Verified Document

Internet Privacy The Main Issue Thesis

According to the current laws, which are not really up to speed yet, an employer can monitor employee email if he or she has a legitimate business purpose for doing so. There is a belief that, because the employer has an email and computer system for employee use, the computer system (as well as the resulting email and browsing history) is the property of the employer. While this makes sense, some states have enacted 'right to privacy' laws so that companies cannot make this claim against their employees and cannot monitor what they do on the Internet during company time. It then becomes difficult to balance the need to supervise and control employees with the need to make sure that those same employees' rights are not being violated by their employers. There is no clear legal rule as to what is acceptable and what is not in the field of email or Internet monitoring in the workplace, which makes it very difficult for those who are trying to operate a business. Employers are left on their own to try to monitor their employees the best they can while making sure that they do not get too strict and get themselves into trouble with the courts (Boustani 2002).

The best thing that employers can do to protect themselves and keep their employees happy is to create good policies that deal with Internet usage and email, and then stick by them in all circumstances. It is also important that employers monitor their employees only for legitimate reasons, instead of just because they are nosy. If they have a suspicion that an employee is doing something wrong, monitoring them is understandable. Without the suspicion, though, it just seems as though an employer really is prying into an employee's private business. Another thing that the employer needs to do is to be realistic. If employees are in constant fear that they are being watched all of the time, they are not going to perform at the highest level they can because they will be too distracted by the idea of 'big brother' to really focus on their jobs (Monitoring 2002).

Since...

What can be done about the monitoring of email and Internet usage, and how can employees keep their privacy at the same time that employers feel as though they are keeping their employees in line? The question becomes even more important when a person stops to consider that society as a whole can be monitored in stores, restaurants, hotels, and virtually anywhere that visual and audio equipment can be hidden.
There really is very little privacy anywhere in society today, and as soon as a person leaves his or her front door there is no longer an expectation of privacy. The problem of first amendment freedoms could potentially extend to everyone on the planet, not just those who work in an office from 8-5. It is important that email laws are developed and that Internet laws are created so that employee privacy and fairness is balanced with the need for employers to keep track of what is going on in their businesses. Society needs laws that fit the times and the situation, and Internet usage is rather unique. Without new laws on the books that protect employers, employees, and the rest of society, there will always be trouble with electronic media and the people who abuse it.

Works Cited

Boustani, Eric Bakri. (2002). An Employer's Approach to Email Policies. http://www.iplawyers.com/CyberCounsel/an_employer.htm.

Loney, Matt. (2002). Covert Staff Surveillance 'Illegal'. ZDNet UK. http://News.zdnet.co.uk/story/0,t269-s2108075,00.html.

Monitoring Your Employees' Email, Voicemail, Telephone and Internet Use. (2002). Nolo. http://www.nolo.com/lawcenter/ency/article.cfm/objectID/751CFB9F-5A4B-48FB-A85BC08E2D9862E5/catID/30960BF5-6C25-44B9-992E83CC50D5B17A.

Purdy, LeAnn. Email in the Workplace. (2000). http://pigseye.kennesaw.edu/~1purdy/.

Sources used in this document:
Works Cited

Boustani, Eric Bakri. (2002). An Employer's Approach to Email Policies. http://www.iplawyers.com/CyberCounsel/an_employer.htm.

Loney, Matt. (2002). Covert Staff Surveillance 'Illegal'. ZDNet UK. http://News.zdnet.co.uk/story/0,t269-s2108075,00.html.

Monitoring Your Employees' Email, Voicemail, Telephone and Internet Use. (2002). Nolo. http://www.nolo.com/lawcenter/ency/article.cfm/objectID/751CFB9F-5A4B-48FB-A85BC08E2D9862E5/catID/30960BF5-6C25-44B9-992E83CC50D5B17A.

Purdy, LeAnn. Email in the Workplace. (2000). http://pigseye.kennesaw.edu/~1purdy/.
Cite this Document:
Copy Bibliography Citation

Related Documents

Moral Issues with Internet Privacy
Words: 1067 Length: 3 Document Type: Essay

It is seldom possible to draw a sharp line of distinction between what's wrong and what's right. Everybody has their own distinctive view with regard to the major moral challenges linked to internet privacy, right from social media privacy to governmental surveillance. However, all stories have two sides, and this necessitates a closer examination of a few existing moral issues associated with internet privacy. Firstly, one needs to examine the

Gbmc Healthcare Hospital. The Main Issue Relates
Words: 835 Length: 3 Document Type: Case Study

GBMC Healthcare Hospital. The main issue relates to privacy and confidentiality issues considered essential components of fostering trust between healthcare consumers and providers. The issue arose the GBMC hospital did not strictly follow the rules of privacy and confidentiality. Because of its lack of complete control on the privacy issues, many pieces of private information of patients were stolen and compromised. Although GBMC hospital has been committed for 75 years

Internet Security, Risks Internet Security Presents Field
Words: 4724 Length: 15 Document Type: Essay

Internet Security, risks internet security presents field information technology implementing solutions address challenges. The paper 15 pages length ( including title reference page). 1. Title Page: Include, paper title, title, instructor's, date. Internet security In today's advanced technological world, online users are faced with a myriad of problems and risks. Any online user is vulnerable to Trojans, viruses, worms, spyware, and malware. The user is exposed to sniffers, spoofing software, and phishing.

Internet Censorship in America: Censorship
Words: 3127 Length: 10 Document Type: Literature Review

Internet censorship could also result in job losses since a court order may compel online search engines in America to block results or domain names. This could contribute to the instant death of some companies, particularly those with limited resources to fight potential legal cases. In addition, concerns have also been raised regarding the possibility of Internet censorship to weaken the protection provided by the Digital Millennium Copyright Act that

Privacy for High School Students
Words: 12892 Length: 40 Document Type: Term Paper

Internet: Privacy for High School Students An Analysis of Privacy Issues and High School Students in the United States Today In the Age of Information, the issue of invasion of privacy continues to dominate the headlines. More and more people, it seems, are becoming victims of identity theft, one of the major forms of privacy invasion, and personal information on just about everyone in the world is available at the click of

Internet Profiling and Privacy This
Words: 3885 Length: 12 Document Type: Term Paper

Ethics is an essential part of the individual condition. As an important person who starts up a large business as well as deals on a daily basis with other corporation at all arena of expansion so basically business ethics is lively and glowing plus hotly chat about in boardrooms all over the world. Furthermore for the majority of administration and boards know their accountability goes well beyond periodical results.

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now