Studyspark Study Document

Employee E-Mail and Internet Privacy Policies the Essay

Pages:2 (639 words)

Sources:2

Subject:Business

Topic:Employee Morale

Document Type:Essay

Document:#15729525


Employee E-Mail and Internet Privacy Policies

The increased usage of the Internet and e-mail has changed the way companies do business. Nearly instantaneous communication can take place globally. Information on a countless number of topics can now be accessed from anywhere around the world. These technological developments have not only helped employees increase their efficiencies, but also has given them a new means of distraction from their duties. For this reason, many companies have developed e-mail and Internet policies.

At my job, our e-mail policy states that e-mails should not include illegal or libelous statements. E-mail is to be used for business purposes only and e-mail communications are the property of the company. For this reason, the company may access sent and received from work computers at any time, this includes deleted e-mails that are stored on the company's servers. The Internet policy is similar in that the Internet is also to be used solely for business purposes. In addition, employees are directed to not release confidential information and to always keep anti-virus programs up-to-date. Employees are prohibited from visiting pornographic, illegal, unethical, and any other non-business related sites.

For the most part, current laws regarding e-mail privacy are in favor of the employer. E-mails sent through a company owned system are the property of the company, and therefore they are allowed to review the contents. "This includes web-based email accounts such as Yahoo and Hotmail as well as instant messages" ("Fact sheet 7," 2010). However, there are some instances where courts have ruled in favor of the employee's privacy, such as a March 30th, 2010 New Jersey Supreme Court case in which an employer retrieved an employee's e-mail communication between the employee and their attorney. The Court found this to be an invasion of the attorney-client privilege. Regarding Internet privacy, this too, for the most part can be monitored by the employer, per current laws. Certain union contracts…


Sample Source(s) Used

References

Fact sheet 7: Workplace privacy and employee monitoring. (2010). Retrieved 6 Dec 2010, from http://www.privacyrights.org/fs/fs7-work.htm#4a.

Privacy rights of employees using workplace computers in California. (2010). Retrieved 6 Dec 2010, from http://www.privacyrights.org/ar/employees-rights.htm.

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Internet Privacy the Main Issue

Pages: 4 (1412 words) Sources: 4 Subject: Careers Document: #85476356

According to the current laws, which are not really up to speed yet, an employer can monitor employee email if he or she has a legitimate business purpose for doing so. There is a belief that, because the employer has an email and computer system for employee use, the computer system (as well as the resulting email and browsing history) is the property of the employer. While this makes sense,

Studyspark Study Document

E-Mail Monitoring Affects Employee Stress,

Pages: 13 (5744 words) Sources: 10 Subject: Business Document: #34773416

Often companies find that when they first install filtering software or routers, the sites and communications employees need to do their jobs cannot be done. What is needed then is a gradual move to include those sites and types of communications with outside suppliers, buyers, customers, resellers, services organizations and other key constituents. The use of monitoring however is prevalent, according to the American Management Associated; fully 76% of

Studyspark Study Document

Employee's E-Mail in the Year

Pages: 5 (1326 words) Sources: 1+ Subject: Careers Document: #47705289

One study by the ePolicy Institute found that 85% of employees admit to recreational surfing at work and seventy percent of employees admitted to receiving or sending adult-oriented personal e-mails at work, while 60% admitted to exchanging e-mail that could be considered racist, sexist or otherwise "politically incorrect" (Griffaton pp). In fact most traffic to Internet pornographic sites occurs during regular business hours, probably because Internet connections usually are

Studyspark Study Document

Internet Privacy for High School Students

Pages: 40 (12595 words) Sources: 1+ Subject: Education - Computers Document: #31900441

Internet Privacy for High School Students The unrestrained stream of information is conceived necessary for democracies and market-based economies. The capability of the Internet to make available the vast quantity of information to practically everyone, irrespective of their locations thus entails large benefits. The Internet provides access to the greatest libraries of the world to the students even in the smallest towns and permit the medical specialists to analyze the patients

Studyspark Study Document

Three Basic Problems With Email Today

Pages: 10 (3201 words) Sources: 20 Subject: Education - Computers Document: #95321643

Constraints to Email and Potential Solutions Humankind has been communicating over increasingly lengthy distances over the millennia, beginning with drums and smoke signals, to relay runners and mounted messengers, to the telegraph and telephone and then, during the 1990s, the Internet and email. All of these communication media have their limitations, though, including the most popular written communication method today: email. Indeed, many observers believe that email will eventually spell

Studyspark Study Document

Usability, Affordability, and Ubiquity of Email Cannot

Pages: 2 (598 words) Sources: 1+ Subject: Education - Computers Document: #39588353

usability, affordability, and ubiquity of email cannot be denied. However, along with these benefits come some significant issues that companies must be aware of and try to address. Information overflow, misuse that replaces more appropriate forms of communication, amplified security exposure, right to privacy concerns, and negative implications for work practices represent the dark side of email Email extensions such as alias and distribution lists combined with the near zero

Join thousands of other students and

"spark your studies".