StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Fading Privacy Rights Of Public Employees - Case Study Example

Cite this document
Summary
The paper presents many privacy rights groups and employees alike have begun to voice is the fact that any and all electronic communication that is carried out via a company computer or company Smartphone is libel to interception and/or analysis by the company who owns the device…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.1% of users find it useful
Fading Privacy Rights Of Public Employees
Read Text Preview

Extract of sample "Fading Privacy Rights Of Public Employees"

Section/# Employee Privacy and Confidentiality in the Age of Electronic Eavesdropping A prescient concern that many privacy rights groups and employees alike have begun to voice is the fact that any and all electronic communication that is carried out via a company computer or company Smartphone is libel to interception and/or analysis by the company who owns the device. As part of nearly every employee confidentiality disclosure form that is required to be signed prior to employment commencing, the employee gives away the rights to personal privacy while using any and all electronic forms of communication that are provided by the employer (whether on or off work hours). Such policies mean that it is becoming increasingly more difficult to define where personal privacy and eavesdropping laws end and the rights of the employer being with respect to monitoring any and all forms of electronic communication that the employee might engage in while employed. Accordingly, the purpose of this essay is to provide a thoughtful commentary on key issues relating to privacy and employer rights with respect to the issues at hand. Furthermore, the analysis will seek to raise some key questions with reference to what the technological development evidenced within the past few years portends for the employment frontier. Firstly, it should be understood that the technological development that has taken place within the past few decades has made a profound and lasting impact on the way that firms surveil and monitor their employees. Prior to this technological revolution, the ways in which an employer could surveil an employee legally were quite limited. Privacy laws dictated that electronic eavesdropping by means of a microphone or the use of a hidden camera was illegal. As such, the level to which an employer could ethically, morally, and legally gain a degree of inference with regards to what activities and thoughts the employee shares within the company, among personal friends, or any other such activities is brought clearly into focus. The true crux of the matter is not the fact that the employer will be able to gain a high degree of inference with regards to the potential unethical or illegal activities in which the employee might be engaging; rather, it has been proven statistically that a high percentage of emails and correspondence that are done at work are of a personal nature. Naturally, such correspondence put a burden on the sender to understand and realize that the privacy of these communications is suspect due to the terms of the confidentiality agreement and terms of electronic communications that they have agreed to; however, there is a small degree of moral burden on the part of the employer as well to actively seek to purposefully disregard such personal conversations as long as they do not represent a breach of contract or any form or manifestation of illegality (Detterman 980). Yet, the issue with such an approach hinges upon the fact that the employer will not be painstakingly reading each and every correspondence generated by the employee. Unfortunately, privacy laws or ethical considerations cannot guarantee that this will not be the case. Although this essay has spoken primarily about the privacy concerns that employees might experience as a function of having their employer read their correspondence, it would be remiss of this author to discuss this situation fully without offering advice for a simple way in which the employee can work to avert many of the negative repercussions of over-aggressive privacy policy (Evans 1116). Once the employee signs on the dotted line and accepts the fact that the employer can monitor their activity and communication via the devices that are utilized within the workplace setting, virtually no privacy whatsoever exists within these mediums. As such, it is the strong recommendation of this author that the employee be ever-mindful of the lack of rights they possess while utilizing the employer’s equipment and wait to conduct any and all correspondence and communication they would not want read by another employee until after work hours and via a different means of transmission (Moore 700). Furthermore, the laws that define the rights of the employer with regards to eavesdropping and/or surveilling the activities of their employees do not merely relate to sending or receiving messages via the work channels of communication (Chigana et al 33). Rather, some states have defined employment law so broadly that it can be determined to mean any form of communication that takes place while using company equipment, or even bandwidth. For instance, if an employee were to compose a message on their own computer while using the company’s network, the message and contents could be lawfully interpreted to be the property of and under the purview of the company/firm in question (Bagdanskis 699). Likewise, an employee using their work computer in order to access a personal email account could conceivably have their password and logon information stored as well as individual messages that are read or sent while at the workstation recorded. Again, although this seems far out of the bounds of normal work-level electronic communication surveillance, it is neither illegal nor improbably judging by prior precedence that has been affected with regards to employee privacy and employment law/confidentiality. The way that certain states have defined confidentiality has done a disservice to the expectation and application of key components of privacy (Snyder 266). In this sense, the needs of the company have been viewed as tantamount to the prior understanding of a reasonable expectation of privacy that the employee would otherwise necessarily expect. Such liberal interpretations of the law and the rights of the employer to monitor and surveil the actions of the employee should give pause with regards the ways in which they utilize electronic means of communication (Mellow 166). Furthermore, this brief analysis has thus far considered the overall effect that computer usage has on the way in which a firm is able to monitor and surveil its employee’s communication; however, with the advent of smartphones and tablets, this is merely one of many ways in which such an affect can be accomplished. Moreover, as more and more firms are giving employees smartphones and tablets as a way to keep in constant contact with the office even while traveling, the temptation to use these supposed “freebies” as a means of personal communication is strong; however, the very same rules that apply to the use of the company laptop or desktop computer that have thus far been referenced equally apply to the use of tablets, smartphones, or any other type of electronic form of communication device (Dammeier 298). This paper has sought to engage the reader with the many different forms of electronic surveillance that a firm/organization can legally employ as a meant to monitor the behavior of their employees. As has been noted, the level to which the employer has rights over the communication and electronic transmission of its employees far outweighs the rights to privacy that the employee might experience in any given situation. As such, from the discussions that have brought to the view of the reader regarding the supreme lack of privacy that exists with relation to any form of communication that the employee might make whilst using any network, or physical hardware of the firm/organization, it is incumbent upon the employee to be ever mindful of their own personal privacy. Moreover, from the evidence that has been presented with respect to privacy in the workplace, it is painfully clear that the direction in which interpretation of privacy law and its application is concerned strongly and resoundingly favors the employer. Works Cited Bagdanskis, Tomas, and Paulius Sartatavicius. "Workplace Privacy: Different Views And Arising Issues." Jurisprudencija 19.2 (2012): 697-713. Academic Search Complete. Web. 27 Nov. 2012. Chigona, W., B. Robertson, and L. Mimbi. "Synchronised Smart Phones: The Collision Of Personal Privacy And Organisational Data Security." South African Journal Of Business Management 43.2 (2012): 31-40. Business Source Premier. Web. 27 Nov. 2012. Dammeier, Dieter C. "Fading Privacy Rights Of Public Employees." Harvard Law & Policy Review 6.2 (2012): 297-312. Academic Search Complete. Web. 27 Nov. 2012. Evans, Laura. "Monitoring Technology In The American Workplace: Would Adopting English Privacy Standards Better Balance Employee Privacy And Productivity?." California Law Review 95.4 (2007): 1115-1149. Business Source Premier. Web. 27 Nov. 2012. Determann, Lothar, and Robert Sprague. "Intrusive Monitoring: Employee Privacy Expectations Are Reasonable In Europe, Destroyed In The United States." Berkeley Technology Law Journal 26.2 (2011): 979-1036. Academic Search Complete. Web. 27 Nov. 2012. Mello, Jeffrey A. "Social Media, Employee Privacy And Concerted Activity: Brave New World Or Big Brother?." Labor Law Journal 63.3 (2012): 165-173. Business Source Premier. Web. 27 Nov. 2012. Moore, Adam. "Employee Monitoring And Computer Technology: Evaluative Surveillance V. Privacy." Business Ethics Quarterly 10.3 (2000): 697-709. Business Source Premier. Web. 27 Nov. 2012. Snyder, Jason L. "E-MAIL PRIVACY IN THE WORKPLACE: A Boundary Regulation Perspective." Journal Of Business Communication 47.3 (2010): 266-294. Business Source Premier. Web. 27 Nov. 2012. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Employee privacy on computers in the workplace Research Paper”, n.d.)
Employee privacy on computers in the workplace Research Paper. Retrieved from https://studentshare.org/business/1463392-employee-privacy-on-computers-in-the-workplace
(Employee Privacy on Computers in the Workplace Research Paper)
Employee Privacy on Computers in the Workplace Research Paper. https://studentshare.org/business/1463392-employee-privacy-on-computers-in-the-workplace.
“Employee Privacy on Computers in the Workplace Research Paper”, n.d. https://studentshare.org/business/1463392-employee-privacy-on-computers-in-the-workplace.
  • Cited: 0 times

CHECK THESE SAMPLES OF Fading Privacy Rights Of Public Employees

Taylors Law and the Right to Strike by Public Employees

This paper's primary focus would lie in explaining the right to strike by public employees, as it is one practice which is prohibited by the law.... hellip; The public employees' Fair Employment Act, stated under the Civil Service Law 200-214, commonly referred to as the Taylor Law is a statute governing the labor relationships that cover public employees in the state of New York.... Taylor Law strictly prohibits strikes by public employees and establishes a state agency known as the Public Employment Relations Board (PERB) that is responsible for administering the law (PERB 2013)....
12 Pages (3000 words) Research Paper

Employee Privacy Rights at Work

hellip; The issues of the rights of employees to privacy versus the right of the company to protect their interests in preserving company security and monitoring productivity has created a contentious debate.... The rights of the company have been upheld time and again.... As upheld in the Electronic Communications Privacy Act, 18 USCA 2510 of 1986 (ECPA), employers, as owners of the premises and communications equipment, have many rights of which employees may be unaware....
7 Pages (1750 words) Essay

Communication Technologies

In the first part of the paper some excerpts from US Federal Law Codex are given to point out that although the law prohibits unannounced monitoring of employees, it leaves plenty of space and mist to win the case if a disturbed employee brings up a suit against monitoring employer.... It is argued that a widespread use of monitoring techniques that intrude into employees' private life indicates the low level of social responsibility among employers, which in fact damages their own business....
14 Pages (3500 words) Essay

Privacy and Employer Access to Employee Social Media Account

So, the question is not on accessing the employee's information, but the protection of the rights of the people as well as the company's data.... So, the question is not on accessing the employee's information, but the protection of the rights of the people as well as the company's data.... nbsp;… Good policy can reduce the tendency of employees to share information about the company.... onsequently, the challenge of using social media on and off the job has led to the challenge facing employees which led to the demand by some employers for the employees to give their passwords or usernames for their personal account (Poerio and Bain)....
2 Pages (500 words) Research Paper

The Central Motive for Creating the US Constitution

This republican theory helped in ensuring that individual rights were safeguarded from each and every type of government abuse, but lacked in ensuring or guaranteeing the same for officials or public employees working in the law enforcement workplace.... On a simple note, constitutional rights refer to the freedoms guaranteed by the constitution of the country to its citizens.... On the broader context, these freedoms encompass political, civil as well as personal rights entitled to a...
18 Pages (4500 words) Essay

Surveillance Technology: Paradox in Private Security

Surveillance technique may contain qualities that potentially violate the core principals of privacy rights, but in return, there is an assumption that it has the ability to build national security assurance.... In these circumstances, those in authority have measures to ensure that workers are following the set regulation of the organization, to the extent of listening to conversations shared by employees.... Although the benefits of surveillance technology may have a considerable impact on peoples' living conditions, its basic technique threatens the foundation of individual rights to privacy, possibly outweighing public welfare for private privileges....
8 Pages (2000 words) Research Paper

The Movements of Employees at Work Abstract

The paper “The Movements of employees at Work Abstract” will look at the employee monitoring, which is a moral dilemma.... hellip; The author states that employee monitoring can be defined as the act of surveillance and monitoring employees' actions during stipulated working hours by use of employer equipment.... It entails the use of computers to record, evaluate and observe an employees' use of a computer, plus communications like websites....
6 Pages (1500 words) Essay

Australian Social Policy- Increased Employee Involvement in Decision-Making

A significant debate regarding changes in paid work in Australia and the significance of employees' participation has been in the media for relatively a longer time; employee involvement and workplace rights in attaining these changes.... A significant debate regarding changes in paid work in Australia and the significance of employees' participation has been in the media for relatively a longer time; employee involvement and workplace rights in attaining these changes (Lansbury & Davis 1992, p....
9 Pages (2250 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us