Free Essay

Should Internet Activity Be Monitored

In:

Submitted By tarios79
Words 2294
Pages 10
Tina Rios
Business Law I
Position Paper

Should Internet Activity be Monitored?

There has been an ongoing debate over many years on whether or not internet activity should be legally monitored by Internet Service Providers or the government. Obviously there many pros and cons to both sides of this issue. There is not only a valid need for internet monitoring of private networks in addition to government systems, but there is also a valid concern for the privacy of our country’s citizens. Both sides of this issue will be addressed as well as my own analysis of this topic. There is quite a bit of history regarding monitoring public internet communications. Some forms of electronic surveillance have been around since the Civil War. The 4th Amendment is a citizen’s primary protection against unreasonable government searches and seizures. As technologies advance the meaning of unreasonable becomes more and more unclear; meaning when private information is transmitted through wire over a long distance is it still considered private information? During the 1920’s, as phone calls were being place through switchboards, it was noticed that more and more conversations regarding illegal activities were being talked through those phone calls. It was then that police asked for clarification from the Supreme Court on whether or not wiretaps went against the 4th Amendment. It was decided that the 4th Amendment did not restrict wiretaps since there was no search not seizure. Government agencies, such as FBI and National Security Administration have argued that national security requires eavesdropping on electronic communications. Due to the terrorists attacks on September 11, 2001, the question went from “Should we continue to protect personal privacy to should we authorize the Bush administration to use surveillance to find terrorists operating inside the United States and stop them before they attack again?” Cyber crimes are increasing and will continue to do so as technology advances and are getting much harder to control and will continue to be difficult to control if something is not put into place. They include numerous types cyber crimes to include: fraud, such as: financial, computer, identity theft, debit/credit card…etc., child exploitation, online gambling, phishing scams, cyber stalking/bullying, and computer viruses, just to name a few. In 2004, Kenneth Flury was charged with bank fraud and conspiracy when he tried to steal debit card account numbers, pins and other personal information from Citibank. The US Secret Service got involved as part of Operation Firewall. He ended up getting over $380,000. He was sentenced to 32 months in prison and 3 years of supervised release and pay $300,000 in restitution to Citibank. In 2005, Jeanson Anceta used botnets to launch destructive spam and adware attacks. Most of his damage affected the computers used by the Federal Government for National Defense. He generated over $100,000 in proceeds. He was sentenced to 5 years in prison and has to undergo 3 years of supervised release which limits his internet and computer use. He also has to pay the Weapons Division of the United States Naval Air Warfare Center $15,000 in restitution and relinquish $58,000 of his profits from his illegal activities. In November 2008 a mother reported that a 20 yr old male was having sexual conversations with her 12 yr old son through Xbox live. She gave the tip line his first name, numerous screen names, and a possible location. The Exploited Children’s Division conducted internet searches using the screen names and found a discussion board posting and discovered an email address. After analyzing the information the analyst notified the New Jersey Internet Crimes Against Children task force. After further investigation, it was found that there were previous complaints against the suspect and due to the tip from the Cyber Tip Line authorities were able to tie up the lose ends of prior reports and arrest a 21-year old suspect for possession of Child Pornography and multiple counts of Endangering the Welfare of a Child. At this time it is believed that there are at least 10 child victims. In 1996, the FBI only investigated 113 cases involving child exploitation via the internet; in 2001 the FBI opened 1,559 cases. The Internet Crimes Against Children program was launched by Congress and the Department of Justice in 1998 and between then and 2001 these task forces have arrested over 900 predators. There are numerous cases on cyber crimes that may have been preventable if internet activity were being monitored. FBI Director Robert Mueller said “the idea balances on one hand, the privacy rights of the individual who are receiving the information, but on the other hand, given the technology, the necessity of having some omnibus search capability utilizing filter that would identify the illegal activity as it comes through and give us the ability to preempt that illegal activity where it comes through a choke point.” The federal government is launching an expansive program called “The Perfect Citizen” to detect cyber assaults on private companies as well as government agencies like power and water companies that make up the critical infrastructure of the nation. The program will focus on monitoring network activity and identifying suspected cyber attack against government and critical networks. A US military official called this program long overdue and said any intrusion of privacy is no more than what the public already comes across from traffic cameras. The program would rely on sensors deployed in computer networks for critical infrastructure that would be triggered by unusual activity suggesting a cyber attack, but wouldn’t monitor the whole system continuously. It is still in the early stages and there are still many aspects of this program that still needs to be worked out, such as which systems will be monitored and how the data will be collected. Although the government cannot force companies to work with them, it may offer incentives. The key issue is how to build the confidence with American people that the government is doing is the right step in the right direction. Einstein technology will also assist in the Internet monitoring process. It is designed to detect and prevent electronic attacks to networks operated by the private sector even though it was created for federal networks, says the Department of Homeland Security’s top cyber security official. It is already in place at 15 federal agencies, but DHS has said it’s still preparing the necessary privacy impact assessment for a proposed $293 million government wide Einstein expansion. Einstein 3 has the ability to read content of emails and other messages. According to the Dept of Homeland Security, “if it performs as well as we hope, it could help unprepared companies fend off cyber attacks, including worms sent through e-mail, phishing attempts, and even denial of service attacks.” During its packet inspection to prevent botnets from accessing certain web pages, it could also be used to prevent pedophiles from accessing illegal child pornography, prevent individuals from downloading copyright-infringing music, or offshore gambling sites. At a recent conference, Homeland Security Secretary Janet Napolitano stressed “We need to have a system that works together.” She also states “Fighting homegrown terrorism by monitoring internet communications is a civil liberties trade-off the U.S. government must make to beef up national security. As terrorists increasingly recruit U.S. citizens, the government needs to constantly balance Americans’ civil rights and privacy with the need to keep people safe.” She says that it is wrong to believe that if security is embraced that liberty is sacrificed. Jacob Appelbaum, a security researcher and programmer, said “It’s clearly a win for people without the security know-how to protect their own networks but also a clear loss of control. And anyone with access to that monitoring system, legitimate or otherwise, would be able to monitor amazing amounts of traffic.” Privacy to some seems to be more important rather than safety. For some Internet Service Providers it is just not financially feasible and others it comes down to principle. Of course there is cause for concern that the NSA will overstep its boundaries and monitor all public network activity. Under the Child Protection and Sexual Predator Act, ISP’s are not required to monitor electronic communications but does require then to contact authorities as soon as they are made aware that it is on one of their networks. If they fail to do so they can be fined $50,000 for their first violation and $100,000 for additional violations. In an article called “The Already Big Thing on the Internet: Spying on Users,” Adam Cohen says that since ISP’s control your connection, they can keep track of everything you do online, there have been reports that ISP’s may have started to sell that information. AOL spokesman, Nicholas Graham stated “We have a much honored privacy policy, we absolutely do not monitor private communications between members and that includes IM’s, email, and chat rooms. Members are asked to notify AOL if they come across any kind of material like that. That’s part of the self-policing nature of our service.” According to Maureen Richter, Chief Financial officer for Cove Software Systems says she couldn’t monitor her network even if she wanted to due to the cost of bandwidth. She stated she would have to raise her prices to pay for it and would lose customers. In a survey taken in a previous class 35% of students disagreed with ISP’s monitoring web searches, email, and chat logs for safety. Most stated they don’t feel endangered by the internet. In a recent online survey about NSA’s Perfect Citizen plan to monitor cyber security 45% of voters thought it was a terrible idea. Only 19.7% thought it was a great idea. Department of Homeland Security did prepare a general set of guidelines for privacy and civil liberties in June 2009. In my opinion, I believe giving up a portion of our privacy to keep our country safe from future possible terrorist attacks, to keep our children safe from online predators, and anyone else safe from identity theft, etc then I think it is well worth it. There are companies that do have monitoring type software on their network that only records the information when key words or phrases are used. Almost like if you say the word bomb in an airport, regardless of how you use it, you are going to be stopped and questioned before you are able to go on your way. Just because ISP’s may not be monitoring your internet activity doesn’t mean someone else isn’t. Identity theft, and children being victimized happen over the internet everyday, unfortunately and it is because internet safety is not taken seriously. In Privacy Requires Security, Not Abstinence, a US Military contractor was accused of victimizing more than 4,000 teens by breaking into their computers and threatening to make their pictures and videos public unless they sent him sexually explicit photos and videos of themselves. I can understand not wanting to be spied on, but if you are not doing anything wrong to begin with then why worry about it. I mean if the programs are ran properly, as long as you’re not looking at exploiting children, how to make bombs, or planning a terrorist attack on the US or anything remotely along any of those types of lines then you’re not going to be harassed about anything and you won’t even know it’s being monitored. When the programs are run properly your information won’t be flagged to get monitored if you are not doing that kind of activity on your computer to begin with. I know there is always going to be that possibility of someone abusing the program and maybe using it for personal use or what not but that is really the case with any kind of program that is in use today especially by law enforcement. If it’s going to give me more security being online and keeping my kids safe while they are online then I really don’t care if someone is monitoring what I am doing, since I don’t plan on doing anything illegal. If there was a program that monitored what needed to be intercepted and analyzed who knows, maybe Sept 11th wouldn’t have happened. Imagine all the families that would still have their loved ones. What if those pedophiles that are out there preying on our children were monitored by their ISP’s and reported when attempting to engage in that type of behavior. Imagine all of those defenseless children who would have never been humiliated, tortured, raped almost on a daily basis. Benjamin Franklin said “They who would give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety.” It’s a good thing that giving up a portion of our online privacy isn’t going to provide anything little and anything temporary.

Resources: www.dhs.gov/xlibrary/assests/privacy/privacy_pia_eisntein.pdf, accessed 18 Sept 10 www.pcworld.com/businesscenter/article/200706/nsa_perfect_citizen_raises_big_brother_concerns_in_private_sector.html, accessed 18 Sept 10 http://news.cnet.com/8301-10784_3-9926899-7.html, accessed 20 Sept 10 http://www.technologyreview.com/web/22831/, accessed 20 Sept 10 http://news.cnet.com/8301-13578_3-10463665-38.html, accessed 20 Sept 10 www.fbi.gov/cyberinvest, accessed 22 Sept 10 www.eweek.com/c/a/security/nsa-cyber-security-program-details-revealed-275248, accessed 23 Sept 10 www.nytimes.com/2008/04/05/opinion/05sat4.html, accessed 23 Sept 10 www.brighthub.com/internet/security-privacy/articles/83739.aspx, accessed 25 Sept 10 www.onlin.wsj.com/community/groups/security/topics/do-you-think-nsas-perfect, accessed 25 Sept 10 http://online.wsj.com/article/SB10001424052748704545004575352983850463108.html, accessed 25 Sept 10 www.privacyrights.org/fs/fs18-cyb.htm, accessed 25 Sept 10

Similar Documents

Premium Essay

The Effect of E-Money Distribution on Mobile Money Adoption in Africa

...ELIZABETH BAAPA BUAH SB/DMK/14/0012 4. EZEKIEL ARTHUR MENDS SB/DMK/14/0002 5. NATHANIEL DUAH ADJEI SB/DMK/14/0003 6. FREDRICK A. ASIEDU SB/DMK/14/0010 CASE STUDY MONITORING EMPLOYEES ON NETWORKS: UNETHICAL OR GOOD BUSINESS?. LAUDEN & LAUDEN (2014), PAGE 296-7 Question 1. Should managers monitor employee e-mail and internet usage? Why or Why not? Employee email and Internet usage monitoring in the workplace may put employers and employees in conflict because both sides are trying to protect personal interests. Employees want to maintain their personal privacy while employers want to ensure company resources are not misused. Employers monitor Internet use in the workplace to protect their companies from legal problems that could arise if employees use company computers for inappropriate or illegal online activities, such as racist, sexually explicit or other potentially offensive materials accessed or traded by their employees which could result in adverse publicity. They are also concerned about a decline in productivity as some workers use the Internet to handle personal activities such as checking personal email, responding to instant messages or sneaking in a brief YouTube video which creates series of non-stop interruptions that divert employees’ attention from the job tasks they are supposed to be performing. More over Strict monitoring allows employers to spot potential problems early, get the information...

Words: 1460 - Pages: 6

Premium Essay

Information and Technology

...Information Technology (IT) and E-commerce have been on a constant up-rise, over the past couple of decades. Many organizations have found ways to grow and remain profitable, by creating a good mixture of e-commerce and IT. E-commerce can cover a range of areas, but focus mainly on internet sales and product marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human Resources Team and Management team, for perspective departments. The company...

Words: 1127 - Pages: 5

Premium Essay

Weekly Summary

...Security Monitoring Activities CMGT/442 May 21, 2012 Security Monitoring Activities Any company that considers data an asset must realize the importance of risk management. Managing risk helps a company identify vulnerabilities and allows actions to be taken to reduce or stop these vulnerabilities. Risk management is also helpful in the attainment of goals and higher profits by attempting to eliminate any risk that may cost the company extra money to rectify. This paper will discuss security monitoring activities that must be addressed for both internal information technology (IT) and electronic commerce (e-commerce) applications of an organization. The recommended course of action will also be discussed when potential risks have been identified. According to Bejtlich (2004), security monitoring is defined as the collection, analysis, and escalation of indicators and warnings to detect and respond to intrusions. Security monitoring is an important part of risk management for internal applications such as payroll, human resources, and inventory. Security monitoring should also be used in the risk management of external applications like sales and marketing. Security Monitoring Process Security monitoring should be considered and used as a routine task to monitor and analyze the use of the network. Failure to use security monitoring would indicate that an organization believes there are no credible risks to the network. This thought process could...

Words: 1068 - Pages: 5

Premium Essay

Cmgt

...Individual Assignment: Security Monitoring Activities CMGT/442 Introduction Information Technology (IT) and E-commerce have been on a constant up-rise, over the past couple of decades. Many organizations have found ways to grow and remain profitable, by creating a good mixture of e-commerce and IT. E-commerce can cover a range of areas, but focus mainly on internet sales and product marketing; while IT teams can handle any and all aspects of the organizations network. Security is becoming more important to organizations, as various attacks are on a rise. Natural disasters, malicious attacks, internal breach, and loss of team members, are all good cause to maintain strong security monitoring systems. The paper that follows will address security monitoring systems that should be conducted in the Cellular Phone Organization (CPO) with both Internal IT and e-commerce applications. Network Security Systems Organizations must have a secure network, in order to stay in business. There are many types of variations of ways to secure the network of an organization, and each must cater the type of business. The internal network is comprised of all servers, applications, data, and equipment used within the organization. The security of the internal network must consist of a mixture of both hardware and software. The Cellular Phone Organization employs 150 associates in an appropriate sized building. There are three teams: Customer Care; Tech Support: and Sales. There is also a Human...

Words: 1199 - Pages: 5

Premium Essay

Report on Relevant Issues of Electronic Monitoring of Empoyees and the Recommendations Made.

...workplace has been in existence for some time now; Frederick Taylor used time and motion studies to analyze the work practices of various types of employee. But nowadays, the electronic monitoring will give the employers the more information of all the employees’ work activities in a detailed way (Ottensmeyer and Heroux, 1991). They are some network tools that can capture user log in details, the file accessed, the time it was accessed and so many other things. What is Electronic Monitoring? Electronic monitoring can be seen in different concepts, firstly, it can be seen by the way employers will use electronic devices to review and measure the employees work performance, for instance, the employer may decide to review the employee’s incoming and outgoing mails to see how he/she relate with the customers whether is satisfactorily. Secondly, it can be seen as electronic surveillance in such a way that the employer will use the electronic devices to know what the employee does, and also review the sites he visited for the day and check whether the site is adult site or gamble site (King, 2008). The Frequency of Electronic Monitoring within the company An employee maybe unaware how he is being monitored, but research showed that more than 20 millions of employees have their emails being search by their employers; in telecommunication and banking industries, it has been established that about 80% of their workers are being subject to monitoring (Dichter and Burkhardt,...

Words: 1097 - Pages: 5

Free Essay

Employee Privacy Report

...Employee Privacy Report your name COM/285 March 28, 2011 University of Phoenix CERTIFICATE OF ORIGINALITY: I certify that the attached paper is my original work. I affirm that I have not submitted any portion of this paper for any previous course, and neither has anyone else. I confirm that I have cited all sources from which I used language, ideas, and information, whether quoted verbatim or paraphrased. Any assistance I received while producing this paper has been acknowledged in the Reference section. I have obtained written permission from the copyright holder for any trademarked material, logos, images from the Internet, or other sources. I further agree that my name typed on the line below is intended to have, and shall have, the same validity as my hand written signature. Students’ signature (name(s) typed here is equivalent to a signature): Your Name Here Employee Privacy Report The Texas Department of Criminal Justice (TDCJ) is a not-for-profit organization comprised of nine non-salaried members who are appointed by the Governor of Texas for staggered six year terms known as the Texas Board of Criminal Justice. The board is charged with governing the TDCJ, implementing policies which guide operations. There are different divisions of TDCJ and amongst those divisions is the Correctional Institutions Division of which I am employed and am tasked with the confinement and supervision of convicted felons...

Words: 1081 - Pages: 5

Premium Essay

Employee Privacy Report

...Employee Privacy Report The need for businesses and organizations to access the internet has brought about several concerns regarding employee privacy while emailing and surfing the internet at the workplace. Each employee is given access to company issued computers and equipment, and consider his individual email messages and internet browsing to be private. In most organizations, security controls, such as passwords, are used to ensure privacy; however, the internet systems managers still have access to employees’ activities. Employees usually do not realize that these security measures are intended to prevent unauthorized access to his computer and files, not to invoke control over the employees. POLICY IMPLIMENTATION Organizations can review the following guidelines when developing or improving the company’s existing policies: • Policies should be properly discussed and reviewed with management and employees. • Policies should specify what activities will not be tolerated within the workplace. • Policies should specify what accessed information is kept in a log and who in the chain of command will have access to this log. • Proper computer and internet security policies should be set in place and reviewed with all employees and management. • Policies should address how the organization will be monitoring employee compliance with these policies. • Regular review of stated policies will allow the organization to make the necessary changes to keep pace with...

Words: 1069 - Pages: 5

Premium Essay

Employee Monitoring

...Employee Monitoring Most of us would be hard pressed to deny our use of the Internet at work for non-work related purposes. With sites like YouTube, eBay, and Facebook and access to instant messaging and email tempting us at every turn, it can be difficult to resist personal Internet usage at work. While not every person has access to the Internet at work, the majority do. As evidenced by various surveys and studies conducted by media research companies, including American Management Association (AMA), Symantec, and Profpoint Plus, those workers who do have access are using it. According to (Laudon & Laudon, 2013), “A 2010 study from Proofpoint Plus found that more than one in three large U.S. corporations assign staff to read or analyze employee e-mail.” With software such as Spectorsoft, it allows employee monitoring to occur. This lets the employer to monitor the employees’ actions while on the computer. Many employees have no idea they are being monitored. Whether an employer is watching an employee via the internet, the phone, or accessing the equipment on an employee’s desk (e.g. hard drive), the software can determine how many hours a day they are spending doing personal messaging, surfing the internet and other non-work relative activities. With such information, it can define what kind of employees are working for the company (ie. Honest, hard-working or less productive). Business can benefit from this software by filtering out the employees who waste the company’s...

Words: 441 - Pages: 2

Premium Essay

Monitoring Employees Private Social Networks

...Employees Private Social Sites Are Unethical Monitoring employee’s private social network sites is unethical. The Internet has become an excellent medium to connect with the outer World. People use it to connect with other people, sharing files, entertainment and lots of other activities that are useful and beneficial. Although the Internet can be useful, it’s usage can also present a problem for employers. Most companies fear leakage of confidential information and trade secrets through e-mail or blogs. A recent survey conducted by the American Management Association and the ePolicy Institute found that 14 percent of the employees polled admitted they had sent confidential or potentially embarrassing company e-mails to outsiders(pg ). As a result, some companies have monitored their employee’s social networking site; facebook for example. So, a distinction as to why companies monitor their employee’s social sites should be made, as well, as the employee’s rights to privacy. Why do companies monitor their employee’s social networking media? The reasons managers monitor social media was revealed in a new Deloitte survey. Many businesses want to be able to monitor their employees’ social networking activity on sites such as MySpace, Facebook, and Twitter. The main problem with this idea stems from employers wanting to monitor this activity on a subordinate’s off time. Business Week reported that companies want to make sure that their hard-earned reputation...

Words: 684 - Pages: 3

Premium Essay

Security Policy

...assessment, and appropriate mitigation of vulnerabilities and threats that can adversely impact Medical General Hospital information assets and patient records. Objectives • To keep all private patient files confidential • Allow only doctors and nurses access to private documents of patient • Setup username and passwords for employees • Setup badges for contactors and janitors • To comply with all security measures • To make sure private information about company files are prohibited • To make sure all printed documents that can be a threat to the company are shredded and not thrown in trash. • To make sure all staff shutdown workstation after using at the end of the day • To enforce that Surveillance cameras are monitored 24hrs a day 7days a week • To make sure visitors check in at the front before seeing the patient’s • Protect all data from unauthorized internal and external access. Purpose Due to the rights of the patient’s confidential records and the HIPAA privacy act. The company’s private files and the internal and external threat of the potential attackers. We will employ security to protect all of those associated with the Medical General Hospital facility. HIPAA stands for Health Insurance Portability and Accountability Act....

Words: 5676 - Pages: 23

Premium Essay

The Best

...Updated: August 2013  CONTENTS Page No. 1. 2. 3. 4. 5. 6. 7-8. 9. 10. 11-12. 13. Introduction Access to Systems and Services Internet Access Virus Protection Email and Moodle Use Tips for Safe Web Surfing Acceptable Use Policy for Network Access Health and Safety Tips Access to Data and Information Online Safety Information Security Policy Statement STUDENTS WORK You are responsible to backup current work and keep it safe. Work should be backed up to a pen drive on-line service such as you college Sky drive account. INTRODUCTION 1 The purpose of information security management is to preserve: Confidentiality: data and information can only be seen by those authorised to see it and can only be changed by those allowed to change it Integrity: data is complete, accurate, up to date and relevant and the system is operating as per the specification information and services are delivered to the right person when they are needed Availability: Accountability: all activity can be traced back to the originator The College recognises that staff and students will require access to systems, services and data in order to fulfil their roles and responsibilities. Therefore, appropriate procedures and controls will be put in place to enable staff and students to obtain the necessary authorised access so that they are able to carry out their work effectively and efficiently. The College also recognises that all staff and students are required to comply with the necessary...

Words: 2825 - Pages: 12

Premium Essay

Benefits of Using Automated Software Tools to Manag Staff at Work Place

...1. Summarize the benefits of using automated software tools to manage staff access to Internet content and e-mail. (10 marks) In today’s information age, using Internet at the workplace is essential for business. Having said this, statistics show that a majority of employees use the organisational resources for doing personal work such as social networking, email, online shopping, etc. Also a number of employees engage in activities that might cause problems for the organisation financially and legally. As a result more and more organisations have opted for automated software tools to manage staff access to Internet and e-mail. The advantages of such software tools are many, some of which have been outlined below. The use of automated software enables the management to keep a watchful eye on the employee activities, which would affect the productivity at work if the staffs indulge in personal activities online. It is important to emphasise that the manager or team leader cannot always observe his/her staffs and these software enables to record the activities of the employees at any time. Hence the management will be able to maximise productivity by managing employees’ web browsing habits. Unmanaged Internet access allows employees to download or share illegal or copyrighted content from peer-to-peer (P2P) networks. Also employees can take part in other activities such as downloading and viewing pornography, which might be illegal in some countries. All this means that...

Words: 1661 - Pages: 7

Premium Essay

Electronic Surveillance of Employees

...Employers often believe that anything that goes on in the office is subject to review and scrutiny by the employer. This belief, at times, related to employee use of the office phone, computers, office space, and office resources. Employers often take the position that once an employee arrives at work anything the employee does related to job performance and is therefore subject to the employer’s oversight. Employees on the other hand, usually have certain expectations of privacy when they are at work. For example, employees believe that websites visited, emails, or contents within their desks should be off-limits to the employer’s eyes. If they are taking a break, they should be permitted to say or do anything, in the privacy of their own workplace, without constant monitoring of the employer’s watchful eye. Opinions also differ concerning off-duty activities of...

Words: 1127 - Pages: 5

Free Essay

Electronic Surveillance of Employees

...Explain where an employee can reasonably expect to have privacy in the workplace. A typical workspace has a desk, a computer, file drawers, telephones, and maybe a plant for decoration. And if you are lucky, you may have a window and a door. Because companies are trying to conserve space and stay within budget, most offices include more than one person in a room with dividers or columns separating each person. There is no privacy because everyone can hear your conversation and now what you are doing. A good place for employees to have privacy would be away from the job, in order to keep personal information private. An employee’s personal items, such as a locker, handbags, personal emails, or voicemails, or personally addressed mail would be confidential and belong to the employee, unless noted by company policies In the office workplace, there are typically two types of workspace, an open area, in which there are several desks and where conversations can be overhead, or an enclosed office, in which, when the door is closed, conversation cannot be heard and where one would expect virtually total privacy. Explain whether it makes a difference if an employee is in an open are or in an enclosed office. It does make a difference if an employee is in their own office space or are in an open area. For example, my manager sits in a closed off and the employees share a suite. Because she is behind a closed door, she is able to close herself off to other to have meetings...

Words: 1210 - Pages: 5

Premium Essay

Computer Use at Work

...Internet in the Workplace Industries are noticing that production levels have dropped since the introduction of personal technology in the workplace. While most people do not see it as a significant problem, it has proven to be detrimental to business. Society has been negatively impacted due to widespread accessibility to the internet. There are studies that show millions of dollars lost due to people surfing the internet instead of being productive on the job. Because of its detractive nature, the internet should not be allowed without being monitored. It starts at a young age, and it’s not just in the work place: this is an issue affecting society as a whole. Students do not realize the impact; not getting homework done and staying up late to surf the internet. Teachers are requiring students at younger ages to get on the computer to do homework. There was a study done in 2006 that noted that “while computers clearly have a place in education, the evidence is mounting that our obsessive use of information technology is dumbing us down, adults as well as kids. While they can be engaging and resourceful tools for learning -- if used in moderation -- computers and the Internet can also distract kids from homework, encourage superficial and uncritical thinking, replace face-to-face interaction between students and teachers, and lead to compulsive behavior.” (Ferguson, 2005) Adults should knowing better than to stay up all night on the internet, as the result is fatigue on the...

Words: 748 - Pages: 3