...Privacy laws and Policies XCOM / 285 04/08/12 After reviewing the Electronic Reserve Readings for our class and reading the classmates threads, I feel that communication privacy laws and policies are necessary in the work place. In this day and age of electronic communication it is very important for an employer to be aware of what an employee is doing on company time and with company property. As law suits are rampant, it is important for a company to protect itself and its employees. If an employee is sending potential sexually offensive material or just offensive material on company time and company property it is important for a company to be able to monitor and stop this action or be held accountable. In some companies an employer needs to be able to monitor an employee for sharing trade secrets and information that could potential harm or cause a loss in revenue. I however feel that it is of utmost importance for each company to determine how much surveillance is needed, with in the guide lines of the law. As brought out in our reading “The erosion of employee privacy by such practices as electronic monitoring and surveillance, however, comes at a cost in the form of increased stress and decreased employee morale, satisfaction and trust in their organization and management (Hornung 2005; Lee and Kleiner 2003). The Constitution’s fourth amendment also protects against “unreasonable search and seizure.” So with in each company a balance needs to be taken to protect themselves...
Words: 361 - Pages: 2
...Privacy Laws and Policies Patricia Tabor XCOM/285 June 2, 2012 Mary Laurenzi Privacy Laws and Policies The laws I looked at were somewhat vague, I discovered that each case is different and is dependent on not only whom you work for, but also the individual employee polices of the company. It is fairly clear that most employees feel that have a right to some privacy in the workplace however more and more often this is not the case. Federal and State employees are somewhat protected by the Fourth Amendment’s right to unreasonable search and seizure. According to E-Monitoring (2006) even this line of defense is limited and not clearly defined. The employee must pose a reasonable expectation of privacy and the offence must be highly offensive to any reasonable person. This is where I see trouble for each person is different and what might be objectionable to one might seem reasonable to another. Private-sector employee must look to other pieces of legislation to offer them aid. The Electronic Communications Privacy Act (ECPA) is a piece of legislation put forth by the Federal Government to protect the privacy of employee’s; there are however three major exceptions that can effect an employee’s right to privacy. These exceptions are the provider, the ordinary course of business, and the consent exceptions. The provider exception states that if the equipment or service is provided by the employer than it can be monitored by said employer. The ordinary course of business...
Words: 358 - Pages: 2
...Privacy Laws and Policies Debate Steven Donally XCOM/285 June 27, 2014 Donna Rossi Privacy Laws and Policies Debate I think there is a simple truth when it comes to privacy in the workplace: it doesn’t exist. Your employer has the right to view anything and everything you do on company equipment. They have the right to read your emails, listen to your phone calls and check you incoming and outgoing mail. I do not think this is a bad thing because you are using company equipment to do these things. If I am using a company computer to write a personal email or to browse the web, my employers have every right to monitor what I am writing and the websites I am visiting. Whether or not I am allowed to do these things is irrelevant. I am using equipment that does not belong to me in order to complete these tasks. Most companies have strict rules with regards to what you are and are not allowed to do with company property. I compare it to a company gas card. People who travel for their jobs are often issued gas cards to pay for their gas along the way. If my company issued me a gas card to use while I was on the road and I used it to buy gas for my personal car on my day off then I would probably lose my job. Much the same way that if I was browsing porn on my company computer I would more than likely be fired. The only way a company can prevent these things from happening is to monitor the...
Words: 276 - Pages: 2
...Check Point - Privacy Laws and Policies Debate For Class XCOM 285 By Hannah Hansen Intro In this paper I am going to talk about the polices and producers that companies put into place in order to protect their investment in their personal computers. Most employees do not understand the risks that companies face by allowing their employees to use personal email and telephones on company time. I will be talking about why these procedures and protocols are in place. We will be looking at three different aspects of protection over emails, telephones, and then computers in general. Computers Many people forget that companies put procedures in place about computer use because of the misuse that some employees of that past have done. The company’s best interest is protecting itself and its clients. To do that they must be able to make sure that the employees who are working for them are doing everything above board. They do this through monitoring employee activity and also by making sure that the computers employees use are not used for employee personal use. If employees use the computers for personal use then they would be able to electronically email important information outside of the company walls where it is not protected. In his article Mitchell R.B. talks about employee types of theft when he says; “other risks may occur as employees use electronic communication systems to download programs and files: violation of copyright laws, vulnerability...
Words: 608 - Pages: 3
... |XCOM/285 Version 2 | | |Essentials of Managerial Communication | Copyright © 2009, 2008 by University of Phoenix. All rights reserved. Course Description This course introduces students to the foundations of communication in a business setting. Students are exposed to various topics related to interpersonal and group communication within the context of applications in an office or virtual setting. Students will develop skills in forms of written communication, including memos, e-mails, business letters, and reports. Communication ethics and cross-cultural communications are also explored. Upon completing the course, students will have an awareness of their personal communication style and be able to identify areas of further exploration of communication as a business skill. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality...
Words: 1987 - Pages: 8
... |XCOM/285 Version 2 | | |Essentials of Managerial Communication | Copyright © 2009, 2008 by University of Phoenix. All rights reserved. Course Description This course introduces students to the foundations of communication in a business setting. Students are exposed to various topics related to interpersonal and group communication within the context of applications in an office or virtual setting. Students will develop skills in forms of written communication, including memos, e-mails, business letters, and reports. Communication ethics and cross-cultural communications are also explored. Upon completing the course, students will have an awareness of their personal communication style and be able to identify areas of further exploration of communication as a business skill. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality...
Words: 2609 - Pages: 11
...qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwer...
Words: 2065 - Pages: 9