SlideShare una empresa de Scribd logo
1 de 29
Is employer Monitoring of employee email Justified?
Did you know?  According to Dupree and Jude, from “Who’s Reading Your Office Email? Is That Legal?” said, 65% now use software to block connections to websites who’s images have no place in the workplace.
Who is reading your office email?  I don’t know!!! It is time you know your rights!
Truth is you have zero privacy The simple fact is that monitoring employee e-mail and Internet usage is legal under almost all circumstances. As a general rule, when an employee enters the workplace, an employer may monitor and record communications, including e-mail and Internet use, without notice to the employee.
Here is an Example: A supervisor emailed inappropriate comments to an employee at home, and the employee responded in kind. The e-mails were communicated over the company system. Regardless of the company assurances, the employee was terminated for communicating “inappropriate and unprofessional comments” via the company system. The court held that “once plaintiff communicated the alleged unprofessional comments to a second person over the email system that was apparently utilized by the entire company, any reasonable expectation of privacy was lost. ”
How fair is this? (Google Images)
E-mail is Easily Viewable Employers can review e-mail at any time and with lightening speed. A company called Dow Chemical took a “snapshot” of a day’s worth of employee e-mails and then systematically sorted through them. Some 254 employees had saved, filed, or sent sexually related, violent, and other inappropriate e-mails. The actual participation and involvement of the employees varied considerably. Dow discharged 20 employees and disciplined others.
Is this really necessary? Yes, because as you can see, it makes your really boss angry.
It’s the employers responsibly On his watch he is responsible for illegal, discriminatory, or offensive communication that are transmitted over the system or viewed by others from a company computer screen. That includes Sexually explicit, graphically violent, or racially inappropriate websites open to view by co-workers may be used to support claims of discriminatory behavior or a hostile work environment. E-mails also containing the same material also have the same effect.
Managers Beware ,[object Object]
 Employees can discover e-mails that contain corporate misconduct.
  E-mails contain libelous or defamatory content. THESE E-MAILS SHOULD NOT BE SENT OR FORWARDED!
Even if you do save your e-mails they on a server or archived. ,[object Object]
If e-mails are overlooked it could become a foreign problem.
For example, if you send an e-mail, anyone can forward it. It can be sent anywhere. The employers are responsible for any content sent out. Even if it’s is sent to another country in which it arrives. There can be a legal battle.  ,[object Object]
Copyrights Copyrighted material is not yours to share, especially not in an employers website without the knowledge or consent of a manager or supervisor.  The company could be responsible for any copyright infringment.
Try to Avoid Surprises  “An employee took it upon himself to purchase CD’s containing copies of documents that we already had in our possession. It was easy. An e-mail arrived asking if he would be willing to share the cost of obtaining copies of documents. All he had to do was return an     e-mail agreeing to participate in the project. Instead an invoice for several thousand dollars arrived at our office. There was no correspondence in the files authorizing the purchase. Ultimately, though, we found a brief e-mail from our employee responding to the...
Avoiding Surprises  ...the inquiry. The reply e-mail simply said, “count us in.” Of course, the company that provided the service wanted it’s money. After all, they had spend time and effort preparing the materials for us. We were stuck. If our office had monitored e-mails we could have caught this and stopped the expensive and wasteful process before the vendor incurred its costs.”
Productive Communication vs. Personal Communication To do list at work:  E-mail buddies about how funny Chad's hair looks today. Facebook and comment on friends walls. Buy Justin Beiber tickets on-line (going fast). Send whole office a link to the funniest Youtube video I just found. Do you see how we are not being productive at work?
Summary of the “Yes” Employers have the right, even a duty, to protect the corporation from legal liability incurred by the careless action of their employees. The use of e-mail from the employer’s computer can get the company into worlds of trouble, and the company must monitor that e-mail.
The “No” of E-mail Monitoring USA Today article uses we the people tone. The article doesn’t agree someone has the right to read e-mails except it be the writer or the intended recipient.
Concern with E-mail monitoring USA Today says 2001,  three-quarters of US business electronically monitor employees in some fashion.  Companies need to keep pace with free willing communication technology in the internet age. Now a fact of workplace life.
What is being monitored?  63% Internet 43% Tracked Telephones 19% Key Strokes & time logged in 38% Video Surveillance A quarter of these companies fire people for misuse of company technology.  Three quarters have disciplined people.
Privacy “People act as if they have privacy protection. They don’t stop to think they are under scrutiny,” said Stewart Baker, head of technology law practice at Washington DC. “Surprisingly for such a law-happy society, there are few limits on what employers can do in the electronic age with respect to the privacy of their employees.”
Problems with Privacy Consultants advise companies to use notice as a way to “get over employees’ expectation of privacy,” which is an issue of social etiquette rather a legal one.   Laws on wiretapping but not on voicemail, e-mail, or the internet in the workplace. (New that cell phone companies require compliance to be able to wiretap network. New York Times.)
Struggle for Balance with Technology The internet is a powerful distraction.  “The very definition of what is private is up for grabs as lines blur between working hours, personal time and home life. What privacy rights do employees have when working on employer-supplied laptops from home, for example?”
“Employers are much more aware and much more nervous about productivity, legality and security, and these issues are behind the increase.”
Corporate Litigation  “Emails and voicemails are frequently the smoking guns in corporate litigation. Standard operating procedure for any plaintiff’s attorney in a corporate legal battle is to demand production of electronic records.”
Big Brother Does Rest Monitoring is not done 24/7. Obviously because limitations of time and financial recourses prevent this from being monitored all the time.

Más contenido relacionado

La actualidad más candente

Take This Job And Tweet It Social Media Policy
Take This Job And Tweet It   Social Media PolicyTake This Job And Tweet It   Social Media Policy
Take This Job And Tweet It Social Media PolicyMRDC1230
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and BeyondAlexNemiroff
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13mkeane
 
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...Kelly Hart & Hallman LLP
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereKelly Savage
 
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawPrivacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawCharles Mudd
 
Key Issues In Workplace Privacy
Key Issues In Workplace PrivacyKey Issues In Workplace Privacy
Key Issues In Workplace PrivacyDan Michaluk
 
Freedom of expression in the modern workplace - James Tait and Rachel Billen ...
Freedom of expression in the modern workplace - James Tait and Rachel Billen ...Freedom of expression in the modern workplace - James Tait and Rachel Billen ...
Freedom of expression in the modern workplace - James Tait and Rachel Billen ...Browne Jacobson LLP
 
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...Ohio Restaurant Association
 
A lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesA lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesErrol A. Adams, J.D., M.L.S.
 
A lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issuesA lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issuesAndres Baytelman
 
Social media, staff policy and law legal
Social media, staff policy and law legalSocial media, staff policy and law legal
Social media, staff policy and law legalAdam Lewis
 
USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationArmstrong Teasdale
 
Workplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and MethodsWorkplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and Methodscmilliken09
 
Public-Employee Privacy Rights in the Age of Social Media
Public-Employee Privacy Rights in the Age of Social MediaPublic-Employee Privacy Rights in the Age of Social Media
Public-Employee Privacy Rights in the Age of Social MediaBailey and Wyant PLLC
 
Employers and Social Media: You Love to Love It & Love to Hate It
Employers and Social Media:  You Love to Love It & Love to Hate ItEmployers and Social Media:  You Love to Love It & Love to Hate It
Employers and Social Media: You Love to Love It & Love to Hate ItJanine Anthony Bowen, Esq.
 
1984 in 2015 Protecting Employees' Social Media from Misuse
1984 in 2015 Protecting Employees' Social Media from Misuse1984 in 2015 Protecting Employees' Social Media from Misuse
1984 in 2015 Protecting Employees' Social Media from MisuseWendi Lazar
 

La actualidad más candente (20)

Take This Job And Tweet It Social Media Policy
Take This Job And Tweet It   Social Media PolicyTake This Job And Tweet It   Social Media Policy
Take This Job And Tweet It Social Media Policy
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and Beyond
 
Pli workplace privacy in the year 2013 2013-6-13
Pli workplace privacy in the year 2013   2013-6-13Pli workplace privacy in the year 2013   2013-6-13
Pli workplace privacy in the year 2013 2013-6-13
 
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...The New Frontier: How Employers Can Respond to Employee Use of Technology and...
The New Frontier: How Employers Can Respond to Employee Use of Technology and...
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and Blogosphere
 
Internet Misuse inside the Company
Internet Misuse inside the CompanyInternet Misuse inside the Company
Internet Misuse inside the Company
 
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawPrivacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
 
Key Issues In Workplace Privacy
Key Issues In Workplace PrivacyKey Issues In Workplace Privacy
Key Issues In Workplace Privacy
 
Freedom of expression in the modern workplace - James Tait and Rachel Billen ...
Freedom of expression in the modern workplace - James Tait and Rachel Billen ...Freedom of expression in the modern workplace - James Tait and Rachel Billen ...
Freedom of expression in the modern workplace - James Tait and Rachel Billen ...
 
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...
 
Final powerpoint for social media club program
Final  powerpoint for social media club programFinal  powerpoint for social media club program
Final powerpoint for social media club program
 
A lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesA lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issues
 
A lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issuesA lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issues
 
Social media, staff policy and law legal
Social media, staff policy and law legalSocial media, staff policy and law legal
Social media, staff policy and law legal
 
USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities Presentation
 
Workplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and MethodsWorkplace Privacy and Employee Monitoring: Laws and Methods
Workplace Privacy and Employee Monitoring: Laws and Methods
 
Public-Employee Privacy Rights in the Age of Social Media
Public-Employee Privacy Rights in the Age of Social MediaPublic-Employee Privacy Rights in the Age of Social Media
Public-Employee Privacy Rights in the Age of Social Media
 
When Employee Disloyalty is Protected By Law, December 2, 2010
When Employee Disloyalty is Protected By Law, December 2, 2010When Employee Disloyalty is Protected By Law, December 2, 2010
When Employee Disloyalty is Protected By Law, December 2, 2010
 
Employers and Social Media: You Love to Love It & Love to Hate It
Employers and Social Media:  You Love to Love It & Love to Hate ItEmployers and Social Media:  You Love to Love It & Love to Hate It
Employers and Social Media: You Love to Love It & Love to Hate It
 
1984 in 2015 Protecting Employees' Social Media from Misuse
1984 in 2015 Protecting Employees' Social Media from Misuse1984 in 2015 Protecting Employees' Social Media from Misuse
1984 in 2015 Protecting Employees' Social Media from Misuse
 

Similar a Is Employer Monitoring of Employee Email Justified

Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workShankar Myadharaveni
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxsusanschei
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?Tayfun TEK
 
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docxMLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docxraju957290
 
Email strategies
Email strategiesEmail strategies
Email strategiesAlan Haller
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward F. T. Charfauros
 
Employee extortion
Employee extortionEmployee extortion
Employee extortionrhey02
 
Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Kielentot Martinez
 
Blog is Mightier Than the Sword
Blog is Mightier Than the SwordBlog is Mightier Than the Sword
Blog is Mightier Than the SwordWendy Angel, M.S.
 
A Quick Email Etiquette Education
A Quick Email Etiquette EducationA Quick Email Etiquette Education
A Quick Email Etiquette EducationChelse Benham
 
How to be evil - And stay legal
How to be evil - And stay legalHow to be evil - And stay legal
How to be evil - And stay legalAxon Partners
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkGary Chambers
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxfatimagull32
 
Email policy training management revised(1a)
Email policy training management revised(1a)Email policy training management revised(1a)
Email policy training management revised(1a)Janette Levey Frisch
 

Similar a Is Employer Monitoring of Employee Email Justified (20)

Workplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_workWorkplace environment e-mail_and_internet_privacy_at_work
Workplace environment e-mail_and_internet_privacy_at_work
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
 
Did you get my email?
Did you get my email?Did you get my email?
Did you get my email?
 
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docxMLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
MLA Research Paper (Orlov)Anna OrlovProfessor Willis.docx
 
Email strategies
Email strategiesEmail strategies
Email strategies
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
 
Employee extortion
Employee extortionEmployee extortion
Employee extortion
 
Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)
 
Ethical case studies
Ethical case studiesEthical case studies
Ethical case studies
 
Ethical case studies
Ethical case studiesEthical case studies
Ethical case studies
 
Reclaiming control of your business communication
Reclaiming control of your business communicationReclaiming control of your business communication
Reclaiming control of your business communication
 
Safe Email Practices
Safe Email PracticesSafe Email Practices
Safe Email Practices
 
Internet Law Primer
Internet Law PrimerInternet Law Primer
Internet Law Primer
 
Liabilty
LiabiltyLiabilty
Liabilty
 
Blog is Mightier Than the Sword
Blog is Mightier Than the SwordBlog is Mightier Than the Sword
Blog is Mightier Than the Sword
 
A Quick Email Etiquette Education
A Quick Email Etiquette EducationA Quick Email Etiquette Education
A Quick Email Etiquette Education
 
How to be evil - And stay legal
How to be evil - And stay legalHow to be evil - And stay legal
How to be evil - And stay legal
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at Work
 
Legal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptxLegal And Ethical Aspects.pptx
Legal And Ethical Aspects.pptx
 
Email policy training management revised(1a)
Email policy training management revised(1a)Email policy training management revised(1a)
Email policy training management revised(1a)
 

Último

Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfOrient Homes
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurSuhani Kapoor
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 

Último (20)

Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdfCatalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
Catalogue ONG NƯỚC uPVC - HDPE DE NHAT.pdf
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.Eni 2024 1Q Results - 24.04.24 business.
Eni 2024 1Q Results - 24.04.24 business.
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service JamshedpurVIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
VIP Call Girl Jamshedpur Aashi 8250192130 Independent Escort Service Jamshedpur
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 

Is Employer Monitoring of Employee Email Justified

  • 1. Is employer Monitoring of employee email Justified?
  • 2. Did you know? According to Dupree and Jude, from “Who’s Reading Your Office Email? Is That Legal?” said, 65% now use software to block connections to websites who’s images have no place in the workplace.
  • 3. Who is reading your office email? I don’t know!!! It is time you know your rights!
  • 4. Truth is you have zero privacy The simple fact is that monitoring employee e-mail and Internet usage is legal under almost all circumstances. As a general rule, when an employee enters the workplace, an employer may monitor and record communications, including e-mail and Internet use, without notice to the employee.
  • 5. Here is an Example: A supervisor emailed inappropriate comments to an employee at home, and the employee responded in kind. The e-mails were communicated over the company system. Regardless of the company assurances, the employee was terminated for communicating “inappropriate and unprofessional comments” via the company system. The court held that “once plaintiff communicated the alleged unprofessional comments to a second person over the email system that was apparently utilized by the entire company, any reasonable expectation of privacy was lost. ”
  • 6. How fair is this? (Google Images)
  • 7. E-mail is Easily Viewable Employers can review e-mail at any time and with lightening speed. A company called Dow Chemical took a “snapshot” of a day’s worth of employee e-mails and then systematically sorted through them. Some 254 employees had saved, filed, or sent sexually related, violent, and other inappropriate e-mails. The actual participation and involvement of the employees varied considerably. Dow discharged 20 employees and disciplined others.
  • 8. Is this really necessary? Yes, because as you can see, it makes your really boss angry.
  • 9. It’s the employers responsibly On his watch he is responsible for illegal, discriminatory, or offensive communication that are transmitted over the system or viewed by others from a company computer screen. That includes Sexually explicit, graphically violent, or racially inappropriate websites open to view by co-workers may be used to support claims of discriminatory behavior or a hostile work environment. E-mails also containing the same material also have the same effect.
  • 10.
  • 11. Employees can discover e-mails that contain corporate misconduct.
  • 12. E-mails contain libelous or defamatory content. THESE E-MAILS SHOULD NOT BE SENT OR FORWARDED!
  • 13.
  • 14. If e-mails are overlooked it could become a foreign problem.
  • 15.
  • 16. Copyrights Copyrighted material is not yours to share, especially not in an employers website without the knowledge or consent of a manager or supervisor. The company could be responsible for any copyright infringment.
  • 17. Try to Avoid Surprises “An employee took it upon himself to purchase CD’s containing copies of documents that we already had in our possession. It was easy. An e-mail arrived asking if he would be willing to share the cost of obtaining copies of documents. All he had to do was return an e-mail agreeing to participate in the project. Instead an invoice for several thousand dollars arrived at our office. There was no correspondence in the files authorizing the purchase. Ultimately, though, we found a brief e-mail from our employee responding to the...
  • 18. Avoiding Surprises ...the inquiry. The reply e-mail simply said, “count us in.” Of course, the company that provided the service wanted it’s money. After all, they had spend time and effort preparing the materials for us. We were stuck. If our office had monitored e-mails we could have caught this and stopped the expensive and wasteful process before the vendor incurred its costs.”
  • 19. Productive Communication vs. Personal Communication To do list at work: E-mail buddies about how funny Chad's hair looks today. Facebook and comment on friends walls. Buy Justin Beiber tickets on-line (going fast). Send whole office a link to the funniest Youtube video I just found. Do you see how we are not being productive at work?
  • 20. Summary of the “Yes” Employers have the right, even a duty, to protect the corporation from legal liability incurred by the careless action of their employees. The use of e-mail from the employer’s computer can get the company into worlds of trouble, and the company must monitor that e-mail.
  • 21. The “No” of E-mail Monitoring USA Today article uses we the people tone. The article doesn’t agree someone has the right to read e-mails except it be the writer or the intended recipient.
  • 22. Concern with E-mail monitoring USA Today says 2001, three-quarters of US business electronically monitor employees in some fashion. Companies need to keep pace with free willing communication technology in the internet age. Now a fact of workplace life.
  • 23. What is being monitored? 63% Internet 43% Tracked Telephones 19% Key Strokes & time logged in 38% Video Surveillance A quarter of these companies fire people for misuse of company technology. Three quarters have disciplined people.
  • 24. Privacy “People act as if they have privacy protection. They don’t stop to think they are under scrutiny,” said Stewart Baker, head of technology law practice at Washington DC. “Surprisingly for such a law-happy society, there are few limits on what employers can do in the electronic age with respect to the privacy of their employees.”
  • 25. Problems with Privacy Consultants advise companies to use notice as a way to “get over employees’ expectation of privacy,” which is an issue of social etiquette rather a legal one. Laws on wiretapping but not on voicemail, e-mail, or the internet in the workplace. (New that cell phone companies require compliance to be able to wiretap network. New York Times.)
  • 26. Struggle for Balance with Technology The internet is a powerful distraction. “The very definition of what is private is up for grabs as lines blur between working hours, personal time and home life. What privacy rights do employees have when working on employer-supplied laptops from home, for example?”
  • 27. “Employers are much more aware and much more nervous about productivity, legality and security, and these issues are behind the increase.”
  • 28. Corporate Litigation “Emails and voicemails are frequently the smoking guns in corporate litigation. Standard operating procedure for any plaintiff’s attorney in a corporate legal battle is to demand production of electronic records.”
  • 29. Big Brother Does Rest Monitoring is not done 24/7. Obviously because limitations of time and financial recourses prevent this from being monitored all the time.
  • 30. Summary of the “No” In the opinion of the USA Today the substantial body of opinion in the country is e-mail is like any other mail, an no one has the right to read it except the writer and the intended recipient. The goes for employers, too.
  • 31. Suggestions Learn how to save all your e-mails, voicemails, and text messages. Never send libelous or defamatory content. Use Google Voice. It transcribes your voicemails into text and saves the audio. Make a clear time for work and personal time.
  • 32. THE END P.S. Add me on Facebook, Parker Donat And follow me on Twitter @parkerdonat