Premium Essay

Emploiyee Privacy

In:

Submitted By gcc8llrr8
Words 318
Pages 2
What are the e-mail use, Internet use, and privacy policies at your job?

The email policy at my job at the Florida Foundation for Families (hereinafter “FFF”) are that work email is strictly to be used for work purposes and not for personal use. The policy is covered in our Employee Handbook, and states that the rationale for the policy is that we should only be working during work time, and that if we were to use work email for private use, it could expose the company to internet threats that would otherwise be easily avoidable. For instance, if we were to use email for private use and were to open an attachment that contained a virus, we could potentially jeopardize the entire system’s network. During our break periods and lunch we are allowed to use private email accounts, but we are likewise instructed not to open any attachments on our work computers in order to avoid the same threat that would be posed by using our private email accounts for such purposes.

Like our email policy, the internet is supposed to only be used for work purposes as well, however, since work purposes aren’t strictly defined there is definitely more leeway in how we can use the internet, since we could be looking at an article in an online magazine or newspaper that’s work related. We are still forbidden from using any networking sites, like facebook and myspace, since we would be using the internet for non-work purposes. Fortunately, however, like the email policy, we are also allowed to use the internet for personal use during break and lunch periods, but we are strictly forbidden from accessing any obscene or offensive material. This policy is strictly enforced since our organization caters to the development of good families, and it would hurt the organization’s image if a family member saw

Similar Documents

Free Essay

E-Commerce and Csr Issues

...economics and business”. The authors state that while e-commerce, the sale of goods over the internet, has boosted online sales, especially products like books, CDs and computer products; it has also raised important new ethical challenges. These challenges revolve around four main issues: security, privacy, identity and transaction non-refutability. There is no doubt that a new ethical dilemma has arisen and these authors propose two universal principles that must be upheld by internet commerce. The first ethical challenge of internet commerce is security, commonly referred to as “hacking”, ‘cracking”, or “page jacking”. Internet security breaches involve trespassing or breaking into computer networks, websites, and mailboxes. Hackers will steal information from confidential files, steal services or damage a system by swamping a PC, a server or a network. The second ethical challenge relates to privacy, which involves protecting the collection, storage, processing, disseminating and destruction of personal information. They continue that no one is anonymous on-line and what is nirvana for direct marketers is a nightmare for any consumer who wants to protect his or her privacy. On-line advertising can be targeted with great precision today, thanks to “cookies”, a mall text files that companies install on the hard drives of people who visit their sites in order to tract their profiles and browsing habits. Protecting on-line consumers in any web transaction is a great challenge...

Words: 730 - Pages: 3

Premium Essay

E Comemec

...merce and e-business has limitations Ignoring those limitations can cause problems because a company may have expectations that cannot be met, and therefore think the website is "not working" . WTGR .... Limitations of e-Commerce (e-Business) - you should understand some of the limitations and be able to explain these to a potential client because not everyone is convinced the internet will be a major way to conduct business - example TV has been around for a long time - but only a small percentage of all companies advertize on TV !! - radio - some very successful companies, like Sleep Country Canada advertise on radio KEY POINTS Schneider uses the term "Disadvantages" but we can interpret this to mean the same thing as "limitations" . WTGR . o Technical Limitations o Non-Technical Limitations o Technical Limitations costs of a technological solution some protocols are not standardized around the world reliability for certain processes insufficient telecommunications bandwidth software tools are not fixed but constantly evolving (ie. Netscape 3,4,4.7,4.75 etc.) integrating digital and non-digital sales and production information access limitations of dial-up, cable, ISDN, wireless some vendors require certain software to show features on their pages, which is not common in the standard browser used by the majority Difficulty in integrating...

Words: 394 - Pages: 2

Free Essay

Af 302 Essay on Web 2.0 Technologies

...publishing skills to participate, making it easy for people to create and publish or communicate their work to the world. The nature of this technology makes it easy and popular way to communicate information to a much wider audience. There are number of different types of web 2.0 applications including wikis, blogs, social networking, folksonomies, podcasting & content hosting service, YouTube, Facebook, MySpace, and Flickr (Thomson, 2008). However, despite it greater advantageous to our world today, there are some threats involved on the other hand. In this essay, I will discuss some number of privacy and ethical issues associated with the use of this type of technologies. As well some threats such technologies pose for small Pacific Island communities. Lastly, I will discuss the reasons why a privacy bill should or should not be adopted in the Pacific. Ethical and privacy issues related with the use of web 2.0 technologies? Copyright is one of a major issue related with the use of web 2.0 technologies. This ethical issue is referring to copy of others information illegally, by means without the permission of the copyright holder. Using of web 2.0 technologies like Facebook, you tube and other applications nowadays are rapidly growth all over the world. So, this great revolution supports us in every aspects of life. For example, businesses use it to enhance business activities such as advertisement of their products and other related activities. In somehow, these great...

Words: 774 - Pages: 4

Free Essay

Term Paper

...TermPaperWarehouse.com - Free Term Papers, Essays and Research Documents The Research Paper Factory JoinSearchBrowseSaved Papers Home page » Social Issues Why Social Networking Sites Are Addictive In: Social Issues Why Social Networking Sites Are Addictive “Why Social Networking sites are so addictive” Next to the numerous games that often hooks are attention, another thing that most parents problems today towards their children is the social networking sites that is said to be addictive due to its unlimited offers. The connection that can be made between two people distant to each other is such a thing that you simply cannot resist. Not only is discovering new content through all the retweets almost invaluable, but simply striking a conversation about common interests or thanking people for retweets, is a joy! Once you've gotten involved in networking sites, things can escalate quickly. One reason these sites are so addictive is that there's a nonstop stream of messages, photos, updates and information coming from those in your network. If you have 10 friends, it shouldn't be a problem keeping up with them. If your network is 100 friends or more, you might end up online for hours every day, trying to check all of the updates. If you're trading messages back and forth with other members, you might find yourself even more caught up in the exchange, just as you would in a normal conversation. We’re able to communicate with so many people from all across the globe...

Words: 523 - Pages: 3

Free Essay

Person Email

...never talked about this subject? Did the parents only want the email to see what he was up to, or his personal thoughts? Would there be something in the e-mail that would make them think differently of their son? Is it legal for the parents to see this email? Is this a violation of privacy and policy? These are all fair questions in an ethical battle such as this one. What kind of stance would you take? In a perfect world, everyone would be happy with the outcome of any type of conflict morally, or ethically. However, we all have minds, opinions, and that pesky thing called…the law. In the situation of Justin Ellsworth, he didn’t really have a choice at all. He died as an adult, fighting for his country, and his parents wanted access to his personal email. We ask, is this a breech of policy, or is it a right of the parents to see this email because he was their son, and they wanted to know his final thoughts? There are issues here though, that go beyond just what the parents wanted. Issues exist such as whether or not Justin himself would have wanted them to see it, and whether or not the internet provider had to let them see it due to privacy laws. The provider did have a privacy agreement with Justin, regardless if he is dead or alive. There is not a box to click saying “If I die, please allow my family to view my e-mails” on any website I have personally signed up on! I believe that the parents did not have a right to see his e-mail. If he wanted them to...

Words: 856 - Pages: 4

Premium Essay

Thuong

...The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy Ari Juels RSA Laboratories Ron Rivest MIT CSAIL Mike Szydlo RSA Laboratories What is a Radio-Frequency Identification (RFID) tag? • In terms of appearance… Chip (IC) Antenna What is an RFID tag? • You may own a few RFID tags… – Contactless physical-access cards – Automated toll payment • At present, an RFID tag simply calls out its (unique) name or static data over a short distance “Plastic #3” “74AB8” “5F8KJ3” The capabilities of basic RFID tags • No power – Receives power from reader – Range a few meters • Little memory – Static 64-to-128-bit identifier in current ultra-cheap generation (five cents / unit) – Hundreds of bits soon • Little computational power – A few thousand gates – No cryptographic functions available – Static keys for read/write permission The grand vision: RFID as next-generation barcode Barcode RFID tag Fast, automated scanning Line-of-sight Specifies object type Radio contact Uniquely specifies object Provides pointer to database entry for every object Commercial applications • Smoother inventory tracking – Military supply logistics • Gulf War I: Placement of double orders to ensure arrival • Gulf War II: RFID renders supply chain much more reliable • Product recalls • Anti-counterfeiting • Maintaining shelf stocks in retail environments – Gillette Mach3 razor blades • Parenting logistics – Water park uses RFID bracelets...

Words: 1064 - Pages: 5

Free Essay

Information Technology Acts  Paper

...BIS/220 Version 1 April 9, 2010 Information Technology Acts  Paper Many laws have been implemented by Congress to protect the integrity of United States citizens.  With this fast technology  growth. Several of these laws are not even ten years old,   especially some Information Technology Acts.  As the nation grows, our laws grow just as fast.  Information Technology is the “acquisition, processing, storage and dissemination of vocal, pictorial, textual and numerical information by a microelectronics-based combination of telecommunications and computing”.  Includes various areas incluing, computer software and hardware, programming langueages and processes. After doing extensive research in a lot of the Technology Acts, the following acts are going to be discussed within this paper;  Computer Fraud and Abuse Act,   (CFAA) 1986    and Children’s Protection Act, 2000 (CIPA).  CFAA was introduced to reduce cracking of computer systems and to address Federal computer related offenses.  This act, which is codified as 18 U.S.C   § 1030 covers most federal computer related offenses.  California was the first state to legislate a reporting requirement for computer hackers.  The CFAA mainly deals with people who have exceeded the scope of authorized access and computer hackers.  Computer Fraud and Abuse Act. The CFAA knows that a cyber-attack can damage a business as well as incur substantial costs responding to unauthorized use or computer hacking. It would not surprise me...

Words: 656 - Pages: 3

Free Essay

Consensual Relationship Agreements Case Study

...Consensual Relationship Agreements Case Study By: Steven D. Gehring For: Dr. Nasser Assaf Class: Bus 520: Leadership and Organizational Behavior Date: 1 August 2012 Consensual Relationship Agreements Case Study P a g e | 2 “To date or not to date: that is the question: Whether it is nobler in the workplace to suffer the slings and arrows from outraged Human Resource personnel, Or to take the pen to their CRA and by signing love forever.” My apologies to William Shakespeare and his soliloquy from Hamlet (Act 3, Scene 1) but such is the state of affairs for many U.S. companies, human resource personnel and office personnel in today’s litigious world. Since of the days of World War II and later McCarthyism, women have moved into the U.S. work force in greater and greater numbers, filling positions ranging from oil field roustabout to mail room clerk to Chief Financial Officer and CEO. In the meantime, the U.S has experienced a major “sexual revolution” as well as associated changes in the attitudes affecting women in the work place. One of these is dating in the work place. Although no-dating policies are no longer the norm, the advent of anti-sexual harassment laws and the subsequent growth in the number and cost of lawsuits related to these laws, have lead the majority of companies to have in place policies that review the definition of sexual harassment, their company’s rules against it and the possible results to a person who engages in the sexual harassment...

Words: 2332 - Pages: 10

Premium Essay

Conducting a Business

...When conducting any form of business in general, privacy is always a factor. Most people conduct business with the impression that their information is going over a secure network as well as being protected by the overall privacy guidelines used by many businesses. However, many companies uses data mining as a means of directly accommodating potential customers by observing their purchase history and interests. The issue at hand is merely determining how to minimize data mining as it is seen as a violation of privacy to some people. In the article by Minda Zetlin “The Latest Privacy Invasion: Retailer Tracking” the advantages, disadvantages, uses, and tips for minimizing data mining are discussed. Data mining is a statistical process that retailers use to understand their customer’s needs. Any time a customer uses a credit card that customer’s purchase and demographic data can be collected and used for retailer product placement or coupon mailings. Legal questions and concerns, like privacy and consumer rights, about data mining are debated on a regular basis. According to Jacob D. Furst, director of DePaul Information Assurance Center in an article from Zetlin (2012), “Every quarter we have a discussion about privacy with my students, and there’s always a debate” (para. 9). A concern about retailers collecting personal data includes purchasing information that could be used to determine insurance rates for a consumer who eats a large amount of fast food. Currently, consumers...

Words: 511 - Pages: 3

Premium Essay

Workplace Privacy

...conflicting interests concerns the privacy rights and considerations of the employees versus the rights of the employer to monitor the activities of its employees. A relaxed, comfortable workplace promotes good morale but too much comfort can result in a workforce that takes their responsibilities for granted. Achieving a happy medium is the ultimate goal. The development of modern technology has provided employers with increased opportunity to monitor the activities of their employees both on the job and off. Telephone, computers, voice mail, and the internet have provided employers with vehicles that were not available just a decade or so ago. Because of the newness of such devices, regulations and laws governing the use of them are not well developed. As a result, at the present time, employers are enjoying virtually unfettered opportunities to listen, watch, and read most anything and everything that their employees are doing while at work. Some more aggressive employers are even using such devices to do the same in regard to their employees’ private lives as well. In limited cases, some corporations and businesses have enacted policies limiting such interventions by the company but there are very few such companies. The concept of privacy is complicated. What is private for one person may not be for another and when it comes to privacy in the workplace the issue becomes even more complicated. From a legal point of view, what constitutes privacy is essentially the expectation...

Words: 1752 - Pages: 8

Premium Essay

Privacy Laws and Policies

...Privacy laws and Policies XCOM / 285 04/08/12 After reviewing the Electronic Reserve Readings for our class and reading the classmates threads, I feel that communication privacy laws and policies are necessary in the work place. In this day and age of electronic communication it is very important for an employer to be aware of what an employee is doing on company time and with company property. As law suits are rampant, it is important for a company to protect itself and its employees. If an employee is sending potential sexually offensive material or just offensive material on company time and company property it is important for a company to be able to monitor and stop this action or be held accountable. In some companies an employer needs to be able to monitor an employee for sharing trade secrets and information that could potential harm or cause a loss in revenue. I however feel that it is of utmost importance for each company to determine how much surveillance is needed, with in the guide lines of the law. As brought out in our reading “The erosion of employee privacy by such practices as electronic monitoring and surveillance, however, comes at a cost in the form of increased stress and decreased employee morale, satisfaction and trust in their organization and management (Hornung 2005; Lee and Kleiner 2003). The Constitution’s fourth amendment also protects against “unreasonable search and seizure.” So with in each company a balance needs to be taken to protect themselves...

Words: 361 - Pages: 2

Premium Essay

Leg 500

...employee’s everyday activities. At the same time, employees expect to have a certain comfort level by not having their space or privacy invaded in the workplace. “Tension between privacy and the need to know is heightened as computer technology revolutionizes information gathering.” (Halbert & Ingulli, 2010, p. 70) How can employees reasonably expect to have privacy when most companies are carrying some type of monitoring system that will allow employers to monitor the employee’s performance to see if their time is being utilized effectively? “According to a 2005 American Management Association survey, it states both the intensity and range of workplace surveillance is surging, from videotaping to monitoring of IM chat and blogging to GPS satellite tracking of cars and cell phones” (Halbert & Ingulli, 2010, p. 73). Technology has made it easy to track employees and their behavior on a daily basis. Most employers are becoming more knowledgeable on various types of electronic surveillance. For example, some employers monitor their employees email usage. Although, some employees may assume their emails are private; however, they are not. Deleted messages are stored into archive and are accessible to employers and others. (Halbert & Ingulli, 2010) In addition, technology has increased ways of surveillance and is constantly growing, leaving very little privacy in the workplace. For instance, there are programs that can take surreptitious “screen shots” of employees computer, Porn sweeper...

Words: 1222 - Pages: 5

Premium Essay

E-Commerce

...Process that has changed my life The internet has greatly changed the lives of many people in my country and definitely the world over. Now people are able to do things which they could not do before the coming of the internet. The following are how the internet has influenced many people: • E-banking • E-learning • Communication through emails, social networks and Skype, for example • Ecommerce • Surfing the internet for learning • Research. This list is not exhaustive. However one process that changed my life very much is through searching for jobs online. There are a lot of employment agencies that are online. People can register with them for their services. I registered with a number of employment agencies in my country. I can now search for jobs and apply for jobs on the internet in a fast and efficient manner. Before the use of the internet for that purpose people would be required to use express mails or postal services to apply for jobs. People could also travel for long distances in search of employment. I can no longer do that. I have changed jobs in the past ten years through online applications. It now takes very little time to search for employment. The employment agencies, can as well keep data bases of job seekers, so much that it is easier to find right candidates for employment. In the past ten years I changed jobs four times by the use of the internet. That has not been very expensive for me. Now I am earning a lot of money because I managed to search...

Words: 9963 - Pages: 40

Premium Essay

Case Study: Ethics and Local Governance

...information scattered across numerous departments without the ability to share any of the information across the enterprise. The decision to create a master client index that will clean up duplicate and fragmented data files, improve operational efficiencies, there are over 1.5 million records of the 2700,000 citizens that will be matched and linked from several different databases, providing a real time view of each customer’s data, this process will be very beneficial and achieve optimal operational efficiency. The two potential ethics issues associated with the consolidation of citizen records in the London Borough of Bren. First the privacy of the information of the citizens within those records may contain intimate details about their lives that should be kept private would probably be my biggest ethics issues concern. Some people enjoy their privacy and don’t want their information readily available for people to see without their consent. Some of information of the citizens records listed within the database could be very sensitive and personal information about someone’s disabilities, medical records, mental, and physical condition listed within the records. The misuse of this information concerns me because it can be used in many different negative ways; one of the most common misuses of such detailed information is profiling different individuals, groups based on their race, actions, and beliefs, profiling can also be used to seclude groups and individuals from the rest of...

Words: 787 - Pages: 4

Premium Essay

Privacy Laws and Policies Debate

...XCOM285 December 21, 2012 University of Phoenix Privacy Laws and Policies Debate I have looked at both sides of the argument when it comes to communication privacy laws in the workplace. There are some good points to monitoring employees, that I read about such as “using monitoring as a positive aid for training, improving service, ensuring compliance, protecting employees, customers, and so forth, and to assist in fairly evaluating employee performance.” But If I have to choose a side I would go against monitoring employee’s computers, listening in on calls, and video surveillance. I think my biggest concern is the fact that many employers will go too far. There will be no privacy at all for the employee in the workplace, except in the restrooms. I think this total lack of privacy and lack of trust shows an employer has no respect for the employees. Employers need to consider the effect such monitoring has on their employees since employee and employer attitudes about monitoring often diverge. There should be a pretty good battle over this issue, what with so many people being concerned with their privacy, but on the other hand so many companies making big money on software that is used to spy on a companies’ employees. Software manufacturers in 2004 expected the sale of computer monitoring and surveillance software to businesses to increase from $139 million in 2001 to $622 million in 2006 (Wakefield 2004). There aren’t any constitutional or federal...

Words: 383 - Pages: 2