Verified Document

Employee Privacy Since The 1992 Research Proposal

Related Topics:

Employers may unequivocally monitor any message that utilizes company-provided email" (Sherman, 2007, pg. 649). Problems arise when the employer attempts other methods monitoring as Sherman notes; "The law is not clear, however, when an employer accesses an employee's webmail" (Sherman, pg. 649). Similar to the Deal v Spears case, the employer must take certain precautions in order to secure the right of monitoring. Many companies have developed policies and guidelines that are communicated to the employee in order to meet those requirements, but there are plenty of employee rights organizations that worry about infringement of employee privacy. As technology can afford anonymity so to can it provide evidence that see through such anonymity. Thomas Jefferson once wrote; "Laws and institutions must go hand in hand with the progress of the human mind. As that becomes more developed, more enlightened, as new discoveries are made... And opinions change with the change of circumstances, institutions must advance also, and keep pace with the times. We might as well require a man to wear still the coat which fitted him when a boy" (Foley ed., 1900, pg. 726). Though computers were invented long after Jefferson had passed through this world, his words are appropriate even today. Laws, employees and employers must all change with the times.

Laws will need to be updated in order to fully address such issues as employee privacy, while at the same time employers need to be afforded rights as well. The employers...

Employees should expect a certain amount of privacy during work hours, but not at the expense of the employer. It would seem that the most efficient method of addressing this issue is to have all the expectations, rights and privileges of both the employer and the employee spelled out in no uncertain terms. Each party would then know how to conduct itself accordingly. If such expectations had been spelled out before the Spears had installed the monitoring device on the phone line, then Deal may have conducted herself in a more circumspect manner, and if she had continued in her misbehavior, then the Spears would have more than enough rope to hang her.
References

Foley, J.P. (ed.); (1900) the Jeffersonian cyclopedia: A comprehensive collection of the views of Thomas Jefferson, pg. 726

Sherman, M.A.; (2007) Webmail at work: The case for protection against employer monitoring, Touro Law Review, Vol. 23, No. 3, pp. 647-683

United States Court of Appeals; (1992) Sibbie Deal; Calvin Lucas, Appellees v. Newell Spears; Juanita Spears, doing business as White Oak Package Store, Appellants, 980 F.2d 1153, 61 USLW 2353, 8 IER Cases 105

Williams, K.R.; (2008) Protecting what you thought was yours: Expanding employee privacy to protect the attorney-client privilege from employer computer…

Sources used in this document:
References

Foley, J.P. (ed.); (1900) the Jeffersonian cyclopedia: A comprehensive collection of the views of Thomas Jefferson, pg. 726

Sherman, M.A.; (2007) Webmail at work: The case for protection against employer monitoring, Touro Law Review, Vol. 23, No. 3, pp. 647-683

United States Court of Appeals; (1992) Sibbie Deal; Calvin Lucas, Appellees v. Newell Spears; Juanita Spears, doing business as White Oak Package Store, Appellants, 980 F.2d 1153, 61 USLW 2353, 8 IER Cases 105

Williams, K.R.; (2008) Protecting what you thought was yours: Expanding employee privacy to protect the attorney-client privilege from employer computer monitoring, Ohio State Law Journal, Vol. 69, No. 2, pp. 347-390
Cite this Document:
Copy Bibliography Citation

Related Documents

Employee Privacy Torts
Words: 7119 Length: 25 Document Type: Research Paper

Employee Privacy Torts Issues relating to employee privacy have been at the forefront of businesses for many years. This has been fuelled by the dynamic workplace which changes constantly and also by employees and employers being more litigation-conscious. Technology has also spurred on employee privacy issues with e-mail and the internet being related to heightened concerns about vulnerability of employers to litigation. Many employers have thus exacerbated their concerns relating to

Employee Privacy
Words: 1267 Length: 4 Document Type: Case Study

Employee Privacy The objective of this study is to read the case Deal V. Spears United States Court Of Appeals, Eighth Circuit, 980 F. 2D 1153 (1992) and to answer the questions of whether it is lawful to monitor the telephone conversation of an employee if the employee has given prior consent and to answer if in this case whether Deal give her employer consent in this case? This study will

Privacy of an Individual in the Workplace
Words: 2222 Length: 8 Document Type: Essay

Privacy of an Individual in the Workplace Argument Length: 2,000 words Task Construct argument notion individual's privacy important consideration workplace, Use ethical theory support position. Rationale This task designed: demonstrate capacity understand evaluate privacy; demonstrate understanding issues encroach individual's privacy workplace; demonstrate ability construct a compelling argument logically consistent supported ethical theory; Privacy of an individual in the workplace In the workplace, it is expected that employees must relinquish some of their most

Employee Motivation in a Pcba
Words: 17554 Length: 64 Document Type: Dissertation

Indeed, effective problem solving in these circumstances often requires high levels of creative collaboration (Richards, 2007a, p. 34). In recognition of this reality, employers consistently name the ability to work together creatively as a primary and crucial skill -- even though many organizations have created cultures that undercut individual and collective creativity. In order to solve this problem there is a need of a comprehensive review of the facility management

Privacy for High School Students
Words: 12892 Length: 40 Document Type: Term Paper

Internet: Privacy for High School Students An Analysis of Privacy Issues and High School Students in the United States Today In the Age of Information, the issue of invasion of privacy continues to dominate the headlines. More and more people, it seems, are becoming victims of identity theft, one of the major forms of privacy invasion, and personal information on just about everyone in the world is available at the click of

Privacy and Legal Issues to Consider for a Database System
Words: 1276 Length: 4 Document Type: Term Paper

Private and Legal Issues in Database Privacy and legal issues to consider for a database system An essential component in the success of managing database is that management should be concerned with ethical and legal issues associated with both the creation and use of those data in the databases. The use of the database technology provides access to all kind of information about customers, employees, and subjects. However, it has often become

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now