Instructor: David Bouvin
Debbie Barrow
May 07, 2012
Do you feel like your workplace is your safe haven? Is your privacy invaded in your workplace? Can employers read your e-mail; monitor your blog or social network post. Employees peeping over your shoulder (sneakily), or even putting up a surveillance camera, as an employee, we should not have to be fall a victim to such behavior. We all know that most information is not kept in the workplace. A workplace search can be very upsetting, infringing on an employee 's expectation of privacy in the workplace. On the job, we tend to view our desks, lockers, computer files, office, tool boxes and work bench as our private space at work. It is understandable that while at work, we are on the employees’ time and that this time is very valuable. From my point of view, it is easy to see how someone could easily invade the workplace of another employee, but should what he or she finds out, leave the workplace. These are the kind of things that are happening at my workplace due to a RIFF-Reduction in Force. People seem to feel the need to spy on the employees. Our school district is now undergoing its second riff. We have lost a great deal of employees and things are totally different for the employees who are still employed in the district. It is so sad to say, but there is not a safe place or person to vent. Everything that is said or heard is always used in a negative way. It is really sad that people feel the need to spy on other employees for the sake of trying to hold on to a job that might be taken away from them by force not by choice. Some of our employees had even gone as far as to keep their cell phones on to record conversations with other employees. Why would an individual risk the chance of being called a “whistle blower?” just to get
References: Boatright, J.R. (2009). “Ethics and the Conducts of Business.” Upper Saddle River, NJ: Prentice Hall Brey, P. (2005). “The Importance Of Privacy in the Workplace” Retrieved on May 01. 2012 at http://www. utwente.nt. Moor, J.H. (1997), "Towards a Theory of Privacy in the Information Age," Computers and Society, vol. 27, 3, 27-32. Squazzo, J. (2012, January). “Ethical Challenges and Responsibilities of Leaders”. Healthcare Executive, 27(1), 32-4, 36-8. Retrieved May 02, 2012 from ABI/INFORM Global. (Document ID: 2565593981). Westin, A. (1967). “Privacy and Freedom” New York: Athenaeum [->0] - http://thefoodproject.org/trust-building-activities