Free Essay

Technoloy and Privacy

In:

Submitted By efaris
Words 471
Pages 2
Technology as of today has evolved in a never ending labyrinth of electronic information being shared by everybody in different places through different channels. Facebook, Twitter, e-mail accounts, text messages through e-mails, etc are all part of a society that is in constant stay of electronic association. Now, how does our privacy has gotten affected by all these technological developments, what precedents had been establish when it comes to the use of technology in the workplace and privacy? Are we liable for the use of personal e-mails in the workplace? Should e-mail be considered analogous to mail and telephone conversations? Many more questions come up when technology and privacy in the workplace are at the center of the debate and some of them will be address in this paper.
Intrusion by Seclusion means that the right to privacy is invaded by the unreasonable intrusion upon the seclusion of another. This is based on the Restatement, Second of Torts 652A.

According to Rich (1995): “One must ask whether the law protecting the right to privacy has evolved with the new technologies to ensure the vitality of the Fourth Amendment.” It is important to notice that the Supreme Court has defined privacy as the right of the individual to control the dissemination of information about oneself (Rich, 1995, p. 1). Rich (1995) continues to explain:
Privacy as guaranteed by the U.S. Cosntitution differs in two significant ways from privacy protected by tort law: (1) the types of acts constituting an invasion of privacy are very different, and (2) the type of protection provided to individuals – constitutional privacy protects against governmental intrusion while tort law primarily protects against invasion by private parties. Fourth Amendment privacy right only apply in those situations where the government is the primary actor. (p. 1)
So far it has been understood that the Fourth Amendment can not be used in private settings and it applies only to governmental entities. Numerous cases had been in the Supreme Court due to the clash of technology and privacy and it seems that these decisions have weakened and possible practically eliminated, an employee’s right to privacy in the computerized workplace. (Rich, 1995, p. 2) The Electronic Communications Privacy Act of 1986 (ECPA) came about because the Federal wiretap statute failed to provide sufficient protection for modern computer transmission technologies (Rich, 1995, p. 2). Even though this statute help, it did not protect against e-mail surveillance, only cell phones were included. Then in 1993 the Consumers and Workers Act was enacted protecting employees while not banning electronic monitoring. The law specifically says that the employee has the right to know and must be given notice while they are being monitored or recorded electronically by the employer on their job.

Many employers have technological access to employee information

Similar Documents

Premium Essay

Information Technologies Act

...In discussing the advances in information technology, that resulted in new ethical issues necessitating in the creation preventive measures, we will look into; The Children’s Online Privacy Act, 2000 as well as the No Electronic Theft (NET) Act, 1997. Both of these acts were created due to unethical actions by a group of people or a person. The Children’s Online Privacy Act or CIPA, was created in 2000 because there was a concern about the material children were being exposed to online. The advancement in information technology made it even easier for children to have access to anything online. In order to combat this, CIPA would offer incentives to participate in a program that would aid in the protection of children by providing discounts to those who agree to participate. In order to participate in this program, a school or library would have to agree to have a town hall meeting to address the proposal of implementing the Internet monitoring and safety program. Once the public is informed, then they must agree to monitor the activities while children are online as well as, but also educate the children on what behavior is inappropriate. Once the school or library agrees to use and implement the safety policies by created CIPA, certain guidelines must be laid out and followed. CIPA will then address potential issues and how they are to be dealt with. They must have procedures to not only monitor inappropriate behavior by minors but also to inform them of what behavior...

Words: 673 - Pages: 3

Free Essay

Study on Evolving Medicated Footwear for Diabetic Patients

...Study on Evolving Medicated Footwear for Diabetic Patients by: Md. Tareq Bin Satter Chapter I Page 1 of 85 Study on Evolving Medicated Footwear for Diabetic Patients by: Md. Tareq Bin Satter 1.1 Introduction Foot is the important part of the body. If someone has diabetes he/she is more likely to have to foot problems. Diabetes can damage your nerves. This, in turn, may make you less able to feel an injury or pressure on the skin of your foot. You may not notice a foot injury until severe damage or infection develops. This may led to gangrene in the through simple injuries eventually amputation will be the final choice. So a diabetes patient always has to wear specialized footwear that can protect the foot in more sophisticated way. Diabetes changes your body's ability to fight infections. Damage to blood vessels causes because of diabetes results in less blood and oxygen getting to your feet. Because of this, small sores or breaks in the skin may become deeper skin ulcers. The affected limb may need to be amputated when these skin ulcers do not improve, get larger, or go deeper into the skin. Worldwide, 50% of all leg amputations happen to people living with diabetes. In India, an estimated 50,000 amputations are carried out every year due to diabetes related foot problems. By employing reconstructive and corrective footwear, to remove the high pressure points, a large number of such amputations can be prevented. Thus the patient can lead a near normal...

Words: 14704 - Pages: 59