Premium Essay

The Erosion Of Privacy In The Workplace

Submitted By
Words 658
Pages 3
Personal privacy rights are dead in the workplace because of the advent of the digital age resulting in the blurring of boundaries between an employer respecting the employees’ personal life in a widely accessible digital realm.

Erosion of Privacy:
As technological advancements grow, personal privacy is also eroding congruently. The usage of social media platforms has become a norm through social cues and expectations that are formed by living in the digital age. These platforms create cultural hubs in which one digresses personal information, from their name, to pictures, personal statuses, likes and dislikes. “Balancing "We" And "Me" Congdon suggests “Cultures are built and reinforced when people exhibit certain behaviors over time and …show more content…
There is an Internet culture, and the behavior that others display in this community will eventually become accepted and embraced, or else risk losing the benefits it brings. As the world becomes more connected through social media, employees will most likely be interacting with their coworkers, supervisors, as well as other professional contacts in social network platforms like Facebook and Twitter. These interactions can consist of both personal and professional ones. Statistics have shown that “Younger employees are connected to an average of 16 coworkers on Facebook, and 41 percent of Facebook users think it is irresponsible to ignore a friend request from a coworker” (Ollie-Malaterre, Rothbard, and Berg 647). This trend, especially from the generation that grew up in the digital age shows how social networks have redefined how employees’ interact socially. Therefore, it is …show more content…
However, even if there is potentially compromising information on it, the first amendment should in theory protect the employees’ freedom of speech. The Supreme Court found internet connection similar to newspaper publishing, therefore instilling first amendment protection. Therefore internet freedom extends to social media sites, yet employers still filter content and limit usage. Schools in particular are notable offenders of this. In the case of Kansas Board of Regents, David W. Guth a University of Kansas tenured journalism professor was suspended after responding to the shootings at the Washington Navy Yard on Twitter with an anti-gun standpoint. Although pro gun politicians called for Guth to be fired, the school did not have a policy that allowed the dismissal of employees because of their use of social media; however, later changed the policy that employees can be fired for “improper use of social media” (Jaschik). There are few positions that require posting on social media to fulfill job duties; unless the job description specifically includes manning, say, a facebook page of a company, then the removal from a company from the content posted is valid. The desire to extend authority over social media is not an employers’ job, but nevertheless it still

Similar Documents

Premium Essay

Privacy Laws and Policies

...Privacy laws and Policies XCOM / 285 04/08/12 After reviewing the Electronic Reserve Readings for our class and reading the classmates threads, I feel that communication privacy laws and policies are necessary in the work place. In this day and age of electronic communication it is very important for an employer to be aware of what an employee is doing on company time and with company property. As law suits are rampant, it is important for a company to protect itself and its employees. If an employee is sending potential sexually offensive material or just offensive material on company time and company property it is important for a company to be able to monitor and stop this action or be held accountable. In some companies an employer needs to be able to monitor an employee for sharing trade secrets and information that could potential harm or cause a loss in revenue. I however feel that it is of utmost importance for each company to determine how much surveillance is needed, with in the guide lines of the law. As brought out in our reading “The erosion of employee privacy by such practices as electronic monitoring and surveillance, however, comes at a cost in the form of increased stress and decreased employee morale, satisfaction and trust in their organization and management (Hornung 2005; Lee and Kleiner 2003). The Constitution’s fourth amendment also protects against “unreasonable search and seizure.” So with in each company a balance needs to be taken to protect themselves...

Words: 361 - Pages: 2

Premium Essay

Patient Confidentiality

...steam, seek advice on what to do for a patient’s care or to talk about the events of the work day. When patients are admitted into the hospital they disclose their information to all who are involved in their care; they trust that information will only be revealed to those involved in their care. Nurses do not have the right to disclose patient information on the interent according to Vicki Lachman (2013) this includes discribing patients by nicknames, and patient identifiers such as: room numbers, diagnosis or their conditions (para. 10). As nurses we have a duty to “…maintaining privacy (protecting them[patients] from undue intrusion), and confidentiality (by the discreet management of information about themselves [patients] that they share with us)” (Price, B. 2014). Stake holders, hospitals, nurses, the patient and their families all depend on the ethical implications of patient privacy and confidentiality. Lose of accreditation, fines by JACHO, lawsuits from patients; loss of professional license, criminal charges and termination of credentials are all possible negative outcomes for professional stakeholders. Finally, Erickson, and Millar, describe how patients and families lose trust in medical professionals, which...

Words: 1034 - Pages: 5

Premium Essay

Has the Increased Proliferation of It in Our Society Changed the Way We View and Value Our Perceptions of Privacy

...view of privacy. Some say that our perception of privacy have not changed, however there are others that our do not agree and believe our perception has changed dramatically due to the saturation levels in our society Introduction “Modern technology is facilitating the steady disappearance of individual privacy – even under normal circumstances. Add a real or hyped threat to the common good and the erosion of individual privacy is further accelerated” (Caloyannides, M 2003, Privacy vs. Information Technology, p. 100). Privacy concerns are not only a recent issue however with the ever increasing amount of information technology in our lives the topic has exploded and mutated into an ongoing debate between governments, social networking giants, corporations and privates individuals. With a slowdown of Information technology not looking likely in the foreseeable future will it be a case of “in 20 years’ time, will there be any privacy to protect?” (The surveillance society 1999, p.21). This essay will argue the point that while information technology in our society has created a more productive and social one, it has certainly altered our perception of privacy. I have focused on three areas (Social Network and online communities, E-Commerce and Video surveillance or CCTV) of information technology where I believe privacy is overlooked due to inundation and social acceptance. I believe in the informational world we currently live in there is an enormous ‘privacy importance’...

Words: 1886 - Pages: 8

Premium Essay

Internet Privacy

...Internet Privacy Abstract As more and more people continue to use the Internet and disclose their personal information, privacy concerns are paramount. Marketing companies are fiercely competing for their share of the booming e-commerce industry estimated at 75 billion dollars in 2010. Government agencies after 9/11 are using personal communications such as e-mail and social networking sites to scrutinize and evaluate potential threats to the United States. Legislation including the Patriot Act has empowered a new generation of public officials with information gathering capabilities on demand. In some cases a court order is not needed to inspect all of a person’s electronic communications. Exploitation of highly sensitive personal information is a reality as companies routinely sell this information to third parties without an individual’s consent. Opting out is a disclaimer written into privacy statements on websites that are often buried in the fine print. Many Americans assume that privacy is included in the operating system they purchase. It is the collating of personal information from multiple data sources on the Internet that remains a key point of contention among those who view privacy as fundamental American right implicit in the Constitution. In this sense, privacy is deeply personal to the dignity and respect of our society. Yet, the relevance of security issues must seek a balance and address the notion of the possibility of abuse. One significant...

Words: 4923 - Pages: 20

Premium Essay

At-Will Employment

...Ready Aim Fire: At-Will Employment Jennifer Shanley Bus 311 The at-will employment doctrine “employment at-will means that employers are able to terminate ones employment at any time, for any cause - with or without notice. (Rogers, S. 2012) was put into place to protect both the employee and the employer. By making the employment at-will both the employer and employee can void the contract at any time without repercussions. The "Employment At Will" Doctrine was created in the US in the late 1800's. This Doctrine was favored by employers since it gave them extreme freedom to run their business as they saw fit and protected them by the courts at the same time. As with most things that have too much freedom, abuses occurred that eventually gave rise to employee’s up-rising by joining unions. Due to this and the Civil Rights laws implemented in the 1960's, companies started documenting their policies regarding how, why, and when an employee could be terminated. The courts then held companies accountable for following their employee manuals which in recent times have made companies scrutinize their manuals very closely and frequently” (Butsch, R., & Kleiner, B. H. 1997) Many people assume that with the at-will doctrine being put into place would stop employers from taking advantage and still fire people at any time, whenever they felt like it leaving that employee floundering with unexpected loss of income. That assumption is only half right; the At-will...

Words: 2557 - Pages: 11

Premium Essay

Firat Will

...Ready Aim Fire: At-Will Employment Name BUS 311 Date Instructor The at-will employment doctrine “employment at-will means that employers are able to terminate ones employment at any time, for any cause - with or without notice. (Rogers, S. 2012) was put into place to protect both the employee and the employer. By making the employment at-will both the employer and employee can void the contract at any time without repercussions. The "Employment At Will" Doctrine was created in the US in the late 1800's. This Doctrine was favored by employers since it gave them extreme freedom to run their business as they saw fit and protected them by the courts at the same time. As with most things that have too much freedom, abuses occurred that eventually gave rise to employee’s up-rising by joining unions. Due to this and the Civil Rights laws implemented in the 1960's, companies started documenting their policies regarding how, why, and when an employee could be terminated. The courts then held companies accountable for following their employee manuals which in recent times have made companies scrutinize their manuals very closely and frequently” (Butsch, R., & Kleiner, B. H. 1997) Many people assume that with the at-will doctrine being put into place would stop employers from taking advantage and still fire people at any time, whenever they felt like it leaving that employee floundering with unexpected loss of income. That assumption is only half right; the At-will doctrine...

Words: 2496 - Pages: 10

Premium Essay

Collect Your Food!

...Report of the Kumar Mangalam Birla Committee on Corporate Governance; Role of Media in Ensuring Corporate Governance; Environmental Concerns and Corporations. Ethical Issues related with Advertisement and Marketing; Secular versus Spritual Values in Management, Work Ethics, Stress at Workplace Relevance of Values in Management; Gandhian Approach in Management and Trusteeship; Social Values and Political Environment Indian Ethos: Values and Ethics; Requisites for Ethics Globally A Holistic Management System; Management in Indian Perspective Unit-II Unit-III Unit-IV Unit-V 45, Anurag Nagar, Behind Press Complex, Indore (M.P.) Ph.: 4262100, www.rccmindore.com 1 B.B.A. VI Semester Subject: Indian Ethos in Management UNIT – 1 BUSINESS ETHICS Business ethics is nothing but the application of ethics in business. Business ethics is the application of general ethical ideas to business behavior. Ethical business behavior facilitates and promotes good to society, improves profitability, fosters business relations and employee productivity. The concept of business ethics has come to mean various things to various people, but generally it‘s coming to know what it right or wrong in the workplace and doing what‘s right - this is in regard to effects of products/ services and in relationships with stakeholders. Business ethics is concerned with the behavior of a businessman in doing a business. Unethical practices are creating problems to businessman and business units. The...

Words: 9495 - Pages: 38

Premium Essay

Recent Banking Sector Reform in Nigeria–Implications for Employees

...By: Mr. Feyi Oluwaremi (B.Sc, MBA, FCA) Lecturer, Accounting Department Osun State University, Okuku Campus, Osun State. Nigeria, Africa CURRENT BANK CRISIS AND CBN’s INTERVENTIONS In June 2009, Nigerian Central Bank Governor Sanusi Lamido Sanusi took office. He certainly had an intuitive feeling about how deeply distressed his nation's banking sector was. Foreign risk management analysts had been issuing warnings about Nigerian banks and their toxic assets since January, 2009 and oil prices were down — always a harbinger of hard times coming for Africa's top oil producer. The current bank crisis emanated from greed and destructive capitalism of infinitesimal populace orchestrated by unguided bank reform of the then CBN Governor, Professor Charle Soludo. This position is succinctly narrated by the analysts and scholars as follows: According to Nigerian business journalist, Dayo Coker(2010): “It was simply greed and destructive capitalism.” He continued: “There was a chance to make millions and people seized it. The regulators failed the people.” Long before they failed the people, however, Nigeria's regulators inspired them with a plan to overhaul their convoluted banking system, and open Nigerian finance to the world. In 2005, then-Central Bank Governor Chukwuma Soludo whittled down Nigeria's 89 small-scale banks to a handy 25. The new banks born of Soludo's consolidation were bigger, broader in scope and had much more credit to lend —...

Words: 5336 - Pages: 22

Premium Essay

Human Resource Strategy

...CERTIFIED HR PRACTITIONER Module 1 – Day 1 © KPL/2012 LEARNING OUTCOMES 1. Explain what human resource management is and how it relates to the management process. 2. Show with examples why human resource management is important to all managers. 3. Illustrate the human resources responsibilities of line and staff (HR) managers. 4. Briefly discuss and illustrate each of the important trends influencing human resource management. © KPL/2012 LEARNING OUTCOMES 5. List and briefly describe important trends in human resource management. 6. Define and give an example of evidencebased human resource management. © KPL/2012 HRM - Definition Human Resource Management (HRM) is the process of acquiring, training, appraising, and compensating employees and attending to their labor relations, health and safety, and fairness concerns. © KPL/2012 THE MANAGEMENT PROCESS Planning Controlling Leading Organizing Staffing © KPL/2012 HRM PROCESS Acquisition Training Fairness Health and Safety Labor Relations Human Resource Management (HRM) Appraisal Compensation © KPL/2012 PERSONNEL ASPECTS OF A MANAGER’S JOB • Conducting job analyses • Planning labor needs and recruiting job candidates • Selecting job candidates • Orienting and training new employees • Managing wages and salaries • Providing incentives and benefits • Appraising performance • Communicating • Training and developing managers • Building employee commitment © KPL/2012 PERSONNEL MISTAKES • • • • • Hire...

Words: 3120 - Pages: 13

Premium Essay

Risk Managment

...CHC60308 Advanced Diploma of Community Sector Management BSBRSK501A Manage Risk Learning Resource BSBRSK501A Manage risk March 2012 Author_ Drew Dwyer Frontline care Solutions Page 1 of 135 Enquiries Enquires about this and other publications can be made to: Drew Dwyer Contact our office: Frontline Care Solutions P.O. Box 1088 Coolum Beach QLD 4573 Phone: (07) 5351 1188 Email: admin@frontlinecaresolutions.com Website: www.frontlinecaresolutions.com Copyright © This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may be reproduced by any process without prior written permission of the author Drew Dwyer – Frontline Care Solutions. CHCORG605A Manage Human Resources in a Community Sector Organisation Produced by Frontline Care Solutions © Drew Dwyer December 2011 Issue 01 – V1 12/12/2011 Page 2 of 166 Table of Contents How to study this unit .............................................................................................................................. 4 Element 1: Establish risk context ............................................................................................................ 7 Risk management context....................................................................................................................... 7 Risk management policy and plan ........................................................................................................ 12 Risk...

Words: 25787 - Pages: 104

Premium Essay

Corporate Social Responsibility

...Qn 1 1.     The Natural Environment One of the more common ways marketers demonstrate social responsibility is through programs designed to protect and preserve the natural environment. a)    Many companies are making contributions to environmental protection organizations, sponsoring and participating in clean-up events, promoting recycling, retooling manufacturing processes to minimize waste and pollution, and generally reevaluating the effects of their products on the natural environment. b)    Green marketing refers to the specific development, pricing, promotion, and distribution of products that do not harm the natural environment. c)    Although demand for economic, legal, and ethical solutions to environmental problems is widespread, the environmental movement in marketing includes many different groups, whose values and goals often conflict. d)    Some environmentalists and marketers believe that companies should work to protect and preserve the natural environment by implementing the following goals: (1)   Eliminate the concept of waste (2)   Reinvent the concept of a product (3)   Make prices reflect products’ true cost (4)   Make environmentalism profitable 2.     Consumerism a)    Consumerism refers to the efforts of independent individuals, groups, and organizations working to protect the rights of consumers. b)    A number of interest groups and individuals have taken action against companies they consider irresponsible by lobbying government officials and agencies...

Words: 3828 - Pages: 16

Premium Essay

Report

...Construction Problems Submitted by WWW.ASSIGNMENTPOINT.COM CHAPTER I INTRODUCTION 1.1 Background of the Study Dhaka is a megacity and one of the major cities of South Asia. Dhaka, along with its metropolitan area, had a population of over 16 million in 2011, making it the largest city in Bangladesh. It is the 9th largest city in the world and also 28th among the most densely populated cities in the world. The population of Dhaka (areas under the jurisdiction of the Dhaka city corporation) stands at approximately 7.0 million. The city, in combination with localities forming the wider metropolitan area, is home to an estimated 16.6 million as of 2011.The population is growing by an estimated 4.2% per year, one of the highest rates amongst Asian cities. Modern Dhaka is the centre of political, cultural and economic life in Bangladesh. Although its urban infrastructure is the most developed in the country, Dhaka suffers from urban problems such as pollution and overpopulation. In recent decades, Dhaka has seen modernization of transport, communications and public works. Dhaka is the commercial heart of Bangladesh. The city has a gro Urban developments have sparked a widespread construction boom; new high-rise buildings and skyscrapers have changed the city landscape. wing middle class populatio. Due to various factors, including absence of an urbanization policy or a human...

Words: 12069 - Pages: 49

Premium Essay

The Features of a Traditional Malay House

...The traditional Malay house 1. GENERAL INFORMATION 1. I Title of practice or experience The traditional Malay house 1.2 Category o practice/experience and brief description f The traditional Malay house is one of the richest components of Malaysia’s cultural heritage. Designed and built by the villagers themselves, it manifests the creative and aesthetic skills of the Malays. This is a near-perfect houseform which is appropriate to local climatic conditions and expresses the way of life of its inhabitants. The house is extremely well designed to suit the warm and humid Malaysian climate and for the multifunctional use of space. Its design is also flexible as it caters to the widely different needs of the users and it has an addition system which allows the house to be extended to meet the growing needs of each family. 1.3 Name of person or institution responsible for the practice or experience The Malay communities in Malaysia 1.4 Name and position of key or relevant persons or officials involved Not applicable 1.5 Details o institution f Not applicable PART II: I NDIGENOUS AND TRADITIONAL 74 KNOWLEDGE AND PRACTICES 1.6 Name of person and/or institution conducting the research Lim Jee Yuan, Consumers’ Association of Penang 1.7 Details of research person/institution (a) (b) (c) (d) Address: 228 Macalister Road, 10400 Penang, Malaysia Telephone:++ (60) (4) 229 35 11 Fax: ++ (60) (4) 229 8 I06 E-Mail: elawmalaysia@igc.apc.org ...

Words: 8796 - Pages: 36

Premium Essay

Ethics

...ETHICS IN INFORMATION TECHNOLOGY Third Edition This page intentionally left blank ETHICS IN INFORMATION TECHNOLOGY Third Edition George W. Reynolds Australia • Brazil • Japan • Korea • Mexico • Singapore • Spain • United Kingdom • United States Ethics in Information Technology, Third Edition by George W. Reynolds VP/Editorial Director: Jack Calhoun Publisher: Joe Sabatino Senior Acquisitions Editor: Charles McCormick Jr. Senior Product Manager: Kate Hennessy Mason Development Editor: Mary Pat Shaffer Editorial Assistant: Nora Heink Marketing Manager: Bryant Chrzan Marketing Coordinator: Suellen Ruttkay Content Product Manager: Jennifer Feltri Senior Art Director: Stacy Jenkins Shirley Cover Designer: Itzhack Shelomi Cover Image: iStock Images Technology Project Manager: Chris Valentine Manufacturing Coordinator: Julio Esperas Copyeditor: Green Pen Quality Assurance Proofreader: Suzanne Huizenga Indexer: Alexandra Nickerson Composition: Pre-Press PMG © 2010 Course Technology, Cengage Learning ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission...

Words: 204343 - Pages: 818

Premium Essay

Information Technology

...28-09-2009 11:25 Page 70 CHAPTER 3 1. Describe the major ethical issues related to information technology and identify situations in which they occur. 2. Identify the many threats to information security. 3. Understand the various defense mechanisms used to protect information systems. 4. Explain IT auditing and planning for disaster recovery. Ethics, Privacy, and Information Security LEARNING OBJECTIVES rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 71 WEB RESOURCES Student Web site www.wiley.com/college/rainer • Web quizzes • Lecture slides in PowerPoint • Author podcasts • Interactive Case: Ruby’s Club assignments WileyPLUS • All of the above and... • E-book • Manager Videos • Vocabulary flash cards • Pre- and post-lecture quizzes • Microsoft Office 2007 lab manual and projects • How-to animations for Microsoft Office • Additional cases CHAPTER OUTLINE 3.1 Ethical Issues 3.2 Threats to Information Security 3.3 Protecting Information Resources What’s in IT for me? ACC FIN MKT OM HRM MIS rain_c03_070-121hr.qxd 28-09-2009 11:25 Page 72 72 Chapter 3 Ethics, Privacy, and Information Security Opening Case NASA Loses Secret Information for Years The Business Problem Over the past decade, U.S. government agencies have been the victims of an unprecedented number of cyber-attacks. One government official noted, “It is espionage on a massive scale.” Government agencies reported almost 13,000 security incidents to the U.S. Homeland...

Words: 25389 - Pages: 102