StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Email privacy - Research Paper Example

Cite this document
Summary
The employer can monitor telephone calls, computer terminals, through electronic and voice mail, and the Internet. Like any other form of privacy invasion, there are some…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.5% of users find it useful
Email privacy
Read Text Preview

Extract of sample "Email privacy"

Email Privacy Currently, it is possible for an employer to monitor all the activities that occur in an organization. The employer can monitor telephone calls, computer terminals, through electronic and voice mail, and the Internet. Like any other form of privacy invasion, there are some advantages and disadvantages of employer monitoring.A responsible employer monitors internet use by the workforce. In the main, this ensures that employees do not access job unrelated/inappropriate websites or play computer games (Philips 335).

Employers are always terrified of lower productivity through email use, and this furthers their curiousity to scrutinize the actions of employees during work time, especially through the email. Most employees exploit company resources to conduct private and unrelated work like communicating with friends and family. Employers are also at times afraid of employees using email to send their competitor secrets and changes that occur in their organization, because this gives the other firm and upper hand in the market.

Every email message, including attachment sent or received on the company server are the property of the company.Even so, employees believe that it is not ethical for employers to go through or have access to their email conversation as it breaches their privacy (Guerin 47). It is common for employees to browse and handle their personal emails in the company computer. In addition, for employers to monitor their email, this will mean going through both the company related work and employees personal and private conversation.

Today there are laws that protect the privacy of an employee in the workplace and employers need to adhere to this, although this does not apply in many organizations, mostly privately owned. When an employer goes through an employees email without his or consent, they might gather some personal information such as medical records and private conversations of the employee. In essence, this calls for the need of an employer to obtain permission from the employee before he/she accesses the employees email account.

ReferencesGuerin, Lisa. Smart Policies for Workplace Technologies: Email, Blogs, Cell Phones & More. New York: Nolo. 2013.Philips, Harry and Bostian Patricia. The Purposeful Argument: A Practical Guide, Brief. New York: Cengage Learning.2011.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Email privacy Research Paper Example | Topics and Well Written Essays - 250 words”, n.d.)
Email privacy Research Paper Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1668374-email-privacy
(Email Privacy Research Paper Example | Topics and Well Written Essays - 250 Words)
Email Privacy Research Paper Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1668374-email-privacy.
“Email Privacy Research Paper Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1668374-email-privacy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Email privacy

Electronic Communications Privacy Act: Advantages from an Employer and Employee Perspective

Therefore, in the below sections, the various aspects of the act responsible for the present situation, the Electronic Communications privacy Act (ECPA) of 1986 and its benefits on both the employee and the employer are discussed.... Moreover, despite the intense debate surrounding the ECPA act on privacy, one of the main clauses of the act has to do with restricting third parties from intercepting communication.... Firstly, the ECPA was upgraded mainly due to the increase in the modes of electronic communication, especially information transfer through email and more recently social networking sites such as Facebook, etc....
4 Pages (1000 words) Research Paper

Informational Privacy

The email privacy agreements set by Yahoo do not concur with the moral appropriateness of issuing the password to his parents as a result of differentiating right from wrong and for the benefit of goodness.... The matter of privacy cannot be merely waived away since the decision to give out such information is capable of having severe consequences for everyone's email privacy.... In the paper “Informational privacy” the author analyzes the issue of privacy....
3 Pages (750 words) Essay

Information privacy

Although Yahoo lost the battle in court, there is nothing in the ruling that would compel Yahoo to change their ruling pertaining to email privacy of the deceased.... For the most part, the internet has offered people unbridled privacy when it comes to person to person or personal communication.... That was the privacy assurance given by email companies such as Gmail, Hotmail, and Yahoo.... However, of the 3 top email providers in the country, only Yahoo ended up having their privacy policy being challenged the American court of law....
3 Pages (750 words) Coursework

Privacy in Cyber Space

Despite the many benefits of using the internet… ritical issues such as Censorship, Content Filtering, Anonymity and privacy in Cyberspace are posing a constant challenge to everyone including individuals as well as businesses & corporate sector.... The use of basic services such as email, chat and web-surfing is now a part of our daily routine and we normally take them as very normal to our day to day chores.... Where many of its services have benefited us in numerous ways, the email has had a significant character, besides other uses, in the commerce and trade sector....
4 Pages (1000 words) Essay

Email Policy Issues

immers, C A (2002), Aligning internet use with business priorities, Communications of the ACM, 45(1), 71-74,2002Agarwal,R and Rodhain, F (2002), Mine or Ours: email privacy Expectations, Employee Attitudes, and Perceived Work Environment Characteristics, 35th Annual Hawaii International Conference on System Sciences (HICSS02)-Volume 7, 195.... M/S Johnson & Dresser viewed email as a communication facility extended to its employees, as any other company, to bring in considerable flexibility and efficiency in decision-making and reduction in the turnover time of operations....
2 Pages (500 words) Essay

Email Policy at Johnson & Dresser

Johnson & dresser did very wrong thing first they encouraged their employees to use electronic mail and they didn't inform them about they email privacy policy which was set by the company.... Johnson & dresser did very wrong thing first they encouraged… They told them that the privacy of the employees is respected that was totally wrong they kept their employees in darkness and without their consent Case study Questions and Answers Is it illegal to open regular postal mail not addressed to you?...
2 Pages (500 words) Essay

Privacy Issues

While modern technology has enabled governments and private corporations to engage in activities which people may regard as extremely invasive of their privacy.... This article highlights some of the most important ways in which a person's right to privacy may be threatened through modern technology … In the globalized world, there needs to be international regulation to ensure that the right to privacy is not violated.... But looking at all this from another perspective, we can say that the advances in technology severely threaten people's right to privacy....
5 Pages (1250 words) Research Paper

Electronic Commerce and Information Security and Ethics

The paper "Electronic Commerce and Information Security and Ethics" aims to evaluate tools and strategies needed to follow in order to implement electronic and mobile commerce in business and policies and procedures that organizations should implement to protect themselves.... hellip; This essay will begin with the statement that electronic and mobile commerce which has its origin in Finland can be described in the most basic terms as any transaction that involves the transfer of rights or ownership to consumer goods and services....
8 Pages (2000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us