Preview

Protea Technology Ltd. Vs Wainer Case Study

Good Essays
Open Document
Open Document
1189 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Protea Technology Ltd. Vs Wainer Case Study
Conducting business in the modern era has changed drastically due to the increasing use of information technology such as the World Wide Web. Employees are using emails, Facebook, Twitter and LinkedIn profiles to connect faster with others and to sell their ideas and those of the company to which they are employed. The problem arises when employees feel that their right to freedom of speech permits for uncensored misuse of social networks which may harm their fellow employees or the reputation of the company they are employed by. There are different points of views between employers and employees with regard to their opinion and value on privacy regulations. As in the case of Protea Technology Ltd. Vs Wainer it can be seen that employees are …show more content…
Although this is not verbally communicated to the employees, it can be seen as a lack of trust or respect towards the employees. It can have negative implications in regard to their performance or productivity as they do not feel to be working in a safe or comfortable environment. One of the rights with regard to privacy of an individual is mentioned in the Constitution of South African Bill of Rights under section 14 para. d) as “Everyone has the right to privacy, which includes the right not to have the privacy of their communication infringed”. The right to privacy is based on human dignity and is inherently linked to other rights such as the right to equality and freedom of expression. The theory of deontological ethics by Immanuel Kant sets an objective standard against which all actions can be measured. He then went on to say that if an action amounts to abusing other persons in order to reach your own objective then the action is wrong. Thus, invading the privacy of current or future employees to protect the reputation of the company and future negligent hiring claims can be seen as unethical or morally incorrect (Kretzchmar et al., …show more content…
In keeping the interests of the company in mind, one needs to comply with the IT governance requirements as outlined in the King Report on Governance for South Africa (Institute of Directors In Southern Africa,2009). It puts emphasis on the importance of information and procedures used to safeguard information that is of strategic significance (Heyink,2011). The party deemed as operator has a task of processing information through mandate issued by the responsible party. The responsible party stated above is the party that acquires clients’ information directly from the client. Both operators and responsible parties are accountable for the safeguard of information. Companies want to avoid lawsuits which could arise from a leak by the operator. This would be a breach of contract between said operator and the responsible

You May Also Find These Documents Helpful

  • Good Essays

    Information that is stored in an organisation has to follow the security and confidentiality procedures. For example finances, customer’s and employee’s details should be secured and only certain members of staff should be able to access physical and electronic data unless you have been given authorisation. If information gets into the wrong hands it could have serious consequences and might lead to legal action.…

    • 777 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Eth 316 Simulation Week 3

    • 1059 Words
    • 5 Pages

    The issue presented in dilemma number one arises from an employee named Aaron Webb who posted sensitive company information. His posting was not derogatory in nature however the information is considered private. Many companies guard their information and keeping their core competencies sacred in order to remain competitive. Another employee named Jamal Moore sent an anonymous message revealing through hacking into Webb’s computer that Webb has many of these sensitive files loaded on his personal computer. The issue arises of how to respect the personal views of employees outside of the workplace.…

    • 1059 Words
    • 5 Pages
    Better Essays
  • Good Essays

    As mentioned in our text, there are two ways to address security issues. First, the technical approach in which computer software and monitoring is used to monitor and control websites being visited or information being copied. Second, the communication methods and partnership and control by the Human Resources department. Because not all possible risks could be addressed by the use of technology there is also a great need to control the flow of information and proprietary technology by implementing policy. A bank for example could implement a security access policy following a “need to know” plan where only if necessary an employee could have access to data or information. The bank could also create an expectation of zero privacy where all files or devices on a company network whether owned or provided by the employee are subject to scanning or monitoring, and finally the automatic acceptance that devices such as peripheral blockers may be in place in order to avoid data extraction or movement. In regards to a new employee versus an employee who has given notice, a new employee could have restricted access that is only opened slowly as they acquire responsibilities and an employee leaving the firm depending on his level of access, the firm may opt to take his termination effective immediately.…

    • 592 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Confidentiality is a very important factor. All the data relative to recruitment, compensation, and management of employees is highly sensitive as it discloses private information about the employees and the company. So if these land in the wrong people, it can be misused to commit criminal behaviour such as fraud. Confidentiality maintenance also relates to professionalism of the organisation. So employees must make sure they maintain a professional attitude and not share private information about the rest of the employees or about the company.…

    • 2721 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    It has come to my attention that employees are currently posting their comments and concerns regarding the company on Facebook and Twitter either from the company’s resources, or on their own time. Quoting this section on social media, “…personal opinions regarding the Company, should be wary of the danger that such opinions may imply inappropriate access to and dissemination of confidential, sensitive or proprietary information. Opinions concerning the Company that are expressed should clearly indicate that they do not reflect the opinion of the Company, its officers or management.” I understand social media is becoming a dominant force in advertising and expressing opinions, however you must be careful that your opinions do not help in destroying the company’s well known reputation. If you have a concern about the daily activities in your job, the best thing to do is approach management with your concerns and opinions in substitute of posting them on the internet. Our company values its employees and we encourage everyone’s opinions and suggestions because we are always looking for ways to make this company better. We would like our employees to have a trusting and open communication with management and feel that they can approach management with any type of…

    • 713 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Xcom/285 Privacy Laws

    • 321 Words
    • 2 Pages

    In times like today a company needs to know what is going on within itself. This means that having access to computers, email, mobile devices along with monitoring systems in the work place. Some of my fellow classmates to not agree with some of the practices but per our reading in Workplace Privacy it stays that “Under the “ordinary course of business” exemption, for example, employers may monitor email communications if the employer can show a legitimate business purpose for doing so” (Friedman, Reed, 2007). If employees know that they are being closely watched it decreases the chances of them not working or cheating the company.…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Let’s look at confidentiality which is one of the most important measures to maintain safety and security. Not following procedures according to Data Protection Act 1998, which objectives aim at secure data processing and storage, may result in legal action against employers. These procedures may vary depend on the nature of the business. Nowadays vast majority of the business relay on computerised filling system, therefore, employers must take every necessary measure to protect that system from for example, hackers. Employees, on the other hand must follow all procedures to ensure they use system correctly and legally. Consequently, not following health, safety and security procedures may also lead to economic crises of an organisation, for example, court may order to pay very high fine or close down the business and loss of the customers. Moreover, an employer who failed to follow health, safety and security procedures where as a result employees are getting harmed at work is highly likely to be exposed to organisational grievance or disciplinary procedures. For example, in a care home failure to provide moving and handling training to induction staff would have catastrophic consequences such as: spine injuries acquired by using incorrectly equipment or by not using it at all when necessary or even a death of a care taker if handled inappropriately using unsecured hoist. This scenario would not…

    • 335 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Another reason why social media in the work place is counter-productive is discrimination and damage to the business reputation. It is important for employers to make aware of the responsibilities to the employees and manage these issues correctly. Instead of banning access to social networking and hoping it will go away, employees…

    • 275 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Social media has connected the entire world to one another. It has become a cornerstone of communication in the 21st century with websites such as Google, Instagram, Facebook, and Twitter to name a few. Since this large boom in social media usage in the past 10 years, many issues have arose with it as well. One of these issues was addressed and discussed in the essay, “Why Asking for a Job Applicant’s Facebook Password is Fair Game” by Alfred Edmond Jr. Edmond’s main argument is that, from the perspective of the business owner, it is appropriate for the employer to ask a job applicant for their Facebook password before being hired. The reasons that he gives for this are in multitude (Edmond, 2012).…

    • 831 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The idea of employee rights involves many complex issues. An employee’s right to a workplace free of discrimination and harmful environmental factors is obvious. Yet, other issues surrounding privacy, personal expression, and communication monitoring are not as clear-cut. While employees may feel that they have the right to express their opinions and use business communications while working, not only may they be fooling themselves but they are acting in a way that is unethical. While businesses do not have the right to control employee behaviors outside of the workplace, they do have the right to monitor and control communications and employee actions during paid time. As such, employees have the right to reasonable expectations in terms of communication, yet cannot (within limits) ethically demand a right to privacy, private communication, or personal expression while they are utilizing business property or on business time. Workplace privacy has been a hot issue in the last decade, as more and more workplaces incorporate email and Internet-use into the office environment. Many employees now use email and the Internet daily, not to mention the telephone (Nord, McCubbins, & Nord, 2006). With high volumes of communicatio…

    • 917 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Syllabus

    • 1217 Words
    • 5 Pages

    In recent history, there has been an influx in controversy regarding e-mail, Internet usage, and overall privacy policies in the workplace. Because of the extensive increase of personal e-mail, smartphones, social media, and other Internet-based communications, the need for laws that govern privacy for the users of these communications is crucial. These policies are usually implemented to ensure security and to reduce liability. This report will show examples of privacy issues, laws, and experiences in the workplace.…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Good Essays

    There is much debate over what employers should and should not be able to do when it comes to monitoring the communications of individuals under their employment. There are those who feel that the rights of the individual are not limited to protection from the Government and employers have limited rights in regards to employee communication. There those that feel that the employer should have very little to no restraint in monitoring those under their employment. Going too far in either the employers or employee position can create an unproductive and unrealistic standard for a working environment. Employers must be able to create and maintain both a productive and safe working environment from their employees. However this does not mean employees should be subject to unreasonable and intrusive monitoring practices by their employer. Communication privacy laws and workplace policies should be carefully crafted to provided balanced protection both the interest of employer and employee.…

    • 735 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Social networking has become a part of the majority of Americans every day life. So much lives and breathes on these sites. The world has become such a fast pace busy world that a growing presence is being communicated online rather it is welcomed or not. Lines are quickly becoming blurred between professional and personal relationships but where does the line get drawn? The amount of time spent on these site have grown excessively, “as of June, 22.7 percent of Americans ' online time was spent on social media, a 43 percent increase from just a year earlier. By contrast, only 1 percent of time was spent on search engines and about 8 percent on e-mail” (Search Engine Watch, 2010). With this rise people lives will be now seen through a looking glass kind of mirror. Relationships of all kinds, both professional and personal will be able to see you in a new, more translucent way. “The days of you having a different image for your work friends or co-workers and for the other people you know are probably coming to an end pretty quickly” because of the dominance of social network sites — where people use their real names — and the extent to which information is now shared online, said Zuckerberg. That 's good, he said, because “having two identities for yourself is an example of a lack of integrity” (Danah Boyd, 2010). However is it a lack of integrity when you wouldn’t…

    • 2264 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Social Media

    • 669 Words
    • 3 Pages

    “We are in the midst of a communications revolution. Use of social media for communication purposes continues to grow, while "old school" messaging media like email is on the decline. Facebook reportedly has reached 700 million users worldwide and is putatively valued at $50 billion dollars. Advertising revenue expected to be generated from social media is estimated to reach $8.3 billion dollars annually by 2015. Significantly, according to one survey, 81% of companies have implemented (or plan to implement) social networking in order to enhance their exposure. Seventy-three percent of small and medium businesses reportedly employ social media for marketing purposes.” The Legal Implications of Social Networking: The Basics (Part One) By David Navetta on June 11, 2011Posted in ECPA, Social Networking…

    • 669 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The next reason for banning social websites at work is to maintain company’s image. Some companies, such as service companies, have a huge number of customers transacting every day. If the customers accidentally see the employee’s screens being full of his personal pictures or commenting boxes of Face-book, they are likely to think that this company is a poor-quality company which is not strict or does not know how to train their staff. They do not rely on this company anymore; therefore, this company probably loses its prestige. The image is one of the most important standards determining the company’s success; thus, prohibiting social websites is very necessary.…

    • 502 Words
    • 3 Pages
    Good Essays