Free Essay

Xcom/285 Privacy Policies and Laws

In:

Submitted By honeycomb822
Words 933
Pages 4
Privacy Policies and Laws Debate XCOM/285 Essentials of Managerial Communication

When thinking about privacy laws and policies, it is safe to clearly state that I am for them. Many people feel that some employers go over board when it comes to this kind of thing but in this age of technology, having privacy polices is not only right it is essential to maintain the respect of the people who work for and with people. There is much evidence that even with privacy policies in place the some employees still use company communications for personal use. There is no clearer evidence of this than that fact the government had to pass laws of privacy laws to protect companies that felt they needed to watch their employee’s use of their communications for any personal use of company communications. These laws were passed so angry employees who were caught using company communications for private things could not go back and sue companies for invasion of their privacy. The ironic part of employees getting upset over what they perceive as an invasion of their privacy is the fact most companies make employees sign privacy agreement policies and then get angry when they get caught breaking them. Privacy policies are not just to protect employers from employees using their communications for private business, but privacy policies are needed to protect companies from viruses that can come in through private emails or even worse emails with traces that can get into a company’s personal files which can contain customers personal information up to and including credit card or bank account numbers. There are people who will say that there is no harm in checking your email or visiting you social networking site from work, but there is too much at risk when you think about the other information that company’s computers can contain to take even the slightest risk that an employee could accidently either allow a virus in or be talking on the phone an let slip some kind of confidential information. There simply is not excuse for breaking a company’s privacy policies and I believe that when companies have these in place they have very good reasons and any employee should not be upset if they are caught breaking them. After reading some articles on this subject I found out some pretty interesting information. When the government passed the Electronic Communication Privacy Act EPCA), there is only one clear way an employer is protected under it. They have to be the owner and sole provider for the phone, internet, and email services for their company in order to be completely covered by this law (Nord, McCubbins, and Nord 2006). Now when a company gets their phone, internet, and email from a third party provider, protection provided by the ECPA is not so clear cut. However the general policy is that if the employer is providing these communications for their company and the fact the most courts give a very generous interpretation of this law means that even if there is a case when a company may back this law very really do companies lose because the courts look at this law as things that happen during the normal course of business ( Nord, McCubbins, and Nord 2006). So basically companies can get away with the privacy policies they have even if they do not meet the letter of the law which in turn makes it much easier for employers to access employee’s computer, phone, and other communications to make sure no privacy policies are being broken. Now to just touch on the other side of this issue, I found an article titled, The Boundaries of Privacy Harm. This article was about the legal issues that can come from privacy laws and policies are used to hurt people (Calo, 2011). The examples that were in this article are very clear examples of how invading a person privacy can be a huge problem. Like a landlord who eavesdrops on his tenants without their knowledge, identity thief, and leaking classified information about an undercover agent (Calo, 2006). These are very clear problems that can come from people invading other people privacy. The issue about privacy harm some say does not exist and others say that it does. The one thing that everyone seems to agree on is that the issue of what is or is not an invasion of someone’s privacy is a long way from being resolved. There are many different opinions about what is and what is not invading ones privacy but the fact remains when you are doing something at work or in any place you know that your being monitored, it is you responsibility to make sure you are doing what is allowed by that company. Private business should never be taken care of at work and I believe that employers have a right to make sure their employees are not abusing their communication services. If you willing sign paper work that saying you willing agree to abide by whatever a company’s privacy policies are, then you should not be shocked to find out that your employee is watching to make sure that you keep you word to them and to any of the people you work for or with.

References:
Locker, K., & Kienzler, D. (2008). Business and administrative communication (8th ed.). New York: McGraw-Hill.

Nord, G. Daryl, McCubbins, Tipton F. & Nord Jeretta Horn (2006) E-monitoring in the Workplace: Privacy, Legislation, and Surveillance

Calo, Ryan M. (2011) The Boundaries of Privacy Harm, Indiana law Journal

Similar Documents

Premium Essay

Privacy Laws and Policies

...Privacy laws and Policies XCOM / 285 04/08/12 After reviewing the Electronic Reserve Readings for our class and reading the classmates threads, I feel that communication privacy laws and policies are necessary in the work place. In this day and age of electronic communication it is very important for an employer to be aware of what an employee is doing on company time and with company property. As law suits are rampant, it is important for a company to protect itself and its employees. If an employee is sending potential sexually offensive material or just offensive material on company time and company property it is important for a company to be able to monitor and stop this action or be held accountable. In some companies an employer needs to be able to monitor an employee for sharing trade secrets and information that could potential harm or cause a loss in revenue. I however feel that it is of utmost importance for each company to determine how much surveillance is needed, with in the guide lines of the law. As brought out in our reading “The erosion of employee privacy by such practices as electronic monitoring and surveillance, however, comes at a cost in the form of increased stress and decreased employee morale, satisfaction and trust in their organization and management (Hornung 2005; Lee and Kleiner 2003). The Constitution’s fourth amendment also protects against “unreasonable search and seizure.” So with in each company a balance needs to be taken to protect themselves...

Words: 361 - Pages: 2

Free Essay

Privacy Laws and Policies

...Privacy Laws and Policies Patricia Tabor XCOM/285 June 2, 2012 Mary Laurenzi Privacy Laws and Policies The laws I looked at were somewhat vague, I discovered that each case is different and is dependent on not only whom you work for, but also the individual employee polices of the company. It is fairly clear that most employees feel that have a right to some privacy in the workplace however more and more often this is not the case. Federal and State employees are somewhat protected by the Fourth Amendment’s right to unreasonable search and seizure. According to E-Monitoring (2006) even this line of defense is limited and not clearly defined. The employee must pose a reasonable expectation of privacy and the offence must be highly offensive to any reasonable person. This is where I see trouble for each person is different and what might be objectionable to one might seem reasonable to another. Private-sector employee must look to other pieces of legislation to offer them aid. The Electronic Communications Privacy Act (ECPA) is a piece of legislation put forth by the Federal Government to protect the privacy of employee’s; there are however three major exceptions that can effect an employee’s right to privacy. These exceptions are the provider, the ordinary course of business, and the consent exceptions. The provider exception states that if the equipment or service is provided by the employer than it can be monitored by said employer. The ordinary course of business...

Words: 358 - Pages: 2

Premium Essay

Privacy Laws

...Privacy Laws and Policies Debate Steven Donally XCOM/285 June 27, 2014 Donna Rossi Privacy Laws and Policies Debate I think there is a simple truth when it comes to privacy in the workplace: it doesn’t exist. Your employer has the right to view anything and everything you do on company equipment. They have the right to read your emails, listen to your phone calls and check you incoming and outgoing mail. I do not think this is a bad thing because you are using company equipment to do these things. If I am using a company computer to write a personal email or to browse the web, my employers have every right to monitor what I am writing and the websites I am visiting. Whether or not I am allowed to do these things is irrelevant. I am using equipment that does not belong to me in order to complete these tasks. Most companies have strict rules with regards to what you are and are not allowed to do with company property. I compare it to a company gas card. People who travel for their jobs are often issued gas cards to pay for their gas along the way. If my company issued me a gas card to use while I was on the road and I used it to buy gas for my personal car on my day off then I would probably lose my job. Much the same way that if I was browsing porn on my company computer I would more than likely be fired. The only way a company can prevent these things from happening is to monitor the...

Words: 276 - Pages: 2

Premium Essay

Privacy Laws and Policies

...Check Point - Privacy Laws and Policies Debate For Class XCOM 285 By Hannah Hansen Intro In this paper I am going to talk about the polices and producers that companies put into place in order to protect their investment in their personal computers. Most employees do not understand the risks that companies face by allowing their employees to use personal email and telephones on company time. I will be talking about why these procedures and protocols are in place. We will be looking at three different aspects of protection over emails, telephones, and then computers in general. Computers Many people forget that companies put procedures in place about computer use because of the misuse that some employees of that past have done. The company’s best interest is protecting itself and its clients. To do that they must be able to make sure that the employees who are working for them are doing everything above board. They do this through monitoring employee activity and also by making sure that the computers employees use are not used for employee personal use. If employees use the computers for personal use then they would be able to electronically email important information outside of the company walls where it is not protected. In his article Mitchell R.B. talks about employee types of theft when he says; “other risks may occur as employees use electronic communication systems to download programs and files: violation of copyright laws, vulnerability...

Words: 608 - Pages: 3

Premium Essay

Xcom Syllabus

... |XCOM/285 Version 2 | | |Essentials of Managerial Communication | Copyright © 2009, 2008 by University of Phoenix. All rights reserved. Course Description This course introduces students to the foundations of communication in a business setting. Students are exposed to various topics related to interpersonal and group communication within the context of applications in an office or virtual setting. Students will develop skills in forms of written communication, including memos, e-mails, business letters, and reports. Communication ethics and cross-cultural communications are also explored. Upon completing the course, students will have an awareness of their personal communication style and be able to identify areas of further exploration of communication as a business skill. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality...

Words: 1987 - Pages: 8

Premium Essay

Intelligence

... |XCOM/285 Version 2 | | |Essentials of Managerial Communication | Copyright © 2009, 2008 by University of Phoenix. All rights reserved. Course Description This course introduces students to the foundations of communication in a business setting. Students are exposed to various topics related to interpersonal and group communication within the context of applications in an office or virtual setting. Students will develop skills in forms of written communication, including memos, e-mails, business letters, and reports. Communication ethics and cross-cultural communications are also explored. Upon completing the course, students will have an awareness of their personal communication style and be able to identify areas of further exploration of communication as a business skill. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality...

Words: 2609 - Pages: 11

Premium Essay

Business Writing Portfolio

...qwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmqwertyuiopasdfghjklzxcvbnmrtyuiopasdfghjklzxcvbnmqwer...

Words: 2065 - Pages: 9