Free Essay

Email Etique

In:

Submitted By vlaxman2010
Words 1150
Pages 5
YES: Who's reading your office e-mail? Is that legal?
YESTERDAY, as you sat working at your desk, you checked your e-mail and spotted a note from a friend. The message was an off-color joke complete with graphic illustration. Sure, some stick-in-the-mud might find it offensive, but it was awfully funny. So, without thinking, you clicked on the forward button, typed in an e-mail address or two or three, and hit the send button. No big deal, right?
You don't give the e-mail another thought until this morning when a somber supervisor invites you to her office. She hands you a letter of reprimand along with a copy of the e-mail. She tells you that as a matter of office policy, employee e-mails are monitored. Copies are placed in your file, and, in the event it happens again, she warns that you'll receive a termination letter. It simply never occurred to you that someone might be monitoring your e-mail. What about your right to privacy?
WHAT HAPPENED TO PRIVACY?
As an employee, the idea of being monitored may trouble you. As an employer, the idea of monitoring employees may be equally distasteful. The right to privacy is so thoroughly ingrained in most of us that we take it for granted--especially in a peaceful environment when we're sitting alone, typing into a computer. We may be lulled into a false sense of isolation and freedom from observation. But even if the technology is available, aren't there simply too many e-mails and too much Internet use to review effectively? After all, the Internet is so big and so anonymous. No one can really track everybody's e-mail or Internet surfing. Besides, it's probably an invasion of privacy and illegal.

Wrong on both counts. To quote Scott McNealy, CEO of Sun Microsystems, on the issue of Internet privacy: "You have zero privacy anyway. Get over it." McNealy's rather abrupt observation and admonition are particularly true in the work environment.

The simple fact is that monitoring employee e-mail and Internet usage is legal under almost all circumstances. As a general rule, when an employee enters the workplace, an employer may monitor and record communications, including e-mail and Internet use, without any notice to the employee. In Fraser v. Nationwide Mutual Insurance Co., 352 F. 3d 107 (3rd Cir. 2003), the court specifically held that The Electronic Communications Privacy Act, 18 U.S.C.[sections]2701, didn't apply to an employer's search of e-mail stored on its own system.

But in some instances, simple facts tend to beget complicated, counterintuitive consequences. For example, an employer repeatedly assured its employees that e-mail communications would remain confidential. As it turned out, the assurance wasn't a guarantee that the employees' e-mails wouldn't be used as a basis for discharge. In Smyth v. The Pillsbury Company, 914 F. Supp. 97 (ED Pa. 1996), a supervisor e-mailed inappropriate comments to an employee at home, and the employee responded in kind. The e-mails were communicated over the company system. Regardless of the company's assurances, the employee was terminated for communicating "inappropriate and unprofessional comments" via the company system. The Court held that "once plaintiff communicated the alleged unprofessional comments to a second person over the e-mail system that was apparently utilized by the entire company, any reasonable expectation of privacy was lost."

Employee e-mail habits have developed over time, but, as the Pillsbury decision exemplifies, employers' practices also can change--sometimes quickly and unpredictably. The Pillsbury case wouldn't be the last surprise for employees. Employers can review e-mail at any time and with lightning speed. Dow Chemical took a "snapshot" of a day's worth of employee e-mails and then systematically sorted through them. Some 254 employees had saved, filed, or sent sexually related, violent, and other inappropriate e-mails. The actual participation and involvement of the employees varied considerably. Dow created a set of criteria so that discipline taken, if any, could be based on each employee's participation. The criteria included offensiveness; what the employee did with the material, such as circulating the materials within Dow; and the frequency of the conduct. Dow discharged 20 employees and disciplined others. The court, although recognizing that Dow was probably employing a union-busting tactic, upheld the company's review and use of its employees' e-mail (Dow Chemical v. Local No. 564, Operating Engineers, 246 F. Supp. 2d 602 (SD Texas, 2002).

IS MONITORING E-MAIL AND INTERNET USE NECESSARY?

Despite the near cultural aversion to intruding on communications, growing numbers of companies and managers record, review, and monitor telephone and computer activities of their employees. According to the American Management Association (AMA) 2005 Electronic Monitoring & Surveillance Survey, 76% of employers monitor website connections, "26% have fired workers for misusing the Internet," and "another 25% have terminated employees for e-mail misuse." Inexpensive software packages facilitate these decisions, and the overriding reason is compelling--it has become a business necessity.
An inescapable consequence of employee e-mail and Internet use is that the employer is responsible for illegal, discriminatory, or offensive communications that are transmitted over the system or viewed by others from a company computer screen. Sexually explicit, graphically violent, or racially inappropriate websites open to view by co-workers may be used to support claims of discriminatory behavior or a hostile work environment. E-mails containing such inappropriate materials that are circulated around the office or forwarded to others have the same effect.

But so there's no misunderstanding, employers and managers can get into just as much trouble with their email as employees. E-mails sent by managers can be used by employees to prove claims of corporate misconduct. For example, the characterization of an employee as "ready for the bone yard" may be evidence of age discrimination. The simple truth is that e-mails containing potentially libelous or defamatory content should not be sent or forwarded--even internally. Not only can they easily get away from managers with a click of a button, but they also may become-in a stored capacity on the server or archive--the target of discovery in litigation.

Because e-mails can seem so informal, managers and employees are more likely to say things in them they would never put in a letter. Unlike letters, e-mails can be forwarded over and over to thousands of people with the touch of a button. Impulsive and thoughtless comments can travel the world over. Often overlooked is the liability with regard to foreign laws. Because e-mails can be transmitted anywhere and may then be forwarded practically ad infinitum, an employer may be responsible for content based on the laws of the country in which the e-mail ultimately arrives. Electronic communications originating in the company office may have far-ranging legal consequences.

Similar Documents

Free Essay

You Decide 3

...You Decide Scenario: Week 3 Detecting and preventing insider threats is its own discipline, with its own dynamics. If you put these countermeasures in place, you can reduce the threat dramatically. First, you can use an IP packet-filtering router. This type of router permits or denies the packet to either enter or leave the network through the interface on the basis of the protocol, IP address, and the port number. The protocol may be TCP, UDP, HTTP, SMTP, or FTP. The IP address under consideration would be both the source and the destination addresses of the nodes. The port numbers would correspond to the well-know port numbers (Vacca, 2009). Packet filtering lets you control data transfer based on the address the data is, the address the data is going to, and the session and application protocols being used to transfer data. The main advantage of packet filtering is leverage. It allows you to provide, in a single place, particular protections for an entire network. Consider the Telnet service. If you disallow Telnet by turning off the Telnet server on all your hosts, you still have to worry about someone in your organization installing a new machine (or reinstalling an old one) with the Telnet server turned on. On the other hand if Telnet is not allowed by your filtering router, such a new machine would be protected right from the start, regardless of whether or not its Telnet server was actually running. Another advantage of a packet filtering router is that...

Words: 622 - Pages: 3

Free Essay

Introducción a Xhtml

...INTRODUCCIÓN A XHTML JAVIER EGUILUZ LIBROSWEB Introducción a XHTML Javier Eguiluz Fecha publicación: 14/03/2013 Este libro fue publicado con la aplicación easybook (http://easybook-project.org) , una herramienta de software libre para la publicación de libros digitales. Licencia Este libro se publica bajo la licencia Creative Commons Reconocimiento - No Comercial - Compartir Igual 3.0, cuyos detalles puedes consultar en http://creativecommons.org/licenses/by-nc-sa/3.0/es/ Puedes copiar, distribuir y comunicar públicamente la obra, incluso transformándola, siempre que cumplas todas las condiciones siguientes: • Reconocimiento: debes reconocer siempre la autoría de la obra original, indicando tanto el nombre del autor (Javier Eguiluz) como el nombre del sitio donde se publicó originalmente (librosweb.es). Este reconocimiento no debe hacerse de una manera que sugiera que el autor o el sitio apoyan el uso que haces de su obra. • No comercial: no puedes utilizar esta obra con fines comerciales de ningún tipo. Entre otros, no puedes vender esta obra bajo ningún concepto y tampoco puedes publicar estos contenidos en sitios web que incluyan publicidad de cualquier tipo. • Compartir igual: si alteras o transformas esta obra o si realizas una obra derivada, debes compartir tu trabajo obligatoriamente bajo esta misma licencia. Índice de contenidos Capítulo 1. Introducción . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.1. ¿Qué es HTML? . . ...

Words: 24973 - Pages: 100