Preview

Employer Security Vs Employee Privacy

Powerful Essays
Open Document
Open Document
4077 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Employer Security Vs Employee Privacy
iBRIEF / eCommerce 7/25/2001

Cite as 2001 Duke L. & Tech. Rev. 0026

MONITORING EMPLOYEE E-MAIL: EFFICIENT WORKPLACES VS. EMPLOYEE PRIVACY
Employer monitoring of electronic mail constitutes an emerging area of the law that is clearly unsettled at this point in time. This iBrief demonstrates that the privacy rights of non public-sector employees are relatively unprotected by the federal and state constitutions, broad judicial interpretations of enacted privacy legislation favor legitimate employer-monitoring practices, and many of the elements of common law claims are difficult for employees to prove. INTRODUCTION ¶1 Employee use of electronic mail (e-mail) during business hours is a common characteristic of the 21st century American workplace.
…show more content…

The ordinary course of business exception;22 and 3. The consent exception.23 ¶ 14 The fact that the courts broadly interpret these three exceptions makes the ECPA's privacy protections illusory at best. An analysis of these exceptions will better illustrate this idea. The Provider Exception ¶ 15 The provider exception is proving to be a strong ally to employers desiring to monitor their employees' e-mail. Concerning this exception, "commentators have predicted that most private employers will be exempt from the ECPA under this exemption if they provide their employees with e-mail service through a company-owned system."24 In fact, a few courts have already applied this exception to employer e-mail monitoring. In one of the most interesting of these cases, the provider exception allowed United Airlines to monitor the online reservation system that it provided to employees in an attempt to discover falsifications by a travel agent.25 However, there is confusion as to whether private employers will be protected under the ECPA if they merely use a third-party service provider.26 In these cases, employers are not truly providing the e-mail services to their employees and would likely have to use one of the other two broad exceptions that the ECPA provides. The Ordinary Course of Business Exception ¶ 16 The ordinary course of business exception is "actually an exclusion from the definition of an 'electronic device'" under the ECPA.27 This exception has not been applied to workplace e-mail, "but based on its application in analogous contexts, such as telephone communications, it may well provide another shield for employers who engage in routine monitoring of their employees' e-mail.28 Courts have taken two approaches when applying the ordinary course of business exception to telephone communications: 1. The content approach - which permits an employer to monitor "business-related" communications but does not allow monitoring of personal communications; and 2. The

You May Also Find These Documents Helpful

  • Good Essays

    In this examination of United States v. Warshak 631 F.3d 266 (6th Cir. 2010), the primary focus will be on the constitutional issues regarding this case. First, an analysis of the defendant’s expectation of privacy, regarding e-mail communication. Next, an examination of the government argument concerning the potential invasion of the defendant’s Fourth Amendment right to privacy. Finally, an analysis of the case’s conclusion, and how the Stored Communication Act factored into the constitutionality of more than 27,000 items of e-mail evidence.…

    • 628 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Leg 500 Assignment 1

    • 939 Words
    • 4 Pages

    Emails are something that’s getting sent on a daily basis all day every day. With having to set up email accounts, which ask for your social security numbers are basically your fingerprint, is an open door for people to find out any information they want to about you. Typically, some companies use company email addresses for memos that need to get to employees or company executives or any personal emails that need to be shared. With company emails come company email policies that will explain why the emails were provided and what is not acceptable content to pass through email. In the Michael A. Smyth v. The Pillsbury Company case, Mr. Smith and another employee were terminated for exchanging emails that made threats to sales managers and made rude comments about certain company events. Mr. Smith sued the Pillsbury Company for violating public policy by committing a tort known as “invasion of privacy”. In the policy, Pillsbury stated that all employee emails were going to remain confidential and privileged including plaintiff. On these grounds, Smith thought he had a case against the Pillsbury Company, but as the defendant (Pillsbury) pointed out, the company wants to keep their employees safe so the frequent email checks to ensure that…

    • 939 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    John's Case

    • 358 Words
    • 2 Pages

    Employee’s privacy rights in the workplace depend on whether they work in the public sector or private sector. Because constitutional rights operate primarily to protect citizens from the government1 state action is required before a citizen can invoke a constitutional right. Therefore, since most…

    • 358 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    RTT Role of Organizations

    • 1195 Words
    • 5 Pages

    This paper is the analysis of the avoidable sentinel event of Mr. B, a sixty-seven year old patient who was admitted to the emergency room with left leg and hip pain following a fall. A root cause analysis will help identify key elements which led to the unfortunate event. A plan of action to develop a change theory will help formulate an improvement plan to prevent future occurences like that of Mr. B. A failure mode and effects analysis will be discussed to test the projected plan for improvement. Finally, the roles that the nurses will play in this plan to improve this quality of care will be discussed.…

    • 1195 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Quiz 1

    • 442 Words
    • 4 Pages

    Question 6. 6. Employer monitoring of employees’ Internet activities has become so commonplace that it is no longer a subject for debate. (Points : 1)…

    • 442 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    communications policy to be ambiguous and interpreted the ambiguity against employer. The court The policy stated that the company could be review any matters on the…

    • 1580 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Charles Dickens was an English novelist in the 19th century. A Tale of Two Cities by Dickens is a story of sacrifice and resurrection. Throughout the novel many instances of this are displayed. Charles Darnay, Dr. Manette and Lucie Manette, and Sydney Carton are all examples of sacrifice and resurrection in the novel.…

    • 447 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Privacy is something everyone should have the right to. In fact, the First and Fourth Amendment protects this right. A major issue evolving in today's workplace is the invasion of employees' privacy by the employer. Everyone has a right to privacy at home, but this right does not include the workplace. Many employers have started monitoring the actions occurring by the employees of their company while at work. One of the many ways of monitoring action is through accesses to employees email correspondence. Many employers have private email severs which they have access to. This action is used to prompt employees to handle work related emails only. What would happen if an employee access there personal email while at work? Would that personal email be subject to…

    • 540 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The widespread use of Internet and e-mail has transformed the way business is conducted in the typical American workplace. Undeniably, the Internet and e-mail have also given employees a means of escaping briefly from long days at the office. How many of you have used work computers for your personal use? More than likely all of us have at one point or another. Should our employers even allow us to use the business computers for our own personal benefit on company time? Of course, the answer to this question varies from business to business depending on the computer use policy of the particular company. Employees should know and understand their employers’ computer use policy before accessing business computers for personal use. Disciplinary action, up to and potentially including termination of employment, could result if misuse occurs.…

    • 996 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Whose property does the emails belong to? These questions make us revisit examples of how businesses handle email. In her book, Who Owns Information, Anne Wells Branscomb devotes an entire chapter to Who Owns Email. Branscomb begins with the story of a female administrator who was horrified to find her boss reading printouts of employee email. She lost her job for her protest. She tried to sue her employer, but there were no laws guaranteeing the confidentiality of email at the workplace, and she lost her case. The question of ethics is different from looking at laws and their enforcement, for even though something is legal it can be unethical, and if something is illegal it can be ethical. Our current laws do not conform to the definition of ethics.…

    • 720 Words
    • 3 Pages
    Good Essays
  • Good Essays

    When an employee enters the workplace the majority of his or her privacy is taken away. The work place is considered a public domain. The employee should be protected from an employer unwanted inquires of private matters of the employee.…

    • 1306 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    What are the positive, and negative implications of digital technologies at work to privacy, and security? The use of digital technologies can affect the business, its employees, and the consumer. One aspect of digital technology that is common, is surveillance; if a crime had been committed to the business, its employees, or the consumer, the footage recorded can help with the investigation, right? However, how would this affect the concern for privacy? If an employee doesn’t wish to be under surveillance, don’t they have the right to disagree it? Peggy N. Kerley advises: “Under certain circumstances…monitor[ing] employees…can invade their privacy [my emphasis]…monitoring might also violate state common law or statutory protections worker…

    • 121 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Hrm Brochure

    • 1489 Words
    • 6 Pages

    References: Carsen, J. (2012, January 11). Compliance with Employee Privacy Laws: How To Create an E-…

    • 1489 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Digital Right Management

    • 573 Words
    • 3 Pages

    Your research paper will be 5-7 pages, double-spaced. Appendices and bibliographic material will not count toward the total number of pages or word count. Extensive research on a particular topic is expected, and accurate documentation of all sources is critical. The paper may not be a simple overview but rather must examine closely a particular topic of interest related to ethics and information systems. The paper is submitted as a MS Word or Rich Text Format (.rtf) electronic file through your Web Tycho class. APA format and style should be followed.…

    • 573 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Challenges in Shrm

    • 900 Words
    • 4 Pages

    (2) Ensure that employees are assigned to do the adequate tasks and that the overall performance of the administration is aligned well with the general and particular objectives that it seeks to accomplish.…

    • 900 Words
    • 4 Pages
    Satisfactory Essays