scholarly journals Monitoring E-Mail In The Workplace: Privacy Rights And Employer Responsibilities

2004 ◽  
Vol 8 (4) ◽  
pp. 29-32
Author(s):  
Claire R. La Roche ◽  
Mary A. Flanigan

Author(s):  
Richard A. Spinello ◽  
John Gallaugher ◽  
Sandra Waddock

This chapter presents an ethical case for strong workplace privacy rights, which have been jeopardized by the proliferation of monitoring systems and surveillance architectures. After explicating the functionality of those technologies and tracing the history of workplace privacy concerns, we analyze key statutory frameworks and provide some grounding for the ethical imperative to protect workplace privacy rights. But privacy rights must be balanced with the corporation’s legitimate need for employee information. To achieve this balance, privacy-related issues must be diligently managed, and we recommend reliance on the Total Responsibility Management model. With the aid of that model, we identify and defend five operative principles for ensuring that monitoring technologies are deployed in a fair and responsible manner. In addition to underscoring the importance of privacy rights, our objective is to demonstrate that workplace privacy is an organizational issue that must be prudentially managed by corporations aspiring to be good corporate citizens.


2007 ◽  
Vol 9 (3) ◽  
Author(s):  
E. Burger ◽  
C. Rensleigh

The information workers of today have a wide range of information sources available to make valuable decisions, so much so that it can lead to information overload. The purpose of this research was to investigate the extent of information overload in the South African banking industry. The empirical part of this study was done at the Standard Bank of South Africa, where 115 questionnaires were distributed to three categories of employees. It was found that e-mail is one of the most used computer-mediated applications and is used more than the World-Wide Web, instant messaging or peer-to-peer file sharing. Of the respondents, 65% felt overwhelmed by the amount of e-mails they received as 25% received more than 60 e-mails per day. A third of the respondents dedicated three hours or more to e-mails per day. Respondents agreed that the implementation of policies is important to ensure compliance with legislation, protection of privacy rights and copyright, and the filtering of spam. In conclusion, the respondents indicated that formal training in e-mail management should make a significant difference in the usage of e-mail within the organization and reduce e-mail overload. 


Author(s):  
Scott E Mensch ◽  
LeAnn Wilkie

Hand-held cell phone technology has been around for quite some time, however when Apple introduced the iPhone in 2007, the widespread adoption of smartphones took off. Smartphones allow users to communicate via talk, text and video; access personal and work e-mail and the Internet; run applications; make purchases; manage bank accounts; take pictures - and for many of us are an integral part of our everyday (The Privacy Rights Clearinghouse, 2018). Smartphones are “essentially tiny computers, we reach for these devices when we first wake up, bring them with us into the car, and often keep them with us during our most private moments (The Privacy Rights Clearinghouse, 2018). Many users rarely turn off their smart phones.


Author(s):  
Scott E Mensch ◽  
LeAnn Wilkie

Hand-held cell phone technology has been around for quite some time, however when Apple introduced the iPhone in 2007, the widespread adoption of smartphones took off. Smartphones allow users to communicate via talk, text and video; access personal and work e-mail and the Internet; run applications; make purchases; manage bank accounts; take pictures - and for many of us are an integral part of our everyday (The Privacy Rights Clearinghouse, 2018). Smartphones are “essentially tiny computers, we reach for these devices when we first wake up, bring them with us into the car, and often keep them with us during our most private moments (The Privacy Rights Clearinghouse, 2018). Many users rarely turn off their smart phones.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


Sign in / Sign up

Export Citation Format

Share Document