Free Essay

Surveillance Memo

In:

Submitted By bgoode
Words 452
Pages 2
IT 500 Help With Memo Assignment

Here is a general structure that you can use for your memo assignment.

To: All Employees
From: HR Department (or your name)
Date: Today
RE: My Memo Assignment XYZ...

Opening lines would state what is being done, such as a policy on recording phone calls, monitoring emails, and so on. There is no minimum or maximum length here. Averages tend to be two or three paragraphs.

Controversies

Note the section heading. This helps to distinguish the text that you include to discuss controversies. As a hint, why is your topic controversial? What part of the opening paragraph stating the policies might someone find controversial and why? One may assume that stating “we are reading your email” is controversial, but why? Is it that the employees may expect such things to be private, but the company states otherwise? Best practice is to spell it out and not assume (even though in many cases the controversy may seem obvious). This is your chance to show critical thinking and analysis of why this is a controversy. Within the context of the memo, you can use writer’s prose to explain this to your employees if you want (not required, just a suggestion).

Legislation

Again, note the section title; this helps the reader distinguish your objective. Think of it in terms of you as an employee. If HR sends you a memo, you may not want to read an entire law word-for-word. Instead, consider mentioning a law by name, and giving a three- or four-sentence high-level overview in your own words of what the law is about, what the ruling was, or what impact this has on your company. It can be longer, of course, but the goal of the assignment is to stay high-level to some degree. All assignments should have supporting arguments (cited if external sources are used). This section is one that lends to accomplishing this task easily.

Future Direction

For this section, what is the future direction of the items mentioned so far in the memo? Will the laws get more lax, or stronger? Why? Will the laws stay the same, and if so, can you support that argument? How will this affect your company? Will your company enact more security and monitoring, such as blocking outbound emails containing social security numbers, credit and debit card numbers, bank account numbers, and so on? Why? (Hint: PCI DSS requirement)

References

In real life, a memo likely would not contain a references section, but as an academic exercise, we do have to ask that you cite any resources that you use as supporting arguments and information. The rubric requires use of scholarly resources.

Similar Documents

Premium Essay

Workplace Surveillance Memo

...Workplace Surveillance Memo Anna Wright Southern New Hampshire University P. Bass To:  All employees From: HR Department Date: November 2nd 2014 Re: Workplace Surveillance Memo This memo is to inform you that going forward we will be installing software on your computers that will be monitoring your emails and internet usage. This new policy will take effect immediately and the monitoring will only take place when you are at work (ie: at the workplace or any other place working). While at work we want to make sure that you are using your time to perform work, please make sure that you are using the internet as needed to perform your job and ensure that you are not using your email for personal use or to conduct any other business. We will also be blocking certain websites on Company owned equipment. This policy change is to protect the integrity of the company as well as to ensure that company time is being used in appropriate ways. We are sure that you will stick to the policy at all times while “at work.” Any questions or concerns should be directed to the HR department directly. Controversies We understand that this might feel like an invasion of privacy but please understand that that is not what this policy is meant to do. We want to protect the company and our customers as well as ensure that we are adhering to the laws when it comes to your privacy. We also want to ensure that when on company time employees are using that time to carry out work...

Words: 557 - Pages: 3

Premium Essay

Workplace Surveillance Memo

...To: All Employees From: President of ABC Companies Date: August 16, 2014 Subject: Workplace Surveillance As we start on the last quarter of the year here at ABC Companies, I want to thank each employee for their contributions and hard work, as well as their dedication to making this company the safe environment we strive for it to be. With the end of the year rapidly approaching, I would like to update everyone on surveillance measures that have been implemented and why we feel these rules have had to be placed. Our goal here at ABC Companies is to provide you the safest and most productive work environment that we can, in order for you to leave here each day feeling fulfilled and excited to begin a new workday. In order for us to continue to make these claims, a new surveillance measure has had to be put into place, which I have outlined below. • Internet Filters: When you first began your employment with ABC, you signed an agreement that company time would be used at a minimum to tend to personal matters. We understand that each of you have a family and other concerns outside of your employment, however after monitoring online activity during business hours, we have found that a large number of employees are spending more than 30 minutes a day using websites that do not pertain to our business and employee responsibilities. After researching and weighing the pros and cons, we have decided to enable filters on the internet, so that websites for personal use are blocked...

Words: 805 - Pages: 4

Premium Essay

Weeks 2

...Ethics Memo Nathan Singleteary BIS/221 July 2, 2015 Joseph Gorman MEMO IT Ethics - ISIS Threats Recently in US news a federal joint task force was responsible for stopping an assumed ISIS threat that called for the beheading of police officials. The joint task force had Usaama Rahim and a few other radicals under surveillance for a couple of years through telephone conversations and social media. It was reported that the task force had deciphered a conversation where Usaama had contemplated beheading police with a few other individuals. ("Us News", 2015) Information technology played a significant role in stopping this particular threat because it allowed officials a means of fighting terrorists plots. The world of today is far more advanced in technology than any other era of the past. Information technology has enabled a global way of communication where a lot of ideas, processes, and for some a way of living life in this computer age. When it comes to ethics and information technology there is the debate of how much information should be private or federally governed. In this debate a few concerns are rights and responsibilities and the way information is used. Some people feel that the federal government is invading privacy rights when doing such surveillance as mentioned above. On the other hand some people feel like it's necessary to fight the war on terrorism. As in the report above this surveillance uncovered a ruthless plot to physically...

Words: 370 - Pages: 2

Premium Essay

Business Assignment 1

...Electronic Surveillance of Employees Angela Hockaday Strayer University Law, Ethics, and Corporate Governance LEG 500 Professor Anne Dewey-Balzhiser October 23, 2011 Abstract This paper will explore Electronic Surveillance of Employees. First, we will discuss and explain where an employee can reasonably expect to have privacy in the workplace. Secondly, we will review information regarding in the office workplace there are typically two types of workspaces, an open area, in which there are several desks and where conversations can be overheard, or an enclosed office, in which-when the door is closed-conversations cannot be heard and where one would expect virtually total privacy. Explain whether it makes a difference if an employee is in an open area or in an enclosed office. Thirdly, we review the video and analyze Herman’s need to know whether his salespersons are honest is a sufficient ground for utilizing electronic surveillance. Next take a look into and try to explain to what extent an employer can engage in electronic surveillance of employees. Finally, we explain to what extent the inclusion of innocent, unaware third-parties in such surveillance determine whether it is legal. Electronic Surveillance of Employees Electronic surveillance of employees, whether employers have an interest in being able to monitor their employees while at work, or knowing how their employees are in their personal lives, Frederick Taylor invented such an approach in the 1880s...

Words: 2053 - Pages: 9

Premium Essay

Edward Snowden Persuasive Essay

...During what is arguably the most difficult period in U.S. history, Honest Abe expressed his hopes that “government of the people, by the people, for the people, shall not perish from the earth.” The NSA surveillance program goes against this principle. It poses a substantial threat to the social contract and is illegal both domestically and globally. Edward Snowden’s revelations about these activities were done so in the public interest and set him apart from many other Americans charged with espionage by the U.S. government- he is a whistleblower. For this reason, in the eyes of the international community he has committed a non-violent political crime (under the assumption that he has committed a crime). Because of this and other reasons, granting Snowden political asylum is absolutely within Russia’s rights. One can witness a large effort on behalf of the US government, from the latter half of the 20th century...

Words: 2540 - Pages: 11

Premium Essay

Privacy Actions

... | Executive Summary According to a 2009 survey conducted by American Management Association (AMA), the top two reasons employers provided for monitoring their employees were performance evaluation and quality control. Workplace monitoring may sound wrong, but it provides many benefits to an organization and its staff members, such as lower operating costs and high production rates. However, in the process of monitoring employees, employees’ privacy rights are violated mainly through computer monitoring, telephone monitoring and background checks. Productivity is one of the main reasons cited by employers for introducing electronic surveillance and employee testing to the workplace. Employers believe that corporate survival demands continuous improvements in employee productivity. Errors, poor products, and slow service hurt business. Therefore, monitoring and testing to identify and correct these problems are considered to be sound management practices (Wright). However, the following will analyze privacy in the workplace from an ethical point of view using three workable theories: Kantianism, Act Utilitarianism, and Social Contract Theory. Privacy...

Words: 3902 - Pages: 16

Premium Essay

E-Cigarette

...Your family is your greatest treasure and your home your safest citadel from the unwanted influences of the world. That's why monitoring software to track and log internet and computer use is a necessity. It lets you block and filter a host of influential content that could prove harmful to your children's development and the overall peace of your home. Just knowing that monitoring software is installed on your computer can keep users honest. Everything from pornography to explicit gore, violent games, gambling and more can be found with a few keystrokes. Online predators, cyber bullying, hateful websites and other negative influences can potentially plague your children. You can safeguard your family from unseemly and damaging connections by using computer monitoring software. Most monitoring applications offer a multiplicity of protections and a variety of tools. Our researchers tested and ranked monitoring tools to bring you an objective comparison of the best computer tracking software. Our top three products are SpyAgent, WebWatcher and PC Pandora. Read our articles on monitoring software to learn more about computer monitoring tools. Monitoring Good monitoring software includes tools to record all website visits and online searches. The software should have the ability to detect when a computer user accesses social networking websites such as Facebook and Twitter or views online pornography. Some monitoring applications can capture blog posts, usernames and even passwords...

Words: 5031 - Pages: 21

Premium Essay

Intro to Security

...SUMMARY  EXECUTIVE SUMMARY  The Maryland Public Safety Education and Training Center is located in Sykesville, Maryland. The physical plant is generally divided into two areas on grounds totaling approx. 700 acres. The firearms Training Facility (FTF) and the Drivers Training Facility (DTF) are co-located approx. 2 miles from the Academic Center. These training areas are un-fenced, and goes through public roadway and to several residential communities; closest houses being approx. . . .25 miles. The FTF facility has staff offices, classrooms, armory, weapon cleaning area and outdoor ranges which is approx. 25 miles from the FTF.  The Academic and administrative Complex (AAC) is located on the ground of the Maryland Springfield State (Mental) hospital, and hosts approx. 400 patients. AAC has offices and classrooms, computer labs, a food preparation area and dining hall, and shops. Two residential dorms for overnight guests/students, a physical training center and it include offices, classrooms, basketball gym, weight room, and swimming pool.  PSETC has 122 staff members, including DTF, FTF, and there is currently no security for PSETC. The hours of operation are 7:30 am to 5:00 pm, Monday through Friday for all facilities and it has about 450 students daily in law enforcement and correctional training programs. 150 guests/students can stay overnight; there is a contractor who prepares food, for them. The record maintenance for all administrative reports for PSETC members...

Words: 3210 - Pages: 13

Free Essay

Memorendum

...To: All Staff From: Max Claude, CEO Date: June 26, 2015 Subject: Implementation of workplace surveillance In an effort to keep everyone on the same page at XYZ Corporation, I am writing this memo to inform you on the workplace surveillance that will take effect very soon here at XYZ. Electronic surveillance of workers has long been a source of dispute between employers, workers and unions. In the case of surveillance "on workplace ", the employer, or the owner may decide to install video cameras or other surveillance means to ensure, in particular, the personnel safety and protection of property in the company. Unions or employees, may in turn, appropriately, challenge the presence of these types of monitoring alleging that they constitute an unreasonable work condition or undermine the dignity or privacy of workers (ILO 2007). That whole debate is usually confined inside the company which implies that the only opposing parties are the employer and employee representatives, whose case usually get decided by an arbitrator. You may wonder if indeed there are controversies on this issue then why senior management or the CEO, pondering such idea. Well, it is because in the last quarter of 2014, XYZ Corporation has decided and entered into a contract for the installation of surveillance throughout our facilities in the North Eastern region of the United States. Just as we have promised you from the moment you joined XYZ Corporation you are an important stakeholder and as...

Words: 1228 - Pages: 5

Premium Essay

Is Big Brother Watching You

...leave the workplace. Many employees feel that this is necessary. However, we see companies all across America cross the line with surveillance and invasion of privacy in the work place. If a company truly checked applicants thoroughly would there be a need for such extensive work place surveillance. The company that I work for has surveillance cameras at every corner of the building. These cameras are constantly patrolling the parking lot. A few years ago my car was vandalized and when the video was reviewed security realized that the camera did not patrol the area of the parking lot my car was in. I was amazed that such expensive equipment was useless in my situation. All along I thought that my car was safe in the parking lot however, I soon realized that this was not the case. Maybe the money that was spent on the cameras should have been given to the employees in the form of a raise. Later it was announced that we would only have two security guards at the front entrance of the building and the other guard’s services were no longer needed. This left the back door of the building without a guard. Now how were two guards going to watch all four cameras and people coming in and out of the building? Not only do we have security cameras outside of the building we also have them inside. At the back entrance of the building a surveillance camera was installed over the guard’s desk that is not even used anymore. The camera does not...

Words: 725 - Pages: 3

Premium Essay

Security Plan

...The Security Plan The Floor Plan Name: Empire Purpose: Dance, Bar, VIP, Club Function: NightClub 13,000 Square feet, Two Story Building, 8 VIP Sections, Overlooking Balcony, Two Dance Floors, and Two Dance Cages, Front and Back Entrances. Our location is a prime for criminal behavior and we need to put an end to it. [www.empirelive.com] Threats, Risk Assessments and Counter Measures | | | | |THREAT |RISK |COUNTERMEASURE | | |Probability |Criticality |Total | | |Theft incl. Vehicles |5 |5 |10 |Security stationed outside monitoring| | | | | |activity. Plain clothed officers | | | | | |monitoring indoor and outdoor | | | | | |activity. | |Assault |9 |10 |19 |Plain clothed officers inside and out| | ...

Words: 1426 - Pages: 6

Premium Essay

Briefing Report

...Briefing Report Ashley Jones SEC315 Professor Michael Tunick January 20, 2012 Abstract This essay investigates the security measures that are being undertaken by the Federal Protective Service to assure security to the general public. It evaluates these measures to determine if they are sufficiently comprehensive to combat a potential threat of a similar magnitude to the Oklahoma City bombing. In addition, the essay compares these security measures to those of the “John Hancock Tower” in Boston City. Further, it elucidates the weakness of Federal Protective Services in relation to security services provided at “John Hancock Tower”. According to the literature, the protocol of FPS usually has frequent security lapses that often leave the people vulnerable to bomb or terrorist attacks (Mearsheimer, J. J. 2007). Briefing Report The Federal Protection Service has been the people’s last hope against terror threat since the September 11. The police unit provides integrated security to federally owned buildings or properties. It is known to organize its security operations within the guiding principles of technical expertise, organizational excellence and proper stakeholder service. However, the recent trend of security lapses in their protocol has caused some panic among the general public as well as within the government quarters. For instance, only a few months ago in McNamara Federal Building that is situated Downtown Detroit, there was a serious bomb scare when it...

Words: 1020 - Pages: 5

Premium Essay

Surveillance in the Workplace

...that need for a specific policies regarding surveillance or monitoring in the workplace. The primary purpose of such policies is to eliminate any expectation of privacy on the part of an employee utilizing company technologies or property for personal use. However, even when an employer has a policy, it is nonetheless common for employers to tolerate some degree of private usage by employees. This is one dilemma for employers and the main purpose for establishing a "zero tolerance". In any event, the employer's written policy and actual practices should clarify to employees specifically and inform third parties through implied or informed consent the expectations of the employer or business utilizing surveillance. Assignment One 2 Question One 1. Explain where an employee can reasonably expect to have privacy in the workplace. In the office workplace there are typically two types of workspaces, an open area, in which there are several desks and where conversations can be overhead, or an enclosed office, in which—when the door is closed—conversations cannot be heard and where one would expect virtually total privacy. Explain whether it makes a difference if an employee is in an open area or in an enclosed office. Surveillance is becoming commonplace in the work environment. Generally speaking, employers are permitted to monitor by surveillance "public" areas. When surveillance is hidden, however, and when the surveillance is surreptitious, then the employer may open...

Words: 1870 - Pages: 8

Premium Essay

Electronic Survilleance

...Explain where an employee can reasonably expect to have privacy in the workplace. Is there truly such a thing as privacy in the workplace? In today’s society it is possible for companies to monitor every aspect of what employees do in the office environment, from email, surfing the Internet to phone conversations. Federal and state laws specifically address an employer's right and ability to monitor, save, record, access, or otherwise conduct surveillance of employees' use of company electronic communication resources and systems. Generally speaking, if an employer complies with the notice and consent requirements under these laws, and writes and distributes policies consistent with the laws, it will be difficult for employees to show a reasonable expectation of privacy in using company-owned electronic communication systems. But there are specific laws, rules, and regulations which grant certain employee privacy rights within the workplace. These laws govern Personnel records, social security numbers, monitoring and eavesdropping, medical records, drug testing, and background screening. Employees generally have a right to privacy in their personnel records, with exception of a few specific circumstances. This means that employers are generally not permitted to disclose personnel records of an employee to third parties without a legal obligation to do so or written consent from the employee's. The right can be found in state statutes, codes, or by judicial case law....

Words: 1941 - Pages: 8

Premium Essay

Electronic Surveillance of Employees

...privacy it’s important to consider personal privacy in relation to the company’s privacy and more paramount, company protection. As the video illustrated, the managers reasoning for monitoring his sales floor employee conversations was to protect the reputation of the car dealership as well as protect the business against any potential legal ramifications from dishonest sales employees. This is a very reasonable purpose for monitoring electronically to protect company interest. However, it would be in the interest of the company to communicate to its employees that they are being monitored so there is not sense of privacy invasion of its employees. As in the example with this case, it’s reasonable that the case can be made that electronic surveillance anywhere on the company property is reasonable to protect customer and company interest. Since the restroom is a very necessary and private need, this would be the only reasonable place within a work environment that an employee could expect to have privacy. In the office workplace there are typically two types of workspaces,...

Words: 1421 - Pages: 6