Privacy Laws and Policies Debate

In: Computers and Technology

Submitted By len79
Words 420
Pages 2
Having worked in transportation and having worked for the Chamber of
Commerce in Northeastern Pennsylvania, the position taken of the debate on Communication Laws and Privacy Policies is almost a mute decision. Regrettably the decision would be for employer monitoring. The posts from my fellow classmates in this debate seem strongly one sided and rightfully so. The reasoning and ever growing technology and types of ongoing ways to improve surveillance for monitoring employees simply leaves the debate being for such laws and surveillance. In the first segment of the Electronic Readings “Privacy, Legislation, and Surveillance Software” It mentions the 4th Amendment of the Constitution, “the rights to freedom from unreasonable search and seizure.” The explanation of why this amendment cannot interfere with the rights of employers to protect the interests of their property as well as protecting their investment in their employees. This statement and the exceptions provided by the Electronic Communication Privacy Act leaves little if any room to debate this topic. With companies losing billions of dollars a year in loss of productivity, law suits and sabotage employers have every right to protect their assets. I believe employee monitoring goes deeper than just monitoring employees and the implications of mis-handled information via internet. There have been too many scandals referring to this type of illegal mis-handling such as Wikileaks. If this type of mis-handled information can fall into the hands of our own citizens and employees then the technology for monitoring employees and even our own country’s security is at risk. In another sense I believe if there were a legitimate argument that these policies and laws of monitoring employees is unethical, I would truly be on the side of the employee and be against monitoring. When the amendments of the…...

Similar Documents

Comparison of Privacy Laws

...[pic] Data protection and privacy ethical guidelines This document was produced on September the 18th 2009 The version of this document is: 5 Experts Working Group on data protection and privacy Chaired by: Caroline Gans-Combe Special thanks to the Panel Members: Andrew Bottomley, Duarte Carvalho-Oliveira, Costas A. Charitidis, Eva Del Hoyo-Barbolla, Anne Demoisy, Anna Giovanetti, Walter Hannak, James Houghton, David Morton, François Moutou , Jane Lamprill, Antony Lebeau, David Townend, and Mary Sharp. - Very special thanks to the Ethics Team : Isidoros Karatzas, Mihalis Kritikos, Yamina Cheikh, Paulette Matkovic Ramirez, Marie Cocquyt, Marco Michelini, Stefan de Vos and François Hirsch General disclaimer: this document examines the major concepts of data protection and privacy from the point of view of research ethics. It aims at raising awareness about these concepts in the scientific community and at assisting applicants while preparing to submit their project proposals. It does not seek to discuss these concepts in-depth but provides a general overview of their main parameters and some basic suggestions regarding their handling for the purposes of the European Commission's Ethical Review procedure. This document represents an effort to reflect on the experience gained during the operation of the Ethics Review mechanism and to provide some practical guidance, thus it will be regularly updated. The document contains three......

Words: 7265 - Pages: 30

Privacy Laws and Policies Debate

...University of Phoenix Privacy Laws and Policies Debate I have looked at both sides of the argument when it comes to communication privacy laws in the workplace. There are some good points to monitoring employees, that I read about such as “using monitoring as a positive aid for training, improving service, ensuring compliance, protecting employees, customers, and so forth, and to assist in fairly evaluating employee performance.” But If I have to choose a side I would go against monitoring employee’s computers, listening in on calls, and video surveillance. I think my biggest concern is the fact that many employers will go too far. There will be no privacy at all for the employee in the workplace, except in the restrooms. I think this total lack of privacy and lack of trust shows an employer has no respect for the employees. Employers need to consider the effect such monitoring has on their employees since employee and employer attitudes about monitoring often diverge. There should be a pretty good battle over this issue, what with so many people being concerned with their privacy, but on the other hand so many companies making big money on software that is used to spy on a companies’ employees. Software manufacturers in 2004 expected the sale of computer monitoring and surveillance software to businesses to increase from $139 million in 2001 to $622 million in 2006 (Wakefield 2004). There aren’t any constitutional or federal laws protecting an......

Words: 383 - Pages: 2

Privacy Laws

...Check Point: Privacy Laws and Policies Debate I am for communication privacy laws and policies in the workplace. In my opinion every company has rules that has to be follow those rules consist of the use of company equipment for personal use is not allowed. The information is given about company policies are given at the beginning of each new hire. In 1986 Congress pass the Electronic Communication Privacy Act (ECPA) which consist laws relating to wiretapping to electronic communication such as emails and internet use (Electronic 2005). In addition, employers may monitor emails and internet communication; they must show that it is from a business purpose for doing so. This has to happen with companies liable for any illegal activity on the use of company equipment. “Generally, however employees do not have a reasonable expectation of privacy where communications are sent over a company controlled e-mail system” (Lasprogata et al. 2004). Companies have to protect themselves from legal liability as result from as harassment and sexually communication. “A recent study revealed that 10% of U.S. companies have received subpoenas resulting from employee email” (D.Nord, T. McCubbins and J.Nord). As I have done more research about privacy laws and polices happening within a company. Both sides have good points about privacy laws and policies but I still am for the privacy laws and policies. These privacy laws and policies are put into place by the company for their own......

Words: 254 - Pages: 2

Privacy and Policy

...College Research Paper Trust and Privacy By Ian Hunt Access to HE. Media Studies. CJC3FH001A Unit Title: Independent Study HC7/3/WW/081 Course Tutor: Patrick Peiro. Completed: 14th April 2010 College Research Paper Contents 1.0 Introduction 1.1 Key Questions 2.0 Methods 2.1 Primary Research. 2.2 Facebook Privacy Questionnaires. 2.3 Internet research from Facebooks own Help and Information pages 2.4 Confirm the validity of information obtained on Facebooks pages from alternative Internet resources. 2.4 Privacy issues and guides sourced from Library sources. 3.0 Results & Discussions 3.1 Facebook a short History 3.2 Survey Results 3.3 News Media discussion on Privacy/Trust 4.0 Further Discussion & Conclusions 4.1 Privacy 4.11 Facebook Adverts 4.12 Facebook Applications and 3rd Party Applications 4.2 Trust 4.3 Recent Events Regarding Privacy 4.31 What has not changed? 4.4 Final conclusions 5.0 Bibliography 6.0 Appendix List of illustrations’ Fig 1: Total Internet Usage Fig 2: Targeted advertising Fig 3: Advertising Demographics Fig 4: Age related targeted advertising Fig 5: Online gaming advertising Fig 6: Facebook Applications and 3rd Party Applications Fig 7: New Privacy Announcement Fig 8: New Privacy Update Fig 9: Privacy Sharing Fig 10: Privacy Search 1.0 Introduction Is the growth in Social Network websites a good thing? With new services from Google and Microsoft soon to join the established social networking sites......

Words: 3813 - Pages: 16

Privacy Policies

...their privacy, but it was taking pictures of historical sites and national monuments, which were publicly owned. Occasionally, it would include people in its pictures. But these would still be legal as the Google cameras were not focusing on specific individuals. Jeff Jarvis also compared the Google Street View with the European tabloid “Bild”, which also invaded people’s privacy. He tried to convince the people that the Google cameras would not be invading their privacy inside their homes. He also claimed that Germans were selective in their privacy policies because they took pictures of miscreants and criminals, which should be a violation of their privacy. The message he tried to get across was that Google Street View was an important technology which was not really an invasion of people’s privacy. The major argument against Google Street View is that while the roads are public, people do not like to be filmed while they go about their everyday lives. A misuse of this technology might also lead to safety risks as criminals and miscreants might know the residences of particular persons and may target them. A severe breach of privacy could be if the cameras were actually used to zoom in on people inside their homes. Unless such concerns arise, this technology is legal and also very useful for people across the world. Part C Devices like Google Glass can cause a serious breach of privacy in certain scenarios. In public areas like parks and streets, the breach of privacy......

Words: 825 - Pages: 4

Privacy Laws

...Privacy Laws and Policies Debate Many employees embark on their employers violating their privacy. Employers are becoming more aggressive on how they screen new potential hires as well as their current employees. Normally employers will conduct criminal background checks, drug testing and sometimes a credit check. The question I am asking is how far is too far? Employees need to become more aware of this situation. Employee privacy laws are limited, which makes it easier for employers to invade workers privacy. Something’s are personal and should remain that way. Therefore I am against communication privacy laws and policies in the workplace. Nothing in life exist with infinity as such I believe employers need to re-evaluate heir approach regarding privacy in the work place and perhaps explore alternative solutions to the problem. There are limits to everything in life and employers’ privacy laws should be no different. For the most part the laws are design to not protect the employee but the employers. Information technology such as computers and internet makes it easier to collect, keep, incorporate, switch ad obtain information and data of a company in a technical manner. Today more companies are wired to the internet and because of this users of the internet are more prone to violations of privacy. In order to restrict access to private information the government enacted privacy laws that enforces the privacy of files communication that is based on the computer.......

Words: 410 - Pages: 2

Privacy Laws and Policies Debate

...think workplace privacy laws and policies about monitoring emails, phone calls, and computer use should be in place within a company. The employer should be sympathetic and open to potential disagreements and questions which the employees may have about the reasons behind the workplace communication privacy laws and policies, including the protection of both the employer and the employees, the regulating state and federals legislations, the compliance expectations, and the potential consequences of non-compliance (Wakefield, 2006). When a company monitors its employees without employees being aware of it, it can bring down company moral and overall productivity. When the employees are aware from the start of employment that they will be monitored and communication privacy laws and policies are in their code of conduct the employees and the company can benefit from the program. The workplace communication laws and policies are viewed as ethical practice to protect the employee and the employer. Company use these laws and policies to monitor misuse of company transmissions such as: emails, internet use, telephones, and computers. Employees in turn need protection from employers who get in the way of employee privacy. Without the use of communication privacy laws and policies, employee may not be aware of what is acceptable use of company equipment. References Axia College of University of Phoenix. (2010). E-Monitoring in the workplace: privacy,......

Words: 278 - Pages: 2

Privacy Laws and Policies

...Check Point - Privacy Laws and Policies Debate For Class XCOM 285 By Hannah Hansen Intro In this paper I am going to talk about the polices and producers that companies put into place in order to protect their investment in their personal computers. Most employees do not understand the risks that companies face by allowing their employees to use personal email and telephones on company time. I will be talking about why these procedures and protocols are in place. We will be looking at three different aspects of protection over emails, telephones, and then computers in general. Computers Many people forget that companies put procedures in place about computer use because of the misuse that some employees of that past have done. The company’s best interest is protecting itself and its clients. To do that they must be able to make sure that the employees who are working for them are doing everything above board. They do this through monitoring employee activity and also by making sure that the computers employees use are not used for employee personal use. If employees use the computers for personal use then they would be able to electronically email important information outside of the company walls where it is not protected. In his article Mitchell R.B. talks about employee types of theft when he says; “other risks may occur as employees use electronic communication systems to download programs and files: violation of copyright laws,......

Words: 608 - Pages: 3

Privacy Laws

...Privacy Laws and Policies Debate Steven Donally XCOM/285 June 27, 2014 Donna Rossi Privacy Laws and Policies Debate I think there is a simple truth when it comes to privacy in the workplace: it doesn’t exist. Your employer has the right to view anything and everything you do on company equipment. They have the right to read your emails, listen to your phone calls and check you incoming and outgoing mail. I do not think this is a bad thing because you are using company equipment to do these things. If I am using a company computer to write a personal email or to browse the web, my employers have every right to monitor what I am writing and the websites I am visiting. Whether or not I am allowed to do these things is irrelevant. I am using equipment that does not belong to me in order to complete these tasks. Most companies have strict rules with regards to what you are and are not allowed to do with company property. I compare it to a company gas card. People who travel for their jobs are often issued gas cards to pay for their gas along the way. If my company issued me a gas card to use while I was on the road and I used it to buy gas for my personal car on my day off then I would probably lose my job. Much the same way that if I was browsing porn on my company computer I would more than likely be fired. The only way a company can prevent these things from happening is to monitor the employee....

Words: 276 - Pages: 2

Privacy Laws and Policies

...communication privacy laws and policies in the workplace, I though that it was an invasion of employee’s privacy. After researching employer and employee views on the topic, I am for the policies and laws regarding workplace communications. Although employees should have privacy, many U.S. companies are implementing workplace monitoring, consisting of recording telephone calls, viewing e-mails, Internet connections and employee computer files (E-Monitoring in the Workplace, 2006). Because many companies rely on technology to complete jobs, employers must protect their assets as well as ensure their employees are productive. The federal legislation protects both the employee and employer under the Electronic Communications Act (ECPA). When an employee is at work he or she is operating a piece of technology owned by the employer. The employer provides the technology to the employee to conduct business for the company, not for his or her own personal use. The ECPA states an employee is entitled to privacy, but an employer does have the right to monitor employee communications to ensure he or she are conducting business and not placing the company at risk (E-Monitoring in the Workplace, 2006). If an employer discovers an employee is conducting a personal conversation, the employer must stop the surveillance and give the employee privacy. The purpose of workplace communication policies and laws is to protect the interest of the company and its employees. The ECPA is a law......

Words: 256 - Pages: 2

Xcom/285 Privacy Policies and Laws

...Privacy Policies and Laws Debate XCOM/285 Essentials of Managerial Communication When thinking about privacy laws and policies, it is safe to clearly state that I am for them. Many people feel that some employers go over board when it comes to this kind of thing but in this age of technology, having privacy polices is not only right it is essential to maintain the respect of the people who work for and with people. There is much evidence that even with privacy policies in place the some employees still use company communications for personal use. There is no clearer evidence of this than that fact the government had to pass laws of privacy laws to protect companies that felt they needed to watch their employee’s use of their communications for any personal use of company communications. These laws were passed so angry employees who were caught using company communications for private things could not go back and sue companies for invasion of their privacy. The ironic part of employees getting upset over what they perceive as an invasion of their privacy is the fact most companies make employees sign privacy agreement policies and then get angry when they get caught breaking them. Privacy policies are not just to protect employers from employees using their communications for private business, but privacy policies are needed to protect companies from viruses that can come in through private emails or...

Words: 933 - Pages: 4

Information Privacy Law

...This essay discuss the Privacy Act of 1974, the Information Privacy Law, Electronic Communications Privacy Act, and other laws and provisions designed to protect an individual’s privacy. In this essay I will also discuss the importance on trust and integrity in the work environment. As communication technology expands, and the possibility of accessing that technology has grow increasingly less challenging to gain, it has become more difficult to protect personal information and the use of an individual’s personal information. Whether this information is used for business, consensus, personal, educational, or even fraudulent reasons, the Individual’s right to control his or her personal information held by others has grown into an enormous concern for most people over the age of eighteen. Additionally, considering the average age for acceptance to most internet social forums and email accounts is thirteen years old, the concern for personal information security can begin even before puberty. In this essay I will also discuss how Legislation and Law makers are have and are continuing to attempt to protect information privacy as new technologies and new institutional procedures arise. This essay will talk about but not go into great detail about how the information privacy is covered in the American Constitution, the provisions for this law, and the conditions of disclosure for this law. Because the Privacy act of 1974 does not cover in great depth email and communications......

Words: 1995 - Pages: 8

Privacy Laws

...Privacy Laws and Policies Debate CheckPoint After examining the privacy laws as well as policies within the workplace, I find that companies should insist on such laws and policies in a working environment. Many reasons for my decision exist, the first is companies have reasons for monitoring the computer systems as well as phone lines. After all the software employees operate is the employer's property, and by monitoring the computer systems will assist in preventing the staff. Some employees have been known to use the Internet for personal reasons instead of business purposes; therefore, employees will pay more attention to the Internet than completing the tasks assigned. The Electronic Privacy Communication Act (ECPA) is a law that can protect the employees' privacy; however, one can continue to discover exceptions to the ECPA. One exception is employer's can monitor his or her employees activities so that he or she can prevent unauthorized use. Services like e-mail, telephone, and Internet are other exceptions owned as well as offered by the company; therefore, the company has the right to monitor any employee. The third exception is the consent, in which, "When a party consents to the interception of a communication," (E-Monitoring in the Workplace: Privacy, Legislation, and Surveillance Software, 2006). Organizations desire to make certain workers are using company time proficiently. Companies do not pay employees to deal with personal matters on the clock; however...

Words: 293 - Pages: 2

Privacy Laws and Policies

...Privacy Laws and Policies Patricia Tabor XCOM/285 June 2, 2012 Mary Laurenzi Privacy Laws and Policies The laws I looked at were somewhat vague, I discovered that each case is different and is dependent on not only whom you work for, but also the individual employee polices of the company. It is fairly clear that most employees feel that have a right to some privacy in the workplace however more and more often this is not the case. Federal and State employees are somewhat protected by the Fourth Amendment’s right to unreasonable search and seizure. According to E-Monitoring (2006) even this line of defense is limited and not clearly defined. The employee must pose a reasonable expectation of privacy and the offence must be highly offensive to any reasonable person. This is where I see trouble for each person is different and what might be objectionable to one might seem reasonable to another. Private-sector employee must look to other pieces of legislation to offer them aid. The Electronic Communications Privacy Act (ECPA) is a piece of legislation put forth by the Federal Government to protect the privacy of employee’s; there are however three major exceptions that can effect an employee’s right to privacy. These exceptions are the provider, the ordinary course of business, and the consent exceptions. The provider exception states that if the equipment or service is provided by the employer than it can be monitored by said employer. The ordinary course of......

Words: 358 - Pages: 2

Privacy Laws and Policies

...Privacy laws and Policies XCOM / 285 04/08/12 After reviewing the Electronic Reserve Readings for our class and reading the classmates threads, I feel that communication privacy laws and policies are necessary in the work place. In this day and age of electronic communication it is very important for an employer to be aware of what an employee is doing on company time and with company property. As law suits are rampant, it is important for a company to protect itself and its employees. If an employee is sending potential sexually offensive material or just offensive material on company time and company property it is important for a company to be able to monitor and stop this action or be held accountable. In some companies an employer needs to be able to monitor an employee for sharing trade secrets and information that could potential harm or cause a loss in revenue. I however feel that it is of utmost importance for each company to determine how much surveillance is needed, with in the guide lines of the law. As brought out in our reading “The erosion of employee privacy by such practices as electronic monitoring and surveillance, however, comes at a cost in the form of increased stress and decreased employee morale, satisfaction and trust in their organization and management (Hornung 2005; Lee and Kleiner 2003). The Constitution’s fourth amendment also protects against “unreasonable search and seizure.” So with in each company a balance needs to be taken to protect......

Words: 361 - Pages: 2

Utilitaires | Eli Stone | Season 1 Episode 1 This is the Part Where You Run