...Facebook: It’s about the money 1) Facebook faces controversy over the handling and usage of the extensive information it collects from its users. FB user’s biggest concerns are the privacy and user controls over the information granted to Facebook. Facebook faces the dilemma of how to gain revenues from user information without violating their privacy. The management and organization failed to consider its users privacy concern when it introduced new software that users felt to be invasive. Facebook provides a free service that users pay for, in effect, by providing details about their lives, friendships, interests and activities. Facebook, in turn, uses that information to attract advertisers, app makers and other business opportunities. Facebook occasionally isn't enforcing its own rules on data privacy. Facebook requires apps to ask permission before accessing a user's personal details. However, a user's friends aren't notified if information about them is used by a friend's app. Facebook provides people a specific social networking platform and facilitates contents sharing and communication. It targets global internet users, advertisers, and also application developers. Facebook partners with different parties in the functionality, application developing, and advertisers for enabling various features to meet users’ different social needs. To give better services to right customers, Facebook exploits and analyzes customer information, shares info with third party and...
Words: 805 - Pages: 4
...Advancements in collecting information, spending cost, and daily incoming data is ever growing. Moving forward in business needs can and will grow your company. As the world evolves in many aspects of life, the needs of a company’s evolution are also a part of those changes. We once rode in horse and buggies and using that horsepower, developed into a much faster more efficient way of travel. Stepping into the technological world of business will also create that for your work environment. The components of the system that you recommend including input devices, output devices, and storage. There are multiple components to a system that allows you to get the best use of your computer. Common daily uses of mail, iCal and contacts are interchangeable between your Mac and PC. The compatibility of the Mac allows you to open most files from software that a PC uses. There are a number of input devices that can be useful to enhance your technology. The use of trackballs, multiple mouse options to suit the needs of the user, and scanners that will allow you to digitally store forms and paperwork. Sending these to different departments for their use decreases the need for paper and reduces storage room for paper files. Planning for the storage of these files is important. A structure for backing up information or data is a must and can benefit for a quick reference no matter the date of the file. Organizing the process is critical at the start of the implementation. Having...
Words: 2426 - Pages: 10
...also affect BUG. The six different issues will reveal several torts violated and damages that may be awarded from BUG. Introduction The purpose of this paper is to explain specific, hypothetical scenarios dealing with several legal issues. Bug Inc. electronic products are assembled in foreign countries, currently the products are only distributed in U.S. mainly for the use in surveillance. BUG Inc. is planning to expand the electronic device distribution to international markets. Team C has provided detailed answers and feedback to the six scenarios and different types of legal protections BUG must have for its intellectual property, employment laws, international laws, imprisonment rights, internet law, responsibilities, and manufacturing problems associated with the company’s business dealing in domestic and international courts. These protections are elemental strategic plans allowing the organization to minimize any risks in the international distribution. The Trade Secrets Act has been adopted by many states to protect company’s trade secrets or intellectual property. BUG’s company as designer and manufacturer of electronic devices and own software is protected under the law. However, “severe precautions are necessary to avoid misuse of a trade secret crime. In addition to state law, the Economic Espionage was created to address the ease of stealing trade secrets through computer espionage and internet sources (Cheeseman, 2007). On the other hand, while the product...
Words: 1980 - Pages: 8
...Internet Addiction in the Workplace Bibliography References American Management Association. (2005). 2005 Electronic monitoring and surveillance survey: Many companies monitoring, recording, videotaping and firing employees, 2005 AMA survey, summary of key findings. Retrieved from: http://www.amanet.org/press/amanews/ems05.htm American Psychiatric Association (2007, June 26). American Psychiatric Association Considers ‘Video Game Addiction’. American Psychiatric Association. (2000). Diagnostic and statistical manual of mental disorders (Revised 4th ed.). Washington, DC: Author. American Psychiatric Association. (1994). Diagnostic and statistical manual of mental disorders (4th ed.). Washington, DC: Author. Conlin, M. (1997). Workers, surf at your own risk. Business Week Online. Retrieved from: www.businessweek.com/2000/00_24/b3685257.htm Cooper, A., Safir, M., & Rosenmann, A. (2006). Workplace Worries: A Preliminary Look at Online Sexual Activities at the Office—Emerging Issues for Clinicians and Employers. CyberPsychology & Behavior, 9(1), 22-29. doi:10.1089/cpb.2006.9.22 David, John. (2002). Policy enforcement in the workplace. Computers & Security. 21(6), 506-513. doi:10.1016/S0167-4048(02)01006-43 De Lara, P. Z. M., Tacoronte, D.V., & Ding, J. T. (2006). Do current anti-cyberloafing disciplinary practices have a replica in research findings?: A study of the effects of coercive strategies on workplace internet misuse. Internet Research. 16(4), 450-467...
Words: 493 - Pages: 2
...CHAPTER 1 “LEGAL FOUNDATIONS” Administrative law is the body of law that governs the activities of administrative agencies of government. Clean hands doctrine a rule of law that a person coming to court with a lawsuit or petition for a court order must be free from unfair conduct (have "clean hands" or not have done anything wrong) in regard to the subject matter of his/her claim. Common law is based on precedent (legal principles developed in earlier case law) instead of statutory laws. It is the traditional law of an area or region created by judges when deciding individual disputes or cases. Constitutional law – a body of law dealing with the distribution and exercise of government power. Criminal Law versus Civil Law – Civil * between you and another citizen (no government involved); * disagreements between citizens were no crime has been committed (only e.g. injury); * designed to compensate parties (including businesses) for losses as a result of another conduct ; * e.g. speeding and parking violations; * don’t result in loss of freedom, though they can result in loss of privileges or fines. Criminal * between you and the government/law; * are a protection of society; * Congress and House of Representatives are involved; * When the individuals break the laws/are against the government; * actions that have been declared illegal; * they are prosecuted by the state (city, state or country); * normally punished with...
Words: 6978 - Pages: 28
...the Supreme Court has interpreted the First, Fourth, Fifth, and Ninth Amendments as creating certain privacy rights that cannot be violated by the government. Many employees may claim that electronic monitoring amounts to “intrusion” which is a variation on the tort of invasion of privacy (Halbert & Ingulli, 2009). “Intrusion involves invading another person’s solitude in a manner considered highly offensive— unauthorized prying into a personal bank account, or a landlord bugging the wall of his ten- ants’ bedroom, for example. Most courts consider two main factors: (1) the obnoxiousness of the means used to intrude; that is, whether it is a deviation from the normal, accepted means of discovering the relevant information; and (2) the reasons for intruding” (Halbert & Ingulli, 2009 p. 74). 1. Explain where an employee can reasonably expect to have privacy in the workplace. The increased use of technology in the workplace has created new concerns for both employers and employees in the area of privacy just like the privacy issue that is going on at the Fade In-Interior Auto Dealership. The reasons for the large expansion in the use of technology in the workplace are far from surprising. The use of email and the Internet can significantly reduce operating costs through automation of human tasks, facilitate communication on innumerable levels, and can clearly increase efficiency in almost all tasks. But with the many positive reasons to how technology can help a business, it also...
Words: 1313 - Pages: 6
...Electronic Surveillance of Employees Dawn Cuffie Professor M. Best Law, Ethics and Corporate Goverance-LEG 500 January 22, 2012 1. Explain where an employee can reasonable expect to have privacy in the workplace. Employees are deemed not to have “a reasonable expectation of privacy”. Employees are expected to follow guidelines and regulations regarding usage of workplace computers, telephones, cell phones, pagers, email and internet. These are often times found in the employee handbook and manuals managed by HR. In the private sector, privacy law is determined by the variety of state and federal statutes and the common law of torts (Halbert and Ingulli, pg. 74). Employees may file a claim based on “intrusion” of privacy but must prove that the electronic surveillance was highly obnoxiousness and intrusive and that the reasons for retrieval was irrelevant to the employee’s job. Government employees may argue that electronic surveillance and monitoring violate their Fourth Amendment right to “reasonable expectations of privacy”. These cases are often time judged by the balance test which weighs the importance of the employee’s privacy against the employer’s interest. An example of this is correctional facilities performing body and bag checks on their employees before they enter the facility. The safety of the inmates and the employees at the correctional facilities is of more importance than that of an individual’s need for privacy. Social media such as Face...
Words: 996 - Pages: 4
...1. Explain where an employee can reasonably expect to have privacy in the work place. Aside from the more measurable costs, employees emphasize their need to preserve at work what they expect to maintain elsewhere, a sense of dignity and self-respect. Within the workplace typical employees would expect to have minimal. Privacy in this aspect gives individuals, from factory workers to presidents a chance to lay their masks aside. The more employees share space, cubicles and networked computers, the harder it is to maintain personal privacy. Necessary boundaries of mental distance in interpersonal situations should be initialized raging from the most intimate to the most formal and public. Some companies legitimately monitor you for business reasons, not simply to snoop through your life. According to The American Management Association there are five justifiable reasons that your employer can monitor you at work. To make sure that you are legally complying with their standards. For instance, if you are a telemarketer, your employer may record your transactions and store the information to keep adequate and accurate files should they require documentation or evidence in the future. While 90 percent of companies who admit to spying on their employees admit that their workers are aware of it, others may not provide the same courtesy to their employees. In fact, employees may feel that any type of monitoring is a violation of your privacy. Some businesses go so far as to utilize...
Words: 1541 - Pages: 7
...Running Header: Video Assignment Electronic Surveillance of Employees Strayer University Professor Whitney Davis, Esq. LEG 500 22 January 2012 Franchrista M. Rollie Explain Where an Employee Can Reasonably Expect to Have Privacy in the Workplace Employee privacy rights are automatically granted and protected by specific labor laws, regulations and certain rules to follow, especially when it comes to employment. There are laws already in existence in our society to protect that one employee privacy regarding personnel records, medical information, health status, social security numbers, background checks, and everything else that could cause harm to someone. There is no specific statue or code that creates a right to privacy, a gray line is always brought into discussion which employers could always argue about gaining more control and productivity over one employee. Employers and their employees often have very different views when it comes to workplace privacy. Employers often believe that anything that goes on in the office is subject to review and scrutiny by the employer. This belief, at times, related to employee use of the office phone, computers, office space, and office resources. Employers often take the position that once an employee arrives at work anything the employee does related to job performance and is therefore subject to the employer’s oversight. Employees on the other hand, usually have certain expectations of privacy when...
Words: 1127 - Pages: 5
...Assignment #1 – Electronic Surveillance of EmployeesStrayer University LEG500 – Law, Ethics, and Corporate Governance Assignment #1 – Electronic Surveillance of EmployeesExplain Where an Employee Can Reasonably Expect to Have Privacy in the WorkplaceAlthough the law on employee privacy rights is still developing, various federal and state laws limit and define what employers can do when monitoring their employees (Dillon, Hamilton, Thomas, & Usry, 2008). Under federal and most state law, there are areas where an employee has a “reasonable expectation of privacy” in the workplace. Generally, privacy in the workplace can reasonably be expected in the following three general areas.First, the area of where employees can reasonably expect to have privacy from their co-workers is in their private workplace areas. Courts generally recognize a reasonable expectation of privacy as to an employee’s exclusive private office, desk, and file cabinets containing personal matters not shared with other workers (Wilson, 2006). Second, in highly private areas such as restrooms, break lounges, locker rooms, and places designated for health or personal comfort, courts have generally recognized employees’ reasonable expectations of privacy. The main reason is that activities carried out in these places are things that are not normally done in public. They are private acts, and the employee has a reasonable expectation of privacy during these activities. Finally, different kind of privacy...
Words: 2001 - Pages: 9
...Electronic Surveillance of Employees Law, Ethics & Corporate Governance October 23, 2011 1. Explain where an employee can reasonably expect to have privacy in the workplace. The Fourth Amendment to the U.S. Constitution guarantees "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures" (U.S. Const., amend. IV.1), however, the Fourth Amendment applies only to government actions, not to actions of private employers. As a result government employees may appear to have a fairly stronger claim for protection against electronic monitoring and surveillance than private sector employees. Thus in the U.S., workers in the workplace, except occasionally in restrooms and employee locker rooms, are not normally protected from surveillance on the grounds that the premises and equipment are possessions of the employer and the employee can have no reasonable expectation of intimacy or protection from employer intrusion. The employee, in the employment-at-will setting, has completely consented to the employer's right to monitor the employee closely "for any reason, no reason, or even reason morally” wrong to lose their job. Employees normally have no expectation of privacy in public or in the workplace. Most courts are employing narrow reasoning when discussing reasonable expectation of privacy on e-mail, using “voluntariness” of e-mail communications and property-based notions of ownership of computer systems...
Words: 1695 - Pages: 7
...Where can an employee reasonably expect to have privacy? Employee’s expect to have a reasonable amount privacy in the work place at least in their own work space but today that may not be all possible due to electronic Surveillance . Employees are becoming increasingly concerned about their privacy as their employers are monitoring them electronically more closely than ever before. Still employees expect to have privacy at the lunch area, bathrooms and lockers. Besides those places the employee has little or almost no privacy within the company. Electronic monitoring allows an employer to observe what employees do on the job and review employee communications, including e-mail and Internet activity, often capturing and reviewing communications that employees consider private. Video monitoring is common in many work environments to maintains security, by monitoring employees and to deter theft. There are laws set in place to also protect the privacy tof employee’s personnel records, including personal data, medical information and health status, social security numbers, background screenings information, financial and everything else that could invade a persons privacy. Is Herman's need to know whether his salespersons are honest a sufficient ground for utilizing electronic surveillance? The answer probably depends on whether there are alternative methods of ascertaining the honesty of salespersons that are less invasive of the employees' privacy...
Words: 4553 - Pages: 19
...|[pic] | | | |[pic] | |Corporate Compliance Plan | |Interoffice Memorandum | | | | | | | |Patrina Smith | | | |Business Law 531 ...
Words: 2923 - Pages: 12
...reasonable expect to have privacy, open and enclosed area effects on employees. It will also cover Mr. Herman’s information needs, employer electronic surveillance of employee’s extent, and unaware third party usage in surveillance. Explain where an employee can reasonably expect to have privacy in the workplace. In general workplaces can be divided into two types. The first type is the closed office space. When doors are closed in this type, there is virtually complete privacy for conversations taking place within the enclosed space. Its direct opposite of an enclosed office space, an open office space is a series of desks within an open area separated at most by various pieces of furniture and petitions. Due to the recent trend of litigation resulting from the use of surveillance in the work place, electronic surveillance has taken a larger spot in law than ever before. Most employees use the computers at their jobs to do private things such as send personal email or make an online purchase. Most are convinced that these little slips in the workplace go unnoticed by their employers and feel that their actions remain something private that only then know of. However 75% of large companies monitor internet and email usage by their employees (Scott Cox, 2005). The flow of electronic information has proven to be equally difficult to protect as well as monitor. There are laws that protect employees’ rights to privacy however...
Words: 1345 - Pages: 6
...Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Legal Aspects of Privacy and Security: A CaseStudy of Apple versus FBI Arguments The debate regarding privacy versus security has been going on for some time now. The matter is complicated due to the fact that the concept of privacy is a subjective phenomenon, shaped by several factors such as cultural norms or geographical location. In a paradoxical situation, rapid advancements in technology are fast making the technology both the guardian and invader of the privacy. Governments and organizations around the globe are using technology to achieve their objectives in the name of security and conveni... AD Copyright SANS Institute Author Retains Full Rights Legal Aspects of Privacy and Security: A CaseStudy of Apple versus FBI Arguments GIAC (GLEG) Gold Certification Author: Muzamil Riffat, muzamil@hotmail.com Advisor: Chris Walker Accepted: June 1, 2016 Abstract The debate regarding privacy versus security has been going on for some time now. The matter is complicated due to the fact that the concept of privacy is a subjective phenomenon, shaped by several factors such as cultural norms or geographical location. In a paradoxical situation, rapid advancements in technology are fast making the technology both the guardian and invader of the privacy...
Words: 6821 - Pages: 28