featured Articles From the Business Insider. Retrieved September 28, 2012, from http://articles.businessinsider.com/2012-02-16/news/31065802_1_manufacturing-jobs-middle-class-jobs-low-wage-service

Evaluating Wal-Mart's health insurance. (2012, September 28)

http://reclaimdemocracy.org/walmart/health_insurance_program.php

Edwards J (July 20, 2009) UPDATED: Wal-Mart Axes Half the Drug Brands Covered in Employee Health Benefit Plan http://www.cbsnews.com/8301-505123_162-
View Full Essay

Future of Security in Previous

Words: 1106 Length: 4 Pages Document Type: Essay Paper #: 27797053

National security cards also have the ability to provide useful information and insight to policymakers on which areas of a given country will most likely be the least secure and which pose potential security threats (Ortmeier, 2009). This will also force nations to into strategic identity management systems and taxonomies of how they classify threats to their populations. The use of analytics and big data or exceptionally large and complex data sets, will become commonplace in five years or less as a result of the adoption of national security cards across more nations in the world (Ortmeier, 2009). National security cards will also be increasingly used for managing healthcare, human services and social programs, as the United Kingdom has successfully done for example. The broader implications to the future of security from the use of national identity cards are evident in how advanced forms of security authentication continue to flourish…… [Read More]

References

Krull, a.R. (1995). Controls in the next millennium: Anticipating the it-enabled future. Computers & Security, 14(6), 491-491.

Ortmeier, P.J. (2009). Introduction to security: Operations and management. (4th ed.). New York: Pearson Education Inc.

SP's Special. (2012, India's slybird MAV maturing fast. SP's Aviation,

Sproule, C.M. (2002). The effect of the U.S.A. patriot act on workplace privacy. Cornell Hotel and Restaurant Administration Quarterly, 43(5), 65-73.
View Full Essay

Securing the Electronic Frontier P

Words: 1009 Length: 3 Pages Document Type: Essay Paper #: 65645397



Part 2 - Reflective Diary

The security of customer's data is very critical in the contemporary business environment because of the increase in the data breach that could make organizations to face bad publicity within and outside the United States. Essentially, organizations are required to secure employees' and customers' data to enhance Pretty Good Privacy (PGP) within the IT environment. One of the strategies to enhance customers' privacy is to implement data encryption. Encryption is a strategy of encoding data file where only authorized user can only have access to a secret "key' in order to read the data. The major impact of encryption is that it will prevent unauthorized access to organizational data, which will consequently enhance data protection and privacy. oreover, securing information will make organization to be in line with the IT ethical standard, which will consequently enhance organizational public image.

Despite the security platform implemented by…… [Read More]

McEvoy, S.A.(2002). Email and Internet Monitoring and the Workplace: Do Employee has the Right to Privacy. Communication and Law.

Miller, A.R. & Tucker, C.E.(2011). Encryption and the Loss of Patient Data. Journal of Policy Analysis and Management, 30 (3):534-556.

Lugaresi, N.(2010).Electronic Privacy in the Workplace: Transparency and Responsibility. International Review of Law, Computers & Technology. 24( 2):163-173
View Full Essay

Environmental Psychology

Words: 2073 Length: 8 Pages Document Type: Essay Paper #: 7817867

Human Need for Privacy

Environmental psychology is the study of the interaction between the physical world and human behavior. In recent years, the topic of privacy has been a key aspect of this field of study, as research reveals that it directly relates to a sense of well being and control. A supportive physical environment has been proven to contribute to a successful social, private and work life, and privacy is a key factor in creating a positive environmental setting.

hy e Need Privacy

There are many theories as to why people need privacy. Many psychologists believe that people need to maintain personal space between themselves and others to avoid overstimulation. According to Scott (1993), when people are too close to one another, they are bombarded with too many social or physical stimuli.

Some researchers argue that people need to maintain personal space to avoid various stressors associated with very…… [Read More]

Works Cited

Altman, I. (1975). The environment and social behavior. Monterey, CA: Brooks/Cole.

Altman, I. (1976). Privacy: A conceptual analysis. Environment and behavior, 8, 7-29.

Altman, I. (1977). Privacy regulation: Culturally universal or culturally specific? Journal of Social Issues, 33(3), 66-84.

Baum, A., Singer, J.E., & Baum, C.S. (1981). Stress and the environment. Journal of Social Issues, 37(1), 4-29.
View Full Essay

Employment Law

Words: 3665 Length: 12 Pages Document Type: Essay Paper #: 49234437

Organization Behavior

Human esource Management Policies of Wal-Mart

Employment Law Wal-Mart

Human esource Management Policies of Wal-Mart

Wal-Mart is a large scale multinational retailer that employs more than 2.2 million employees in 27 countries. The management of this large workforce requires it to implement effective human resource management and employment relations policies at its workplace. Wal-Mart believes in effective recruitment and selection process in order to fill the vacant job positions with the most talented and skillful employees. It uses one way and two way virtual interviewing techniques in order to minimize its heavy recruitment and administrative costs. Wal-Mart generally fills its vacant job positions from the industry through fresh graduate induction and experienced professionals. It trains them through different methods in order to make them learn the most advanced knowledge related to their job responsibilities.

The Wal-Mart workforce consists of individuals from different cultures, nationalities, and races. In order…… [Read More]

REFERENCES

Bergdahl, 2010, How the HR Division at Wal-Mart drives the Company's Success through People. Available at [Accessed November 28th, 2012]

Celentino, J. 2012, Wal-Mart Doesn't Owe Pregnancy Light Duty. Available from [Accessed November 29th, 2012]

Greenwald, J. 2011, Court rules against Wal-Mart in sexual harassment, retaliation case. Available from [Accessed November 29th, 2012]

Hinshaw & Culbertson, 2012, Wal-Mart Follows Properly-Drafted Accommodation Policy, Still Ends Up Potentially Liable for Retaliation. Available from [Accessed November 29th, 2012]
View Full Essay

Solutions for the Harmful Effects of High Population Density

Words: 1673 Length: 4 Pages Document Type: Essay Paper #: 97285840

Psychology -- the Effects of Population Density and Noise

Population density affects territoriality, privacy, personal space and noise levels. These four psychological elements involve perception and high population density affects all of them in ways that are physiologically and psychologically harmful to humans. Through decades of experience and study, experts have learned to use perception to reduce the harmful effects of high population density. The introduction of nature and the use of design to create the perception of ample space can dramatically reduce the harmful effects of high population density on territoriality, privacy and personal space. In addition, the uses of noise masking and noise-absorbing materials have reduced the harmful effects of noise. Just as perception can increase harm, perception can also decrease harm.

ody

a. Population Density

"Population density" is the number of people residing in an area divided by the size of that area (National Geographic Society). Population…… [Read More]

Bibliography

Lebednik, Christine. "Types of Noise-Absorbing Materials." n.d. www.ehow.com Web site. Web. 6 July 2014.

Merriam-Webster, Inc. "Proxemics." 2014. www.merriam-webster.com Web site. Web. 6 July 2014.

National Geographic Society. "A Look at the Population Density of the United States." 2008. http://education.nationalgeographic.com Web site. Web. 6 Hykt 2014.

ProAudioSupport. "What is auditory masking?" 2014. www.proaudiosupport.com Web site. Web. 6 July 2014.
View Full Essay

Work-Home Balance Let's Reports Firing Line Question

Words: 665 Length: 2 Pages Document Type: Essay Paper #: 65972475

Work-Home Balance

Let's reports firing line question work/home balance, perspectives. First,'s employers advised issues, a wide variety sources expressing glee opportunities opened technology employers -opt -increasing portions employees' lives: Lane, S. Business history and future plans letter

The work-home balance

Technology is both a benefit and a bane to employees and employers alike. From an employee perspective, technology enables telecommuting and reduces 'real world' commuting time. It permits parents to remain with their young children if necessary -- as well as for an employee to work in pajamas. Also, if there is a problem at work, the employee may be able to deal with it virtually, either from a home computer, or even using a Blackberry or Smartphone, rather than going into the office. The downside, however, is that because employees can check their email even while on vacation, employers may expect them to do so. The workday can become…… [Read More]

View Full Essay

Communications Which of the Four

Words: 1676 Length: 5 Pages Document Type: Essay Paper #: 19423861

Qualified privilege has the same result as absolute privilege, but does not protect statements that can be proven to have been made with malicious intent (Pember, & Calvert, 2005).

The church would argue that they had a qualified privilege to communicate Steve's personal indiscretions due to the fact that they have the right to practice their religion. They will say that the disclosing of personal indiscretions is somehow a religious practice in their church and that everyone must disclose their indiscretions to them so that they can then make these public so that other people can help the person with their problems. They would argue that the statements were important facts to be known in the public interest in the carrying out of their religious practices.

d. Is there a legal difference in disclosing personal indiscretions to other elders, to members of the church, or to members of the public?…… [Read More]

References

Pember, D., & Calvert, C. (2005). Mass Media Law. New York: McGraw-Hill.