Employee Privacy Report Essay

1282 Words Oct 11th, 2010 6 Pages
Employee Privacy Report Introduction

Using e-mail, the Internet, and privacy policies at an organization is partially what an employee does daily. Properly using the Internet, e-mail and privacy policies is the responsibility of each staff member. Although staff used e-mails to communicate with employees as well as research the Internet for information related to the job, one would expect for certain information to remain private; however, it does not occur like this all the time. Businesses have in place policies where they have the right to observed employees activities during job. While it is important for employees to be mindful of their companies’ policies, it is more important to know that employers have the
…show more content…
NASA requires all employees to go through a yearly training regarding the use and abuse of the Internet while on company time. Using computers for educational purposes are considered during working hours while on duty as long as it does not interfere with the normal operations of the office. Internet surfing is acceptable as long as it is done during off duty time; however, the use of websites such as gaming and pornography are strictly prohibit. Individuals must be aware of the potential liability they face for improperly accessing information on the employers' systems which may later be deemed “private” or subject to a privilege.
What are the current laws regulating employee e-mail and Internet privacy? Current laws provide for employers to fire employees for improver use of internet activities and unauthorized downloads. Additionally, “new technologies make it possible for employers to monitor many aspects of their employees' jobs, especially on telephones, computer terminals, through electronic and voice mail, and when employees are using the Internet” (PRC). Employers, who own their computer network and the terminals, are free to use them to monitor employees; however, employees have some protection from computer and other forms of electronic monitoring under certain circumstances. Employees should know that inappropriate behavior from unauthorized computer usage

Related Documents