Electronic Surveillance on-The-Job: The Pros and Cons of Employee Monitoring
Modern technology has allowed employers many new capacities, including the capacity to electronically oversee employees every action while on-the-job. In recent years many employees have argued that surveillance while on-the-job is a violation of their right to privacy. Employers argue however that employees should not have a right to privacy in the workplace, especially as the employer pays them to perform a duty for the employer. Despite this almost 100% of employees likely report at one time or another engaging in some personal business while at work.
Unfortunately, there are few laws that side with the employee at this time. Most laws argue in favor of the employer, as long as the employer tells the employee of their plans about employee surveillance at the workplace. Below we'll discuss what types of surveillance corporations are now using to protect themselves, and discuss the advantages and disadvantages such methods have for employees.
Background
More and more employers are watching employees in the workplace, especially using computer information systems to track employee communications. Though many employees claim electronic surveying violates their right to privacy in the workplace, many organizations back up the practice claiming they have a right to make sure employees are engaging in productive activities while on-the-job. Electronic surveying takes many different forms, and may include collection, analysis and reporting of information from computer terminals, telephone conversations and even extracting information from employee voice mail messages (Crampton & Mishra, 4).
Facts and Statistics
More than 26 million workers are monitored each year in the United States, with more employers adopting surveillance measures every year (DeTienne, 33). Many of the workers recorded are evaluated from a performance level by electronic surveying. Some studies suggest that as many as 30 million people in the next decade will be consistently watched to discover their day-to-day activities on-the-job (DeTienne, 33).
There are many different employee monitoring devices available for employers today. The most common is computer monitoring systems (Losey, 77). These systems often evaluate the accuracy and keystrokes an employee inputs into the system (Crampton & Mishra, 4). Other monitoring includes surveillance of employee activities through video surveillance cameras. These cameras can check employee activities at and away from employee terminals. Of particular interest to employers are activities such as theft, horseplay, safety and spying (Crampton & Mishra, 4).
Computer monitoring systems are by far the most common systems used by employers to track employee work roles. Computer monitoring can even detect the time an employee spends away from their computer terminal or whether they are idle while at their computers. Keystroke monitoring however is much less invasive than e-mail and communications monitoring. More and more employers are viewing private e-mail messages and other communications that employees send while on-the-job. Employers often justify this practice by claiming they have a right to ensure that employees are working while on-the-job rather than using personal time and the organizations equipment to conduct private business.
Many employers' record e-mail and voice mail as common practice (Crampton & Mishra, 3). Most employers are able to use new technologies to check e-mail even after an employee deletes their e-mail. Most messages are permanently backed up by organizations using computer information systems. Unfortunately there are few federal laws that specifically restrict an employer from reading any e-mails or computer files and employee creates (Crampton & Mishra, 4). Studies suggest that as many as one in five companies search employee e-mails and other computer files.
Other means employers adopt to record employees include eavesdropping on employee conversations by phone tapping. Phone tapping allows employers to track incoming, outgoing and the frequency of phone calls (Crampton & Mishra, 4). Even employee security badges provide employers a means to track employees, by monitoring their location and the number of times they a building.
At this time there are no comprehensive federal laws that protect employee privacy on-the-job (Alderman, 31). Rather, because of advancements in technology organizations are better able to record employees using information technology without consequence
Electronic Communications Privacy Act
The most well-known law related to employee monitoring in the workplace is the Electronic and Communications Privacy Act. Employees are granted some protections under the law but thanks to laws like the Electronic Communications Privacy Act most employees are subject to surveillance. This act does not limit the policies organizations use for allowing employees to use company property for private e-mail.
There are in fact many interpretations of this law. In general, the law protects individuals from unauthorized access to their e-mail,...
The company's consistent top line revenue growth also illustrates it has been successful in transforming its supplier network into one that operates more on knowledge, less on purely price or product decisions. As a result the company is capable of competing more at the process level and less at the purely price-driven one (Reese, 2007). In terms of the company's factors for success, the greater opportunities is to move into
This is so important because the current business environment is full of competitions and therefore firms that don't focus on external value creation eventually lose their competitive advantage (Spulber,2009). The current business scene is very competitive meaning that each form must have an edge so as to win over more customers. The process requires that the internal and the external business processes be fine tuned using all tools available.
Multinational management challenges regarding project work refer to its complexity, scope, and risks. Specialists have observed that large it projects provide important advantages to joint ventures. This is related to the development of global teams. The indicators in these cases have been identified as technical difficulties, evolving solutions, innovation, and others. The challenges of large it projects are addressed by several types of management approaches, in accordance with the characteristics of
Monitoring Employees Employee Monitoring Discussion In the United States, employment law is based on a minimal expectation of privacy (Rosser, 2011). This means the interest of the business takes precedence over the employee's right to privacy. If an employee is conducting personal business on the employer's property, or using the employer's property, such as computers, to conduct personal business, the employee's business is not private under law. The Securities and Exchange Commission and
First, as Personal Trainer expands globally, the system will be available through web browsers anywhere in the world. Second, the ease of completing system upgrades across all users at the same time needs to be taken into consideration, and the use of the Web-based system architecture hosted on a Software-as-a-Service (SaaS) platform is critical. Third, by taking this approach Susan can b e assured there will be higher levels
Information System/Internet Strategy Information technology and Internet systems have become such an integrated part of life today that all businesses of any significant size have at least some form of electronic media as part of their daily operations. Indeed, it is difficult to imagine how any business could function without at least an e-mail platform or an electronic database connection. What I have learnt about decision making, the role of information,
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now