Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Employee Electronic Privacy - Essay Example

Comments (0) Cite this document
As employers install and update more sophisticated ways of monitoring employee-use of the internet and email, workers are also questioning the necessity and legality of this practice. To cite an example, an employee caught looking for another position using the company’s…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.2% of users find it useful
Employee Electronic Privacy
Read TextPreview

Extract of sample "Employee Electronic Privacy"

Download file to see previous pages The employee eventually resigned from her current position and immediately began to work at the new position. The debate rages on whether which side is correct. But this paper would establish that in this scenario, it is the employer who stands to lose more by their workers’ access to the internet, and hence, are justified in monitoring internet access in the workplace.
For one, with each access to the internet the chances of electronic hackers gaining access to the corporations’ intranet and confidential files are increased if not monitored. We turn to Chang, J. (April 9, 2004)1 who stated:
…..Each year hackers steal millions of dollars worth of proprietary information from companies and organizations. A survey by the Computer Security Institute indicated that for the year 2002, theft of proprietary information by hackers cost companies and organizations over $70 million.1 The cost to insure against these hackers is staggering—the market for hacker insurance is expected to increase from $100 million in 2003 to $900 million by 2005.2 In addition, hackers can
cause severe damage to computer systems by altering or deleting data files and disabling software. In addition to proprietary information, hackers also steal personal information from these organizations and corporations including their customers’ credit card numbers, account numbers, and social security numbers. For example, in 2000, hackers stole 55,000 credit card numbers from and 300,000 credit card numbers from The theft of personal information such as credit card numbers raises serious concerns relating to both identity theft and privacy.
Hence, in an attempt to forestall such staggering losses, the employers’ reaction was naturally to check the culprit, and that is the unprecedented access to online materials. The cost of installing monitoring devices is ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Employee Electronic Privacy Essay Example | Topics and Well Written Essays - 1500 words”, n.d.)
Employee Electronic Privacy Essay Example | Topics and Well Written Essays - 1500 words. Retrieved from
(Employee Electronic Privacy Essay Example | Topics and Well Written Essays - 1500 Words)
Employee Electronic Privacy Essay Example | Topics and Well Written Essays - 1500 Words.
“Employee Electronic Privacy Essay Example | Topics and Well Written Essays - 1500 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Employee Electronic Privacy

Electronic Communications Privacy Act - Advantages from an Employer and Employee Perspective

...for the present situation, the Electronic Communications Privacy Act (ECPA) of 1986 and its benefits on both the employee and the employer are discussed. Background The ECPA is an up gradation of a previous act to control crime through monitoring activities. It is an evolution of the Omnibus Crime Control and Safe Streets Act of 1968. The quick growth of the electronics industry meant that there was also a rapid increase in the modes of communication. While the earlier Act of 1968 catered to telephone and other modes of traditional communication, the newer channels of communication were not covered. Moreover, despite the intense debate surrounding the ECPA act on...
5 Pages(1250 words)Research Paper

Electronic Monitoring and Employee Productivity

...such as trade secrets or restricted places, productivity as in employees have to be at the right place at the right time and doing the right things at the right time, reputation as employers do not want company information such as logos to be found at the wrong place that may cause them embarrassment and lastly impact on third parties such that the employer is mandated to do monitor them so as to protect the safety and health of their clients (Kaupins & Minch, 2005, pp1-10). On the other hand there are key ethical considerations that limit employee electronic monitoring. The first one is privacy such that employers need to balance between employee...
4 Pages(1000 words)Assignment

Employee Privacy Report

...? ID Lecturer Employee Privacy Report At my workplace, the e-mail use, the Internet use and the privacy policies are in accordance with the laws that govern the business organization. This means that each and every aspect of the technological usage has been covered at length. These privacy policies cover the aspects which are deemed as important for understanding how the organization looks up to the rules and measures in place. These tell the employees exactly what it wants of them and how much liberty the organization is ready to give in return. Then again, this is a significant undertaking that takes place within an organization and my workplace has...
4 Pages(1000 words)Essay

Employee Privacy Rights at Work environment. How that balance may be achieved is the focus of this research. As upheld in the Electronic Communications Privacy Act, 18 USCA 2510 of 1986 (ECPA), employers, as owners of the premises and communications equipment, have many rights of which employees may be unaware. According to Volkert (2005) employers may "search company-owned computers, monitor Internet use, use video surveillance and listen to voice mail" (p. 1). As early as 2001 Bupp found when reviewing an American Management Association survey report that as of 2001 73.5% of all major companies in the U.S. "record and review employee communications and activities on the job, including their...
6 Pages(1500 words)Essay

Supporting viewpoint of employee privacy rights in the workplace

...There are many examples of privacy rights violations in the workplace. Electronic surveillance is widely used in Internet surfing and electronic mails (Burnette and Rickman, 2004; Twarog, 2005). Data are collected on employee's drug and alcohol use, sexual preferences, and medical history (Quann, 1992). Employers argue that they monitor electronic communications to prevent proprietary information from leaking to unauthorized parties (Burnette and Rickman, 2004; Twarog, 2005). For example, hospitals monitor electronic communications to protect their legal liability regarding patient confidentiality in accordance with the Health Insurance...
3 Pages(750 words)Essay

Employee Privacy in the Workplace

...employer equipment/property (Raposa and Mujtaba, 2003). Increasing numbers of employers opt to use various devices to monitor activities of their employees during working hours. Keeping record of computer activities, excessive use of video and sound recording equipment, electronic eavesdropping and checking databases filled with personal information makes a number of employees reasonably feel that their right for privacy is brutally ignored by their employers. Although the employer’s reasons for monitoring his employees are understandable, the issue of protecting employeesprivacy in the workplace should also receive...
5 Pages(1250 words)Essay

Summary Report - Electronic Privacy

...YourFirst YourLast Electronic Privacy: "Big Brother Big Business" While some of us take our privacy seriously apparently, David takes us on a tour that reveals that maybe we are not as private as we would want to think we are. Companies are using advanced technology to monitor our every move, the driving habits are being recorded by travel companies, the phone records are being monitored, browser history is being stored and the government uses as evidence in a court of law. The documentary shows how biometric technology is being used by the FBI, the border patrol and even in schools after the companies collect the data about the people the government is then using it against the people....
1 Pages(250 words)Essay

Electronic Communications Privacy Act

...Electronic Communications Privacy Act Electronic Communications Privacy Act Introduction The cyber space is growing dynamically andat a rapid pace, which has resulted in more features, channels of communication and means of sharing resources within the cyberspace. Nonetheless, the Electronic Communications Privacy Act (ECPA) has been slow in capturing the dynamic changes that are occurring (Electronic Privacy Information Center, 2012). Accordingly, there is no legal framework to guide the use of features such as cloud computing and various forms of virtual computing. The above recent developments have altered the cyber space in various ways, which require a legal framework to manage the workings of the new features created... then, it was...
5 Pages(1250 words)Essay

Employee Privacy

...Introduction Today, in the age of social media, employees and employers have greater visibility even after working hours. Employers often want to control employee relations on or off-duty. Employers have been observed to keep track of employees personal behaviors post their working hours, which reduces the privacy of employees. There are several things like drug tests and alcohol tests that are required in order to balance the working environment of an organization. However, entering an employee’s private zone after their working hours is unethical and there are several laws in place, which provides information about the grounds on which...
6 Pages(1500 words)Research Paper

Data Privacy in Electronic Health Records System

...Data Privacy in Electronic Health Records (EHR) system I chose this topic because of benefits of the EHRs to the health care fraternity and its ability to store records and retrieve information on the patient when required. Electronic Health Record system is a digital collection of patient’s health information that can be shared transversely through a network connection among different health care providers and clinicians (Fetter 408). Patient’s data like age, medical history, the medication and payment information may be stored in the system. Allergies, immunization status, and test results may also be stored in the system. Radiology images for the patient are uploaded in the system,...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Employee Electronic Privacy for FREE!

Contact Us