Free

Email privacy - Research Paper Example

Comments (0) Cite this document
Summary
The employer can monitor telephone calls, computer terminals, through electronic and voice mail, and the Internet. Like any other form of privacy invasion, there are some…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.2% of users find it useful
Email privacy
Read TextPreview

Extract of sample "Email privacy"

Email Privacy Currently, it is possible for an employer to monitor all the activities that occur in an organization. The employer can monitor telephone calls, computer terminals, through electronic and voice mail, and the Internet. Like any other form of privacy invasion, there are some advantages and disadvantages of employer monitoring.
A responsible employer monitors internet use by the workforce. In the main, this ensures that employees do not access job unrelated/inappropriate websites or play computer games (Philips 335). Employers are always terrified of lower productivity through email use, and this furthers their curiousity to scrutinize the actions of employees during work time, especially through the email.
Most employees exploit company resources to conduct private and unrelated work like communicating with friends and family. Employers are also at times afraid of employees using email to send their competitor secrets and changes that occur in their organization, because this gives the other firm and upper hand in the market. Every email message, including attachment sent or received on the company server are the property of the company.
Even so, employees believe that it is not ethical for employers to go through or have access to their email conversation as it breaches their privacy (Guerin 47). It is common for employees to browse and handle their personal emails in the company computer. In addition, for employers to monitor their email, this will mean going through both the company related work and employees personal and private conversation. Today there are laws that protect the privacy of an employee in the workplace and employers need to adhere to this, although this does not apply in many organizations, mostly privately owned. When an employer goes through an employees email without his or consent, they might gather some personal information such as medical records and private conversations of the employee. In essence, this calls for the need of an employer to obtain permission from the employee before he/she accesses the employees email account.

References
Guerin, Lisa. Smart Policies for Workplace Technologies: Email, Blogs, Cell Phones & More.
New York: Nolo. 2013.
Philips, Harry and Bostian Patricia. The Purposeful Argument: A Practical Guide, Brief. New
York: Cengage Learning.2011. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Email privacy Research Paper Example | Topics and Well Written Essays - 250 words”, n.d.)
Email privacy Research Paper Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1668374-email-privacy
(Email Privacy Research Paper Example | Topics and Well Written Essays - 250 Words)
Email Privacy Research Paper Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1668374-email-privacy.
“Email Privacy Research Paper Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1668374-email-privacy.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Email privacy

Email and Internet use and Privacy Policies

...?EMAIL AND INTERNET USE AND PRIVACY POLICIES Email and Internet use and Privacy Policies Affiliation E-mail use, Internet use, andprivacy policies: In this age of technology it is an admitted fact that the basic purpose of using Internet, email and voice mail at corporation is for carrying out business activities. Additionally, a number of job related tasks at the Corporation need the way in to the Internet and the utilization of some particular software besides the Microsoft Office group of software. Moreover, the use of internet in working hours is allowed to complete business tasks. However, the use of internet brings the likelihood of contravenes to...
5 Pages(1250 words)Essay

Email and Privacy and how Cyber Law Protects User Rights

...such a violation was United States v. Warshak (Trout, 2010). Warshak was enjoying the reasonable expectation of privacy of his e-mails from his Internet Service Provider, Nu Vox until government agents compromised his rights by ordering the ISP to preserve and issue his emails without first obtaining a warrant which was to be based on probable cause, thus in accordance to the Fourth Amendment, the government agents had violated the privacy rights of Warshak. However, the agents depended on good faith with reference to the Stored Communications Act even though this exclusionary rule was not applicable in such a case (Trout, 2010). In another case involving United States v. Bynum, Mr....
9 Pages(2250 words)Research Paper

Informational Privacy

...Informational PrivacyPrivacy refers to the sense of concern that persons have about maintaining a personal space that is devoid of interference from other individuals and organizations (Clark, 2007). It is sensible that when Justin M. Ellsworth signed-up for an email account with yahoo, he probably presumed that he was guaranteed privacy. Individuals’ email accounts represent a safe place where persons can feel free to keep their deepest emotions typed, store private documents and maintain their personal space privately. I most certainly believe that Justin’s parents had all the best intentions when they sought to challenge the privacy...
3 Pages(750 words)Essay

Email

...? Email to the American Intellectual Union The Head of American Intellectual Union Job Satisfaction The following is a report of a database of selected 30 employees who are members of the American Intellectual Union. The data looks at both the quantitative and qualitative aspects. The employees will profiled using five attributes (age, gender, position, tenure and department). Job satisfaction will be characterized using the four parameters: intrinsic job satisfaction, overall job satisfaction, benefits and extrinsic job satisfactions. The survey is an illustration of a mechanism that can be used in profiling employee’s whit the highest level of job satisfaction thus giving the highest possible performance boosting a...
3 Pages(750 words)Essay

EMAIL PRIVACY

...? ESSAY ON EMAIL PRIVACY By Location Introduction With advancement in technology, there is an increase in demand for computer-based communication applications. Email communication is one example of such computer-based communication platforms; others include internet and wide web programs. Currently, email dominates modern communication. In fact, the survey that was conducted by the Forrester Research Inc. shows that 98 percent of companies with over one thousand employees have internet access. All the companies with internet access use email as the main form of communication at the organization. Email is a very new concept in...
4 Pages(1000 words)Essay

Public Administration

4 Pages(1000 words)Research Paper

See email

... The role of financial market in the process of economic development: Six Asian economies The development of financial systems is often characterized by the radical development of innovative financial system that allows an efficient allocation of resources, high level of economic growth and capital productivity. In the past, the impact of market development on economic growth has always been important issue. By exploiting the existing microeconomic theory of optimal financial system, economists have been able to analyze the relationship between economic growth and financial market development. For instance, Zhang (2003) and Hicks (1969) estimation were carried out to determine the relationship between economic growth and financial...
7 Pages(1750 words)Essay

Kinship Organizations

2 Pages(500 words)Essay

Email Pragmatics

...EMAIL PRAGMATICS (SOCIAL NETWORKING AND CYBERLANGUAGE) EMAIL PRAGMATICS (SOCIAL NETWORKING AND CYBERLANGUAGE) Overview Language is an important part of humanity as it serves several purposes. In both the social and academic context, language remains an important phenomenon that cannot be disregarded if social and academic interactions can be complete (Bardovi-Harlig, 2001). Language is also a very unique phenomenon that comes with several types and rules. Different people speak different languages and even within the same sect of people using a particular language, there are several rules that govern language usage. Because of this, language creates a learning process for itself, which cannot be...
7 Pages(1750 words)Essay

Email assignment

... Assignment Dears Ms. Lauren Alvarez, I believe we have given our best to this company as far as this year is concerned. We were able to reduce some expenses, popularize our programs, and introduce our plans. All these achievements can be attributed to your quality leadership. It is an honour to have the chance to work with you throughout this year. There are some ideas relating to the next meeting that I would like to briefly discuss with you. I noticed there is gender imbalance in the work force. The organization has much more male employees as compared to the female employees. I believe that having more female employees in the organization might bring in something new to the organization. More female employees will also mean... Assignment...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Email privacy for FREE!

Contact Us