...Monitoring Employees Private Social Sites Are Unethical Monitoring employee’s private social network sites is unethical. The Internet has become an excellent medium to connect with the outer World. People use it to connect with other people, sharing files, entertainment and lots of other activities that are useful and beneficial. Although the Internet can be useful, it’s usage can also present a problem for employers. Most companies fear leakage of confidential information and trade secrets through e-mail or blogs. A recent survey conducted by the American Management Association and the ePolicy Institute found that 14 percent of the employees polled admitted they had sent confidential or potentially embarrassing company e-mails to outsiders(pg ). As a result, some companies have monitored their employee’s social networking site; facebook for example. So, a distinction as to why companies monitor their employee’s social sites should be made, as well, as the employee’s rights to privacy. Why do companies monitor their employee’s social networking media? The reasons managers monitor social media was revealed in a new Deloitte survey. Many businesses want to be able to monitor their employees’ social networking activity on sites such as MySpace, Facebook, and Twitter. The main problem with this idea stems from employers wanting to monitor this activity on a subordinate’s off time. Business Week reported that companies want to make sure that their hard-earned...
Words: 684 - Pages: 3
...2013/14 Survey Social Media in the Workplace Around the World 3.0 Proskauer Rose LLP | Prior results do not guarantee a similar outcome | Attorney Advertising About Our Survey We are proud to present Proskauer’s third annual global survey about social media use in the workplace. As in previous years, in addition to our survey results, in collaboration with select law firms across the world, we have included a brief summary of the law from around the world, including significant recent developments. Please note that the information provided in this survey is not intended to be, and shall not be construed to be, the provision of legal advice or an offer to provide legal services, nor does it necessarily reflect the opinions of the firm, our lawyers or our clients. No client-lawyer relationship between you and the firm is or may be created by your access to or use of this survey or any information contained in it. Proskauer Rose LLP (Proskauer) is not obligated to provide updates on the information presented herein. © Proskauer Rose LLP. All Rights Reserved. Social Media in the Workplace Around the World 3.0 When we published our first survey in 2011, there was a sense of novelty and even mystery about social media usage in the workplace. There was a strong perception that social media and business did not mix. The art of harnessing social media for business lacked the sophistication and prominence that it now has. Today, business use of social media is mainstream. This shift from...
Words: 8815 - Pages: 36
...keystrokes. Online predators, cyber bullying, hateful websites and other negative influences can potentially plague your children. You can safeguard your family from unseemly and damaging connections by using computer monitoring software. Most monitoring applications offer a multiplicity of protections and a variety of tools. Our researchers tested and ranked monitoring tools to bring you an objective comparison of the best computer tracking software. Our top three products are SpyAgent, WebWatcher and PC Pandora. Read our articles on monitoring software to learn more about computer monitoring tools. Monitoring Good monitoring software includes tools to record all website visits and online searches. The software should have the ability to detect when a computer user accesses social networking websites such as Facebook and Twitter or views online pornography. Some monitoring applications can capture blog posts, usernames and even passwords. Recording the transcripts of conversations that occur via chat and instant messaging clients is a frequently sought-after feature. Additional elements to consider are tracking file downloads, sent and received emails, web-based email and email attachments Tracking features may include recording the applications users launch as well as the duration and frequency of use. These components can...
Words: 5031 - Pages: 21
...discuss and defend my position on a contemporary IT issue using a practical ethical theory. Unit 1 Assignment 1 Ethical Theory-Kantian The ethical theory that I have chosen that best represents my personal principles is Kantianism. This theory was named after the German philosopher Immanuel Kant. According to Quinn, “Kant believed that people’s actions ought to be guided by moral laws, and that these moral laws were universal” (Quinn, 2013, para. 2). The universal law is the belief that everyone tries to do the right thing and be a rational person and therefore rational decisions can be applied to everyone in the world. Kantianism does not consider the consequences of the ethical issues to be important, rather it is based on what should be done or doing the right thing regardless of the consequences. Kant’s decision is based on the theory that nothing is good without qualification. This means that the only thing that is good is good will or good intentions. The belief is that if a person does a good deed without expecting to gain something or having a hidden agenda for doing that good deed is a good person (“Kant’s moral theory,” n. d.). For example, if a person donates a car, money or clothes to a charity in order to get a break on taxes he...
Words: 1571 - Pages: 7
..."Should employers be allowed to monitor personal communication of its employees?" Ellen Berkeley, Amy Davis, Shawn Molloy, Deborah O’Leary, Karey Raubenheimer BCOM 275 October 31, 2011 Professor Tom Melpolder Although organizations have monitored employees for centuries, a number of developments have greatly expanded the amount and scope of employee monitoring. For example, recent technological advances have dramatically altered the nature of work, the working environment, and employee–employer relationships. As a result, information technology has emerged as an integral part of today’s organizational infrastructure. These new technologies have the potential to improve worker efficiency and effectiveness. However, there are risks associated with any new technology including the potential for employee abuse resulting in negative consequences (Alder, Kuenzi & Schminke, 2008). Private communication such as e-mails and social media in the workplace has emerged as one of the stickiest legal issues of the electronic age” (Cappel, 1995). The debate is divided. One side believes that employers should not have full control over its employee’s personal communication. Their view is that employees should have the ability to communicate with friends and family while on breaks, as long as productivity isn’t affected. Further, they believe that employees have a privacy right and should be allowed to communicate while at work without being monitored...
Words: 1812 - Pages: 8
...ADMINISTRATION MANAGEMENT INFORMATION SYSTEMS GROUP ASSIGNMENT GROUP MEMBERS: 1. CLEMENT NGISSAH SB/DMK/14/0008 2. JOSHUA ACKAH SB/DMK/14/0007 3. ELIZABETH BAAPA BUAH SB/DMK/14/0012 4. EZEKIEL ARTHUR MENDS SB/DMK/14/0002 5. NATHANIEL DUAH ADJEI SB/DMK/14/0003 6. FREDRICK A. ASIEDU SB/DMK/14/0010 CASE STUDY MONITORING EMPLOYEES ON NETWORKS: UNETHICAL OR GOOD BUSINESS?. LAUDEN & LAUDEN (2014), PAGE 296-7 Question 1. Should managers monitor employee e-mail and internet usage? Why or Why not? Employee email and Internet usage monitoring in the workplace may put employers and employees in conflict because both sides are trying to protect personal interests. Employees want to maintain their personal privacy while employers want to ensure company resources are not misused. Employers monitor Internet use in the workplace to protect their companies from legal problems that could arise if employees use company computers for inappropriate or illegal online activities, such as racist, sexually explicit or other potentially offensive materials accessed or traded by their employees which could result in adverse publicity. They are also concerned about a decline in productivity as some workers use the Internet to handle personal activities such as checking personal email, responding to instant messages or sneaking in a brief YouTube video which creates series of non-stop interruptions that divert employees’...
Words: 1460 - Pages: 6
...privacy has been a controversial topic especially with the rise in internet usage, the popularity of social media increasing, and the addition of GPS to mobile devices. With these advances in technology there are numerous ways for employers to monitor their employees’ time at work. According to Evans (2007) as many as eighty percent of the employers, who employ twenty percent of the American population, monitor employees’ telephone conversations, e-mails, and voicemails. Global Positioning Systems (GPS) technology has made tracking the whereabouts of employees easier rather than tracking only information passed between employees and other individuals. The United States does offer privacy laws to help safeguard employees’ expectations of privacy; however, the laws are formatted around the physical realm such as desk drawers or an employee’s home, not an employee’s computer files or even social networking site (Riego, Abril, & Levin, 2012). It has become apparent that social media is here to stay. Social networking sites such as Facebook and Twitter have changed how people communicate in their daily lives and even how organizations do business. Employers have begun using social networking sites not only to market themselves but also as a human resource tool, making themselves accessible to potential customers and employees alike. Some of the ways employers have begun utilizing social networking include orientation, training, faster innovation of products and services, and improved...
Words: 1661 - Pages: 7
...With the development of high technologies, social media has been widely used by companies and individuals. Many users, especially the younger ones, are active users of many kinds of social network media, like Twitter, Facebook, MySpac, blogs and YouTube. However, while there are many benefits of using social media for companies, they still face with many problems of the effects of using social network media by their workers, since many workers like to post their comments on social media freely, which may related to the company’s secret information, hence, although many organizations do not have clear guidelines for prohibiting employees from using social media, they still take measures to monitor their employees’ behaviors on social media. In addition, many organizations do not have social media policy, even they have, and the enforcement of the policy is not effective. In this situation, the case study aims to find out resolutions for how the social media policy could be implemented effectively in organizations with Singapore Airlines as an example. Two issues, including enforcement challenges, and de-motivating staff due to monitoring them, will be discussed, and respective resolutions will be presented to each issue for better designing or implementing the social media policies. Enforcement challenges Many companies face with challenges when enforcing social media policy. For example, companies that have implemented social media policy say that the enforcement is not an...
Words: 1771 - Pages: 8
...privacy has been a controversial topic especially with the rise in internet usage, the popularity of social media increasing, and the addition of GPS to mobile devices. With these advances in technology there are numerous ways for employers to monitor their employees’ time at work. According to Evans (2007) as many as eighty percent of the employers, who employ twenty percent of the American population, monitor employees’ telephone conversations, emails, and voicemails. Global Positioning Systems (GPS) technology has made tracking the whereabouts of employees easier rather than tracking only information passed between employees and other individuals. The United States does offer privacy laws to help safeguard employees’ expectations of privacy; however, the laws are formatted around the physical realm such as desk drawers or an employee’s home, not an employee’s computer files or even social networking site (Riego, Abril, & Levin, 2012). It has become apparent that social media is here to stay. Social networking sites such as Facebook and Twitter have changed how people communicate in their daily lives and even how organizations do business. Employers have begun using social networking sites not only to market themselves but also as a human resource tool, making themselves accessible to potential customers and employees alike. Some of the ways employers have begun utilizing social networking include orientation, training, faster innovation of products and services, and improved...
Words: 1694 - Pages: 7
...Social Media Policy Social Media pertains to user-created audio, video, text or multimedia works that are shared in an electronic environment, such as Facebook, Twitter, email, personal blogs or instant messages. In as such, the policy of our company is that employees may use Social Media for their personal use while off the clock and in compliance with our company’s terms related to Social Media. Please note that conduct that is illegal or in direct violation of the company’s policy on Social Media will still be deemed a violation of policy or illegal if it occurs online. Employees are entitled to express their opinions and ideas, but have a responsibility not to violate the company’s policies or negatively reflect on the organization. When communicating online employees should never speak on behalf of the company or about the company without prior authorization from management or marketing, or hold a position that has been approved to speak on behalf of the company. The company reserves the right to restrict and monitor employee’s use of social media. The employee should remember to: Be respectful; Be authentic and always state your name; Be careful and protect your personal information; Be responsible and act with integrity. The employee should never disclose confidential information. The employee should never disclose patient information. The employee should never disclose personnel information. The employee should never disclose legal information. The employee should...
Words: 312 - Pages: 2
...setting, many question the idea if a post on social media should reflect aback on your job. The employees say that social media is part of their personal life and it should not have any correlation with their job. Employees say that they can be professional workers but as for their personal life, its personal. The employer's point of view is that social media accounts shows what type of employee you are and as an employee you reflect on the company. Many employers have go to writing up employees for a post and to the extreme of terminating the employee. A fine line about the actions taken about inappropriate post and as employers being in charge they get to decide where that line sets. A simple compromise that the employer...
Words: 509 - Pages: 3
...XYZ Corporation’s business environment has changed dramatically over the years, especially the manner in which your company can be held liable, or accountable for the actions of your employees. Many small and big businesses like your company have numerous methods to protect themselves from lawsuits in the area of criminal activity and workplace torts. With proper training programs and a comprehensive set of electronic communications policies in place, companies such as yours can reduce many of the criminal and workplace torts that could occur within your workplace or business location and reduce the risk and occurrence of lawsuits and liabilities associated with the improper and illegal usage of the company resources such as Internet usage, email, and use of the company Network and computing systems. Many of the torts that typically occur outside of the workplace can easily occur within the workplace environment because of improper employee use, misuse, or illegal use of the Internet, social media, and email provided by companies such as XYZ Corp. A brief summary of the workplace torts that can create corporate liability and from which corporations and business owners must protect themselves from include but are not limited to: 1. Intentional torts (torts against a person): Assault, Battery, False Imprisonment, and Intentional infliction of emotional distress. 2. Property Torts such as Conversion and Copyright Infringement. 3. Dignitary torts activity that causes injury...
Words: 2924 - Pages: 12
...Social Media Tools in E-Commerce The Internet allows individuals, companies, and entire organizations the ability to interact and socialize. Typically individuals are consumers on the web, looking for information, researching, and purchasing products. Through social media, consumers are advancing from content consumers to content producers. Instead of researching, people can post their ideas, their personal or business information online on websites such as Face-book, twitter, My-space, blogging, and video marketing on You Tube. One of the largest consumers of social media is the Business to Business marketing that is currently ahead of the curve. “Marketing researchers at the University of Massachusetts at Dartmouth have released the results of a survey, showing that U.S. companies overwhelmingly use at least one social media tool in their marketing efforts” (Komarketing, 2009, p. 3). The research also pointed out that 62% of executives surveyed reported using or being familiar with Twitter. The report also showed that over half of the 500 companies were already using the popular micro blogging service as a part of their online marketing campaigns. An overwhelming 80% of the companies surveyed in the report use social media networks (Komarketing, 2009). Tools for Effective Messaging An analyst of social media, Jordan Julien who wrote the article the Social Media Achilles Heel, suggests that when blogging or marketing through any social media there are two important concepts...
Words: 2247 - Pages: 9
...different locations and different parts of the country; I have noticed that some of the other branches do not follow the firms’ policies as they should. Some branches operate on their own policies. I have drafted up a new and improved corporate security policy that covers emails, mobile devices, computer usage, email retention policies, passwords, etc. I hope this will help streamline our security policy across the board so that everyone is on the same page and so there is no misinterpretation of the firm employee or otherwise. RICHMAN INVESTMENTS CORPORATE SECURITY POLICY Use of Phone and Mail Systems Personal use of the telephone for long-distance and toll calls is not permitted. Employees should Practice discretion when making local personal calls and may be required to reimburse The Firm for any charges resulting from their personal use of the telephone. The mail system is reserved for business purposes only. Employees should refrain from sending or receiving personal mail at the workplace. To ensure effective telephone communications, employees should always use the approved greeting and speak in a courteous and professional manner. Please confirm information received from the caller, and hang up only after the caller has done so. Computer and E-mail Usage Computers and other media of electronic communications ("Media") are the property of the Firm which has a legitimate...
Words: 1596 - Pages: 7
...Not What You Can do For Facebook, But What Facebook Can do For You Executive Summary: The company, Stone Goose Company, is a gourmet chocolate company. Currently, the company does not employ a social media policy. This proposal will address two equally important parts of the new policy, the customer base and the employees. This policy will make sure that Stone Goose is ensuring the future of the company by using all avenues possible to reach the customers. The first section of this proposal will address the customers. It will discuss marketing, customer support, and customer conduct. The second section will address the employees. It will discuss use of social media during working hours, expected employee conduct, and disciplinary action when the policy is violated. For the purpose of this proposal, social media is defined as “forms of electronic communication (as Web sites for social networking and microblogging) through which users create online communities to share information, ideas, personal messages, and other content (as videos).” Customers Before writing this proposal, Stone Goose Company surveyed the online customers, a database of approximately 1,000, and received 700 responses. The survey asked how many used social media, and the prevalent websites they used. Then the survey asked how many customers would like Stone Goose Company to develop social media for contact and customer support. The results are demonstrated in these three charts: As evidenced...
Words: 3324 - Pages: 14