Preview

Employee Monitoring

Satisfactory Essays
Open Document
Open Document
317 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Employee Monitoring
Employee Monitoring Employee monitoring involves the use of computers to observe, record, and review an employee 's use of a computer, including communications such as email, keyboard activity (used to measure productivity), and Web sites visited. Many computer programs exist that easily allow companies to monitor employees. Further, it is legal for companies to use these programs. A frequently debated matter is whether an employer has the right to read employee email messages. Actual policies vary widely. Some companies declare that they will review e-mail messages regularly; others state that e-mail messages are private. If a company does not have a format e-mail policy, it can read e-mail messages without employee notification. One recent survey discovered that more than 73 percent of companies search and/or read employee files, voice mail, e-mail messages, Web connections, and other networking communications. Another claimed that 25 percent of companies have fired employees for misusing communications technology. Currently, no privacy laws exist relating to employee e-mail (Privacy Laws and Personal Data). The 1986 Electronic Communication Privacy Act provides the same right of privacy protection that covers the postal delivery service and telephone companies to various forms of electronic communications, such as e-mail, voice mail, and cellular telephones. The Electronic Communications Privacy Act, however, does not cover communications within a company. This is because any piece of mail sent from an employer 's computer is considered company property. Several lawsuits have been filed against companies because many people believe that such internal employee communications should be private (Slobovnik and Stuart 144-160). Works Cited
Lang, Stefanie. "The New Invasion: Employee Monitoring and Privacy Issues." Technology Issues Aug. 2005: 33-45.
Privacy Laws and Personal Data. Shelly Cashman Series®. Course Technology. 3 Aug. 2005.



Cited: Lang, Stefanie. "The New Invasion: Employee Monitoring and Privacy Issues." Technology Issues Aug. 2005: 33-45. Privacy Laws and Personal Data. Shelly Cashman Series®. Course Technology. 3 Aug. 2005. www.scsite.com/wd2003/pr2/wc2.htm. Slobovnik, Victor W., and Janel K Stuart. Workplace Challenges. Dallas: Techno-Cyber Publishing, 2005.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Implications differ form company to company. But many of the companies monitor their employees to make sure that they are not sharing company related information with people out of the company. Some companies monitors to make sure that employees are not using companies’ website during work hours.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The Company reserves and intends to exercise the right to review, audit, intercept, access, disclose, and use all messages created, received, or sent over its e-mail system for any purpose. The contents of e-mail may be disclosed and used by the company to protect its rights and/or property without the permission of the employee, in the company’s discretion.…

    • 696 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    I believe that they should monitor employee email and internet usage. By allowing the company to monitor such actions it will stop individuals wasting valuable company time. This also allows for restrictions of site access if one is exploring sites they should not be. It is important to watch to be sure that important information about the company is not leaked out to the public. Actions of their employees effect company whether online or not online. Although, the internet makes it easier to incidentally bring hardship to company in which one works the actions can cause lawsuits against the company.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Leg 500 Assignment 1

    • 939 Words
    • 4 Pages

    Emails are something that’s getting sent on a daily basis all day every day. With having to set up email accounts, which ask for your social security numbers are basically your fingerprint, is an open door for people to find out any information they want to about you. Typically, some companies use company email addresses for memos that need to get to employees or company executives or any personal emails that need to be shared. With company emails come company email policies that will explain why the emails were provided and what is not acceptable content to pass through email. In the Michael A. Smyth v. The Pillsbury Company case, Mr. Smith and another employee were terminated for exchanging emails that made threats to sales managers and made rude comments about certain company events. Mr. Smith sued the Pillsbury Company for violating public policy by committing a tort known as “invasion of privacy”. In the policy, Pillsbury stated that all employee emails were going to remain confidential and privileged including plaintiff. On these grounds, Smith thought he had a case against the Pillsbury Company, but as the defendant (Pillsbury) pointed out, the company wants to keep their employees safe so the frequent email checks to ensure that…

    • 939 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    I believe what this is saying is that companies will have the right to monitor their employees as long as they have just cause to suspect the employee is not abiding by the company policy on private internet and phone call usage.…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Employees have a reasonable expectation of privacy within the workplace; however there are circumstances when an employer has a legitimate right to monitor, investigate, and review the activities of its employees. The following identifies business practices that may be executed to ensure the integrity of company products and property, workplace safety, and the monitoring of employee productivity.…

    • 1493 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    References: Bennett-Alexander, D.D., & Hartman, L.P. (2004). The Right to Privacy and Other Protections from Employer Intrusions. _Employment Law for Business_ (4th). New York: McGraw Hill. (Original work published 1995)…

    • 1519 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Xcom/285 Privacy Laws

    • 321 Words
    • 2 Pages

    Friedman, B., & Reed, L. (2007, June). Workplace privacy: Employee relations and legal implications of monitoring employee e-mail use. Employee Responsibilities and Rights Journal, 19(2),…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. Employees may not lock any documents or electronic transmission on company communication systems. We reserve the right to access, disclose and/or delete any such communications without notice. You are prohibited from opening any attachments to electronic mail messages unless you know the sender. You are also prohibited from sending any communication you have created outside the work place without permissions from the Director of the Department.…

    • 336 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This section of the employee handbook is provided as a guideline for employees to understand the company policy and procedures regarding privacy in the workplace. While this section cannot address every possible scenario that may occur, the general policy will serve as a basis of understanding the key workplace issues and employee privacy. This section addresses privacy issues related to personal background information, off-work activities, and the corporate policy on the use of electronic monitoring. These privacy policies are designed to both provide a clear guideline for employees on the difference between job related and personal privacy. The policies are designed to create a standard set of procedures that apply equally to all employees. The company goal is to provide a fair workplace for everyone, while at the same time protect the organizations professional reputation. The privacy policies are all in compliance with state, federal, and international laws.…

    • 1411 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    References: Ball, K.S.(2001). Surveillance Society: Monitoring everyday life. Information Technology & People, 14(4), 414-419. Retrieved from http://search.proquest.com/docview/222415193?accountid=32521…

    • 2637 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    The idea of employee rights involves many complex issues. An employee’s right to a workplace free of discrimination and harmful environmental factors is obvious. Yet, other issues surrounding privacy, personal expression, and communication monitoring are not as clear-cut. While employees may feel that they have the right to express their opinions and use business communications while working, not only may they be fooling themselves but they are acting in a way that is unethical. While businesses do not have the right to control employee behaviors outside of the workplace, they do have the right to monitor and control communications and employee actions during paid time. As such, employees have the right to reasonable expectations in terms of communication, yet cannot (within limits) ethically demand a right to privacy, private communication, or personal expression while they are utilizing business property or on business time. Workplace privacy has been a hot issue in the last decade, as more and more workplaces incorporate email and Internet-use into the office environment. Many employees now use email and the Internet daily, not to mention the telephone (Nord, McCubbins, & Nord, 2006). With high volumes of communicatio…

    • 917 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Syllabus

    • 1217 Words
    • 5 Pages

    In recent history, there has been an influx in controversy regarding e-mail, Internet usage, and overall privacy policies in the workplace. Because of the extensive increase of personal e-mail, smartphones, social media, and other Internet-based communications, the need for laws that govern privacy for the users of these communications is crucial. These policies are usually implemented to ensure security and to reduce liability. This report will show examples of privacy issues, laws, and experiences in the workplace.…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Good Essays

    There is much debate over what employers should and should not be able to do when it comes to monitoring the communications of individuals under their employment. There are those who feel that the rights of the individual are not limited to protection from the Government and employers have limited rights in regards to employee communication. There those that feel that the employer should have very little to no restraint in monitoring those under their employment. Going too far in either the employers or employee position can create an unproductive and unrealistic standard for a working environment. Employers must be able to create and maintain both a productive and safe working environment from their employees. However this does not mean employees should be subject to unreasonable and intrusive monitoring practices by their employer. Communication privacy laws and workplace policies should be carefully crafted to provided balanced protection both the interest of employer and employee.…

    • 735 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Privacy is something everyone should have the right to. In fact, the First and Fourth Amendment protects this right. A major issue evolving in today's workplace is the invasion of employees' privacy by the employer. Everyone has a right to privacy at home, but this right does not include the workplace. Many employers have started monitoring the actions occurring by the employees of their company while at work. One of the many ways of monitoring action is through accesses to employees email correspondence. Many employers have private email severs which they have access to. This action is used to prompt employees to handle work related emails only. What would happen if an employee access there personal email while at work? Would that personal email be subject to…

    • 540 Words
    • 3 Pages
    Good Essays