Our website is a unique platform where students can share their papers in a matter of giving an example of the work to be done. If you find papers
matching your topic, you may use them only as an example of work. This is 100% legal. You may not submit downloaded papers as your own, that is cheating. Also you
should remember, that this work was alredy submitted once by a student who originally wrote it.
This "Email and Internet use and Privacy Policies" assignment discusses the current laws regulating employee e-mail and Internet privacy. The assignment considers why companies implement e-mail and Internet use policies and analyses assumptions for employees to make about their privacy at work…
Download full paperFile format: .doc, available for editing
Extract of sample "Email and Internet use and Privacy Policies"
Email and Internet use and Privacy Policies
E-mail use, Internet use, and privacy policies:
In this age of technology it is an admitted fact that the basic purpose of using Internet, email and voice mail at corporation is for carrying out business activities. Additionally, a number of job related tasks at the Corporation need the way in to the Internet and the utilization of some particular software besides the Microsoft Office group of software. Moreover, the use of internet in working hours is allowed to complete business tasks. However, the use of internet brings the likelihood of contravenes to the safety of secret Company details. Moreover, internet use also causes contagion to our business structure with several spyware, malwares, Trojan horses and viruses. At my job, Email is utilized for performing business activities. However, the private information of the company should not be given away from the Company, without the approval from the company management. Additionally, it is not ethical to perform private dealings using Company PC or electronic mail (Boze & Stevens, 2010; Heathfield, 2011).
Employees should keep in mind that the company keeps the record of several communications done using electronic mail or else whatever is shared on company PC. In this scenario, network administration and authorized employees have the full right to view any content in employee’s electronic mail or on employee’s PC whenever they want. Thus, people should not think that their electronic link, storage or access to be confidential if it is managed or stored at work. Furthermore, in the place of work current developments have altered the ways workers make use of the internet and electronic mail. Thus, the businesses are confining their workers’ use of Internet and email with privacy policies (Boze & Stevens, 2010; Heathfield, 2011).
What are the current laws regulating employee e-mail and Internet privacy?
A lot of businesses are using the pre-established rules those confine internet and electronic mail usage for workers. In this scenario, these businesses apply privacy rules that bound the extent of privacy workers are allowed to even as in the office. Additionally, the managers are answerable for the acts of their workers or staff. Thus, most of the businesses believe that privacy of the company should have priority over worker’s privacy at the place of work. In this scenario, businesses apply rules and laws on the internet and e-mail usage in order to defend the company beside robbery, permissible concerns, and maintain the reliability and reputation of the business (OPPapers, 2010; eNotes.com, Inc., 2011; FindLaw, 2011).
In this scenario, existing laws those are regulating workers’ internet and e-mail privacy vary from country to country. However, the prime initiative of these laws describe that boss or manager who holds the e-mail framework, internet setup or networks is perfect inside their privileges to check the access to internet or e-mail in addition to practice by the staff. In this scenario, the electronic mails are managed through the Electronic Communications Privacy Act (ECPA) and the Patriot Act. So over internet the ECPA secures together digital communications as well as electronic mail. Furthermore, the law prohibits their stoppage and detection by 3rd party. In this regard, ECPA outlined a number of distinct crimes: (OPPapers, 2010; eNotes.com, Inc., 2011; FindLaw, 2011)
Accessing and trying to interrupt transmission
Open connection to the transmission without approval
Stopping the transmission for the reason of hindering illegal analysis
Capturing communication for business operations
Making use of electronic, automatic, or else extra equipment to cut off transmission
What assumptions might employees make about their privacy at work? How do these policies affect employee privacy at work?
The biggest concern for the majority owners or managers is legal responsibility. However, nuisance proceedings of office are common, and one useful way to secure a business from being accused is to observe and prevent several nuisances in the initial stage. In this scenario, to deal with this situation, managers execute application suite which seeks out nasty expressions and greatly emphasizes challenging e-mails and other communication (FindLaw, 2011; Herold, 2009).
According to Freedom of Information Act (FOIA), and people proceedings act the people are able to have access to approximately everything such as worker records or whatsoever he/she sends. Generally employees make the following assumptions about their privacy at work: (FindLaw, 2011; Herold, 2009)
Employees generally suppose that the business has established various measures to maintain the privacy policies have been placed on the websites related to their business.
Employees think that retailers those have been subcontracted by the company for the purpose of management otherwise dispensation have protection prepared to secure the workplace.
Employees as well think that everybody within the company recognizes about their website privacy procedures.
Employees too suppose that each person inside the company identifies the details and information significant for the company.
Employees think that the entire storage places intended for individually restricted details are competently recognized as well as acknowledged in an effective manner.
Why do companies implement e-mail and Internet use policies?
It is true when companies start to depend upon heavily on the internet technology, it can be observed that their staff spends an increasing amount of time in viewing web links and checking e-mails to competently maintain the business working. Thus, several businesses apply rules for internet and e-mail usage believing it an effort to control diverse rising issues: (eHow, 2010)
Low Production: it was believed in 2000 that twenty five percent of staff spends a lot of time (even many hours) of their working timings on visiting diverse web pages that are not associated to their work or else to their business. Thus, by applying and imposing the usage policy of internet, a company could be able to stop workers from wasting most of their work time on disparate actions by proficiently using the internet technology (eHow, 2010).
Logical Assets Stealing: While using internet or emails if an important information is sent wrongly or intentionally to an un-official person, or in case when the devices in the workplace have been attacked by various malware, Trojan horses, viruses and worms, in this scenario, these important details along with the sensitive information is able be pilfered and used in a wrong way. Thus, by applying an e-mail and Internet usage policy, the businesses could be able to secure its precious electronic resources and devices (eHow, 2010).
Safety of Physical Resources: In any workplace, a virus attack on single PC can stop the functionality of a whole network infrastructure for a long time. So by applying an internet usage policy, business could be able to secure their systems from virus attacks that stop the functionality of resources (eHow, 2010).
Management of Internet Expenses: All the departments of a business require sending and receiving large volumes of data by using internet technology during working timings. Thus, by stopping workers from spending time on other activities, a company could be able to assist in managing the charges of using internet link. But with the implementation of internet usage policy, all the data and information sent out will definitely be correct, perfect and business related (eHow, 2010).
References
Boze, B., & Stevens, S. (2010, June 10). Internet, E-Mail, And Privacy Policies. Retrieved March 19, 2011, from http://www.oppapers.com/essays/Internet-E-Mail-And-Privacy-Policies/355475
eHow. (2010, July 12). Why Do Companies Implement Email & Internet Use Policies? Retrieved March 18, 2011, from http://www.ehow.com/about_6725819_do-email-internet-use-policies_.html
eNotes.com, Inc. (2011). Internet Privacy. Retrieved March 17, 2011, from http://www.enotes.com/everyday-law-encyclopedia/internet-privacy
FindLaw. (2011). Your Email Isn't Private. Retrieved March 18, 2011, from http://public.findlaw.com/internet/email-privacy.html
Heathfield, S. M. (2011). Internet and Email Policy. Retrieved March 19, 2011, from About.com: http://humanresources.about.com/od/policiesandsamples1/a/email_policy.htm
Herold, R. (2009, July 27). 5 Dumb and Dangerous Privacy Assumptions. Retrieved March 18, 2011, from http://information-security-resources.com/2009/07/27/5-dumb-and-dangerous-privacy-assumptions/
OPPapers. (2010, April 26). Employee Privacy Report. Retrieved March 18, 2011, from http://www.oppapers.com/essays/Employee-Privacy-Report/507219
Read
More
Share:
sponsored ads
Save Your Time for More Important Things
Let us write or edit the assignment on your topic
"Email and Internet use and Privacy Policies"
with a personal 20% discount.