Free Essay

Week 7 Case Study: Deal V. Spears

In:

Submitted By ivye13
Words 830
Pages 4
Week 7 Case Study: Deal v. Spears
HRMG 5700
December 8, 2013

Deal v. Spears Case Summary
This case is about a woman named Sibbie Deal that was employed at the White Oaks Package Store that operates as a liquor store located near Camden, Arkansas and it is owned and operated by Newell and Juanita Spears. She began to work at this store on December 31, 1989. Around April 21, 1990 the store was broken into and about $16,000 was stolen. The Spears were under the suspicion that it was an inside job and based on Mrs. Deal testimony they suspected she was directly involved in the theft. Hoping that Mrs. Deal admitted her involvement on the situation the Spears thought about using a recording device to monitor the telephone calls. At the deposition according to Mr. Spears he asked Mr. Cope the Sheriff Department Investigator about starting to record the calls and he said he did not see anything wrong by doing that. Once the device was installed and the conversations were monitored when Mrs. Spears was listening to a tape she found out that Mrs. Deal sold a keg of beer to Calvin Lucas which at the time they were having an extramarital affair at a discounted price violating the store policy. After Mrs. Deal came to work and the Spears played the incriminating tape which consequently got her fired.
Several weeks after the incident Mrs. Deal and Mr. Lucas filed an action causing the tapes and the recorder to be seized by a United States deputy marshal. The action was brought pursuant to the Omnibus Crime Control and Safe Streets Act of 1968 that it makes it unlawful for anyone to willfully intercept, use, or disclose any wire, oral, or electronic communication. The Spears claim that Mrs. Deal consented to the calls interception prior of happening. The plaintiffs believed their conversations were private because it was just mentioned that it could happen and the court found that they both had reasonable expectation that their conversations were private. The court found that Mr. and Mrs. Spears were liable for the plaintiff’s damages for intentionally intercepting the phone conversations. The court ordered the Spears to pay for statutory damages for both Mrs. Deal and Mr. Lucas totaling $40, 000 and granted the request for attorney’s fees. The court denied punitive damages for the Spears (Twomey, 2013).
Case Questions
1. It is not unlawful to monitor the telephone conversation of an employee if the employee has given prior consent. Did Deal give her employer consent in this case?
Under the Wiretap Act it is not illegal to intercept telephone conversations or other communications as long one of the parties has given prior consent therefore employers can monitor their employee’s calls if consent is obtained in advance (Tschanz, 2012).
In this case the Spears told Mrs. Deal if she does not cut down on her personal phone calls they might install a pay phone or monitor the calls which is not giving the employee previous notice of when they will start recording the calls. It is not mentioned that
Mrs. Deal consented to these conditions of allowing her employer to record her personal conversations.
2. Because of the recent burglary of the store, did the employer have a legitimate business reason to record and review the employee’s phone calls made or received while at work?
Under the Wiretap Act under the business extension exception employers may monitor and even record employee’s telephone calls without consent as long as they can show a legitimate business reason to record those calls. In this case the Spears had a legitimate business reason because of the recent burglary and the suspicion of an employee involvement however the Spears recorded twenty-two hours of calls and not all of them were in relation to the business interest (Twomey, 2013).

3. Under the Watkins precedent, what is the extent to which an employer can monitor personal phone calls to employees within the ordinary course of business exemption of the federal wiretapping law?
In the Watkins precedent it was found by the court that an employer monitoring employee personal calls is never in the ordinary course of business with the exception of the necessary extent to guard against unlawful use of the telephone or to define whether call is personal or is not personal. In addition, the court added that to remain within the exception, the manager must stop listening to the call once it is found that is personal
(Bagby, Harvey, & Tishman, n.d.).

References
Bagby, J.W., Harvey, P.R., Candidate, J.D., & Tishman, D.A. (n.d.). The Electronic Surveillance Project. Retrieved from http://esurveillance.ist.psu.edu/WATKINSvLMBERRY.php
Twomey, D. P. (2013). Labor and Employment Law: Text and Cases. : South-Western, Cengage
Tschanz, P. T., (2012). Electronic monitoring of employees’ telephone conversations: a quick reminder for employers. Retrieved from http://www.lexology.com/library/detail.aspx?g=f07795c2-d1b3-4ae6-840a-88ef00bef724

Similar Documents

Premium Essay

Internet and Social Life

...internet 10.1146/annurev.psych.55.090902.141922 0066-4308/04/0204-0000$14.00 BARGH MCKENNA Annu. Rev. Psychol. 2004. 55:X--X doi: 10.1146/annurev.psych.55.090902.141922 Copyright © 2004 by Annual Reviews. All rights reserved INTERNET AND SOCIAL LIFE THE INTERNET AND SOCIAL LIFE John A. Bargh and Katelyn Y.A. McKenna New York University, New York, New York 10003; email: john.bargh@nyu.edu, kym1@nyu.edu Key Words communication, groups, relationships, depression, loneliness Abstract The Internet is the latest in a series of technological breakthroughs in interpersonal communication, following the telegraph, telephone, radio, and television. It combines innovative features of its predecessors, such as bridging great distances and reaching a mass audience. However, the Internet has novel features as well, most critically the relative anonymity afforded to users and the provision of group venues in which to meet others with similar interests and values. We place the Internet in its historical context, and then examine the effects of Internet use on the user’s psychological well-being, the formation and maintenance of personal relationships, group memberships and social identity, the workplace, and community involvement. The evidence suggests that while these effects are largely dependent on the particular goals that users bring to the interaction---such as self-expression, affiliation, or competition---they also interact in important ways with the unique qualities of the...

Words: 9146 - Pages: 37

Premium Essay

Drinking Research

...CHAPTER I INTRODUCTION Background of the study “Drinking is the cause and the solution is drinking”. Teenager’s starts to sneak out, party all night and drinks excessively. The youth today is convinced that drinking liquor is part of being a teenager. They believe that to have a sense of adventure drinking liquor is one way to have fun, an exciting but dangerous way of seeking for adventure. The generation today is not fully aware of what danger these vices could do to them. They tend to overlook the fun and excitement it could bring instead of the Statement of the Problem To find out the disadvantages of drinking liquor as perceived by the Fourth Year male high school students of the College of the Holy Spirit (CHS). Specifically, this study aims to answer the following questions: What is the profile of the 4th year male students of C in terms of the following? Age Annual Family Income Academic Performance How many of the fourth year student experienced to drink liquor? What are their reasons in drinking liquor? How often the fourth year male students of C drink? How much did they spend in drinking liquor? Did their parents aware that they are drinking? What are disadvantages they foresee in drinking liquor? Scope and Limitation This study is conducted to determine the disadvantage of drinking liquor as perceived by the Fourth Year male high students of CHS. This study is limited only to the 4th year male students of the High School Department of CHS...

Words: 2573 - Pages: 11

Premium Essay

Leadership

...http://jom.sagepub.com/subscriptions Reprints: http://www.sagepub.com/journalsReprints.nav Permissions: http://www.sagepub.com/journalsPermissions.nav Citations: http://jom.sagepub.com/content/37/4/1228.refs.html Downloaded from jom.sagepub.com at The Hebrew University Library Authority on June 29, 2011 Journal of Management Vol. 37 No. 4, July 2011 1228-1261 DOI: 10.1177/0149206310380462 © The Author(s) 2011 Reprints and permission: http://www. sagepub.com/journalsPermissions.nav Servant Leadership: A Review and Synthesis Dirk van Dierendonck Erasmus University Servant leadership is positioned as a new field of research for leadership scholars. This review deals with the historical background of servant leadership, its key characteristics, the available measurement tools, and the results of relevant studies that have been conducted so far. An overall conceptual model of servant leadership is presented. It is argued that leaders who combine their motivation to lead with a need to serve display servant leadership. Personal characteristics and culture are positioned alongside the motivational dimension. Servant leadership is demonstrated by empowering and developing people; by expressing humility, authenticity, interpersonal acceptance, and stewardship; and by providing direction. A high-quality dyadic...

Words: 17936 - Pages: 72

Premium Essay

Servant Leadership Article Review

...com/journalsReprints.nav Permissions: http://www.sagepub.com/journalsPermissions.nav Citations: http://jom.sagepub.com/content/37/4/1228.refs.html >> Version of Record - Jun 8, 2011 OnlineFirst Version of Record - Sep 2, 2010 What is This? Downloaded from jom.sagepub.com at OhioLink on February 1, 2013 Journal of Management Vol. 37 No. 4, July 2011 1228-1261 DOI: 10.1177/0149206310380462 © The Author(s) 2011 Reprints and permission: http://www. sagepub.com/journalsPermissions.nav Servant Leadership: A Review and Synthesis Dirk van Dierendonck Erasmus University Servant leadership is positioned as a new field of research for leadership scholars. This review deals with the historical background of servant leadership, its key characteristics, the available measurement tools, and the results of relevant studies that have been conducted so far. An overall conceptual model of servant leadership is presented. It is argued that leaders who combine their motivation to lead with a need to serve display servant leadership. Personal characteristics and culture are positioned alongside the motivational dimension. Servant leadership is demonstrated by empowering and developing people; by expressing humility, authenticity, interpersonal...

Words: 17750 - Pages: 71

Free Essay

Business Case

...without the express, written consent IE is prohibited. INTRODUCTION Improving efficiency in health care is an acute issue. In the developed world this is due to increases in costs and quality issues (Aptel and Pourjalali, 2001; Spear, 2005); Western Europe currently spends 9% of its GDP on health care, and, if the trend continues, will spend over 20% by the year 2050 (Drouin et al., 2008.) In the developing world on the other hand demand exceed capacity; it was estimated that in 1997 over 12 million people were blind in India from cataracts, while a further 3.8 million new cases are developed each year, and current capacity for surgery is far below this level (Thulasiraj et al., 1997.) Better health care operations are clearly required to deal with issues of ageing population, increased costs and unmet demand. One case that provides clues to such means is Aravind, the largest eye care provider in the world, with over 2.5 million operations performed and 20 million patients treated in the last thirty years. An Indian non-for-profit organization in which two thirds of the patients are treated for free, Aravind attends its goals by strict attention to cost optimization. THE STORY OF DR. V Dr. Govindappa Venkataswamy (known as Dr. V) retired at age 58 from a life in public health as an ophthalmologist in India. He then started, with his sister and brother in law, an 11...

Words: 4108 - Pages: 17

Premium Essay

Business Intelligence

...Communications of the Association for Information Systems (Volume13, 2004) 177-195 177 Business Intelligence by S. Negash BUSINESS INTELLIGENCE Solomon Negash Computer Science and Information Systems Department Kennesaw State University snegash@kennesaw.edu ABSTRACT Business intelligence systems combine operational data with analytical tools to present complex and competitive information to planners and decision makers. The objective is to improve the timeliness and quality of inputs to the decision process. Business Intelligence is used to understand the capabilities available in the firm; the state of the art, trends, and future directions in the markets, the technologies, and the regulatory environment in which the firm competes; and the actions of competitors and the implications of these actions. The emergence of the data warehouse as a repository, advances in data cleansing, increased capabilities of hardware and software, and the emergence of the web architecture all combine to create a richer business intelligence environment than was available previously. Although business intelligence systems are widely used in industry, research about them is limited. This paper, in addition to being a tutorial, proposes a BI framework and potential research topics. The framework highlights the importance of unstructured data and discusses the need to develop BI tools for its acquisition, integration, cleanup, search, analysis, and delivery. In addition, this paper...

Words: 8285 - Pages: 34

Premium Essay

Real Time Business Intelligence

...Communications of the Association for Information Systems (Volume13, 2004) 177-195 177 BUSINESS INTELLIGENCE Solomon Negash Computer Science and Information Systems Department Kennesaw State University snegash@kennesaw.edu ABSTRACT Business intelligence systems combine operational data with analytical tools to present complex and competitive information to planners and decision makers. The objective is to improve the timeliness and quality of inputs to the decision process. Business Intelligence is used to understand the capabilities available in the firm; the state of the art, trends, and future directions in the markets, the technologies, and the regulatory environment in which the firm competes; and the actions of competitors and the implications of these actions. The emergence of the data warehouse as a repository, advances in data cleansing, increased capabilities of hardware and software, and the emergence of the web architecture all combine to create a richer business intelligence environment than was available previously. Although business intelligence systems are widely used in industry, research about them is limited. This paper, in addition to being a tutorial, proposes a BI framework and potential research topics. The framework highlights the importance of unstructured data and discusses the need to develop BI tools for its acquisition, integration, cleanup, search, analysis, and delivery. In addition, this paper explores a matrix for BI data types (structured...

Words: 8282 - Pages: 34

Premium Essay

Business Intelligence

...Communications of the Association for Information Systems (Volume13, 2004) 177-195 177 BUSINESS INTELLIGENCE Solomon Negash Computer Science and Information Systems Department Kennesaw State University snegash@kennesaw.edu ABSTRACT Business intelligence systems combine operational data with analytical tools to present complex and competitive information to planners and decision makers. The objective is to improve the timeliness and quality of inputs to the decision process. Business Intelligence is used to understand the capabilities available in the firm; the state of the art, trends, and future directions in the markets, the technologies, and the regulatory environment in which the firm competes; and the actions of competitors and the implications of these actions. The emergence of the data warehouse as a repository, advances in data cleansing, increased capabilities of hardware and software, and the emergence of the web architecture all combine to create a richer business intelligence environment than was available previously. Although business intelligence systems are widely used in industry, research about them is limited. This paper, in addition to being a tutorial, proposes a BI framework and potential research topics. The framework highlights the importance of unstructured data and discusses the need to develop BI tools for its acquisition, integration, cleanup, search, analysis, and delivery. In addition, this paper explores a matrix for BI data types (structured...

Words: 8282 - Pages: 34

Premium Essay

Women in Combat

...WOMEN IN COMBAT AN INDISPENSIBLE ARMY 21 COMPONENT OR A SIMPLE CASE OF EQUAL OPPORTUNITY? Your mission remains fixed, determined, inviolable – it is to win our wars. Everything else in your professional career is but corollary to this vital dedication. All other public purposes … will find others for their accomplishment; but you are the ones who are trained to fight; yours is the profession to arms. General Douglas A. MacArthur to the West Point Graduating Class of 1962 INTRODUCTION Like the United States military, the infusion of women into the Singapore Armed Forces (SAF) was announced with great fanfare and the proclamation of the politically-correct notion that “women have as much a role to play in the Nation’s defence as the men”. Thankfully, unlike the US military, the inclusion of women into SAF did not result in controversies and scandals that the US military faced in recent years as exemplified in the Tailhook[1] and Aberdeen[2] scandals. Amidst continued declining birth rates and greater economic opportunities, the participation of women in the SAF has been generally accepted as an inexorable development within the organisation without much ado, trusting that the authorities have performed the necessary analysis. Is this naturally the case? Are there larger issues that we need to grapple with, given our unique circumstances, noting that up till today, the US military is still debating on the wisdom of opening up military career opportunities...

Words: 5592 - Pages: 23

Free Essay

Antiphishing

...A Structured Analysis of PHISHING By Prasath Manimaran ID: 20038303 Table of Contents Chapter One – Introduction 1. Research Questions and Objectives……………….…………………………………………….5 Chapter Two – Literature Review & Definition of Phishing 2.1. Literature Review…………………………………………………………………………………………..8 2.1.2. Definitions of Phishing……………………………………………………………………..8 2.1.3. Outcomes of this Study…………………………………………………………………….16 2.2. Research Details 2.2.1. Scope of the Research……………………………………………………………………….17 2.2.2. Research Methodology……………………………………………………………………..17 2.2.3Inductive versus Deductive Study……..………………………………………………..20 2.2.4. Qualitative versus Quantative……………………………………………………..20 Chapter Three – Phishing in a Banking Context 3.1. Confidence in Internet Banking……………………………………………………………………22 3.1.1. Security Requirements………………………………………………………………………23 3.2. Threat Models……………………………………………………………………………………………….25 3.2.1. The Internet Threat Model……………………………………………………..25 3.2.2. Thompson Threat Model……………………………………………………….26 3.2.3. Viral Threaet Model………………………………………………………………26 3.3. The Phishing Threat Model…………………………………………………………………………..26 3.3.1. Identification of Internet Banking Components………………………………..27 3.3.2. Identification of Phishing Threats………………………………………………29 Chapter 4 – Analysis of Current Phishing Techniques 4.1. Modus Operandi………………………………………………………………………………………….…36 4.2. Roles of Adversary in Phishing………………………………………………………………………...

Words: 15039 - Pages: 61

Free Essay

Weapons

...a review, without prior permission in writing from the publishers. Library of Congress Cataloging-in-Publication Data DeVries, Kelly, 1956– Medieval weapons : an illustrated history of their impact / Kelly DeVries and Robert D. Smith. p. cm. — (Weapons and warfare series) Includes bibliographical references and index. ISBN-10: 1-85109-526-8 (hard copy : alk. paper) ISBN-10: 1-85109-531-4 (ebook) ISBN-13: 978-1-85109-526-1 (hard copy : alk. paper) ISBN-13: 978-1-85109-531-5 (ebook) 1. Military weapons—Europe—History—To 1500. 2. Military art and science—Europe—History—Medieval, 500-1500. I. Smith, Robert D. (Robert Douglas), 1954– II. Title. U810.D48 2007 623.4094'0902—dc22 2006102102 11 10 09 08 07 10 9 8 7 6 5 4 3 2 1 Production Editor: Vicki...

Words: 118320 - Pages: 474

Premium Essay

Impact of Celebrity Endorsements on Brand Image

...Impact of Celebrity Endorsements on Brand Image Debiprasad Mukherjee* August 2009 * Debiprasad Mukherjee is a Business Process Management Consultant in IT Telecom domain. He has experience of working with Siemens, IBM, and Tech Mahindra in India and abroad. He holds Post graduation in Management from Indian Institute of Social Welfare & Business Management, India and Bachelor in Technology in Electrical Engineering. His areas of interest are Brand Management, Consumer Behavior, Advertisement, Customer Relationship Management, Data Warehousing, Business Intelligence, Master Data Management etc. Email:- debiprasad.mukherjee@techmahindra.com / debiprasad.mukherjee@gmail.com Contact: - Techno India Building, 6th Floor EM-4/1, Sector V, SaltLake, Kolkata-700091, INDIA Tel No: +91 334002 8146 / +91 9830318394 This paper can be downloaded from the Social Science Research Network Electronic Paper Collection: http://ssrn.com/abstract=1444814 Electronic copy available at: http://ssrn.com/abstract=1444814 Abstract Celebrity endorsement has been established as one of the most popular tools of advertising in recent time. It has become a trend and perceived as a winning formula for product marketing and brand building. It is easy to choose a celebrity but it is tough to establish a strong association between the product and the endorser. While the magnitude of the impact of celebrity endorsement remains under the purview of gray spectacles, this paper is an effort to analyze...

Words: 12521 - Pages: 51

Free Essay

Manager

...RESEARCH AND PRACTICE IN HUMAN RESOURCE MANAGEMENT [pic] [pic] • Volume 16: Issue 2 • Editorial • Keynote • Articles • Research Note • Reviews Highlight, copy & paste to cite: Pio, E. (2008). Threads of Constraint: Ethnic Minority Migrant Women and Employment, Research and Practice in Human Resource Management, 16(2), 25-40. Threads of Constraint: Ethnic Minority Migrant Women and Employment Edwina Pio Abstract Nations, organisations and ethnic minority migrants are compelled to deal with issues emerging from the perceptions and politicisation of ethnicity. Issues of ethnicity are often fore grounded in the zone of work where the complexities of migration, ethnicity, gender and employment intersect. This paper highlights the perceptions of university business students in a New Zealand university with reference to ethnic minority women and employment. Through a study of various databases and the construction of parables on ethnic minority women in New Zealand, the experiences of recruitment and selection, diversity management and career progression emerge as themes in the perceived employment experiences of ethnic minority migrant women. The paper argues for the need to highlight narratives of ethnic minority women through creative pedagogy in order to sensitise business students and future managers to the consequences of migration and a need for the intelligent utilisation of human resources in a world that is...

Words: 8683 - Pages: 35

Free Essay

An Overview of Computer Viruses in a Research Environment

...logic and computer viruses may exploit is undertaken. 1. Introduction A computer virus is a sequence of instructions that copies itself into other programs in such a way that executing the program also executes that sequence of instructions. Rarely has something seemingly so esoteric captured the imagination of so many people; magazines from Business Week to the New England Journal of Medicine [39][48][60][72][135], books [20][22][31][40][50][67][83][90][108][124], and newspaper articles [85][91][92][94][114][128] have discussed viruses, applying the name to various types of malicious programs. As a result, the term “computer virus” is often misunderstood. Worse, many who do understand it do not understand protection in computer systems, for example believing that conventional security mechanisms can prevent virus infections, or are flawed because they cannot. But computer viruses use a number of well-known techniques in an unusual order; they do not employ previously-unknown methods. So, although existing computer security mechanisms were not designed specifically to counter computer viruses, many of those mechanisms were designed to deal...

Words: 12539 - Pages: 51

Free Essay

Organization

...Gordon Reading Specialist New York City Schools . . . Invest fifteen minutes a day for forty-six weeks in order to master 920 new words and almost 200 useful idioms < previous page page_i next page > < previous page page_ii next page > Page ii © Copyright 2000 by Barron's Educational Series, Inc. Prior edition © Copyright 1993, 1987, 1971 by Barron's Educational Series, Inc. All rights reserved. No part of this book may be reproduced in any form, by photostat, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, without the written permission of the copyright owner. All inquiries should be addressed to: Barron's Educational Series, Inc. 250 Wireless Boulevard Hauppauge, NY 11788 http://www.barronseduc.com Library of Congress Catalog Card No. 00-030344 International Standard Book Number 0-7641-1365-8 Library of Congress Cataloging-in-Publication Data Bromberg, Murray. 1100 words you need to know / Murray Bromberg, Melvin Gordon. p. cm. Includes index. ISBN 0-7641-1365-8 1. Vocabulary. I. Title: Eleven hundred words you need to know. II. Gordon, Melvin. III. Title. PE1449.B643 2000 428.1dc21 00-030344 PRINTED IN THE UNITED STATES OF AMERICA 987654321 < previous page page_ii next page > < previous page page_iii next page > Page iii Contents Full Pronunciation Key Weeks 146 Buried Words Words in Context Analogy Review Answers Final Review Test The Panorama of Words...

Words: 125626 - Pages: 503