Email Privacy Essay

2295 words - 10 pages

Ethical Management of E-mail Privacy

As I am sitting at my work station in a crowded office building, I hear the wonderful sound of "You've got mail." In turn I open my E-mail mailbox and find a letter from a nearby employee. This letter contains the usual funny joke of the day and a short joke ridiculing the boss, as usual. Who was to know that my supervisor would eventually find this letter, which would lead to both the termination of my job and my fellow employee? Do you feel this is right?

Does this sound common? This may sound common because the issue of E-mail and privacy is very common and controversial in our advanced technological world. The determination of what is ...view middle of the document...

Employees may not realize how easily their bosses and coworkers can access their E-mail. Many high-tech firms are even able to retrieve messages that the employees think they have permanently deleted. An article in the magazine, Business First, makes a good point, "Don't put anything in E-mail that you would not want read over the loud speaker throughout the company" (Miller 2).

Although many computers and company E-mail accounts have passwords, it does not mean that they are protected. System administrators can access almost anyone's E-mail. According to a web page on the Internet, "The only way to protect your E-mail would be to regard your E-mail as you would a postcard." People must realize that unlike other forms of communication, E-mail has little protection, such as telephone companies do (Learn the Net

1). This provides the employer with the ability to monitor someone's E-mail without them even knowing.

The topic of E-mail is so current that it even hit the meeting of the Long Island Direct Marketing Association (LIDMA) on October 22, 1998. At the meeting privacy issues concerning E-mail in the workplace were discussed. A local attorney, Martin

Gringer, Esg., explained the need for employees to understand that their e-mail may not be private and they should look into company policy before sending something which may "later come back to haunt them" (Hoke III 43).

The general view from business corporations is that they have a right to check their employees' E-mails. Many businesses, such as American Airlines, Federal Express, Eastman Kodak and UPS, regard employee E-mail as corporate property. They retain the right to investigate employee E-mail as often as they feel necessary (Rainone and Spinior 35).

Many of these organizations feel that E-mail monitoring is a necessity: They pay for the service and believe they own the property rights. Such rights would consist of the right to search employee computer files, voice mail, E-mail and other networking communications. An employer is also free to intercept E-mail messages if necessary to protect the company's right, property or ability to conduct business (Eberly 22).

On the other hand employees feel that searches and invasions of E-mails are an invasion of their own privacy. Because of the potential for negative consequences resulting from the organization's action, the practice of E-mail monitoring may be viewed as unethical (CNET 1).

Employees often contend that E-mail is analogous to the U.S. mail and users are entitled to the same privacy expectations as persons transmitting written communications via the U.S. Postal Service (Meyerhoff 31).

Whether it is legal or not, the truth is that many employers now routinely monitor E-mail their employees send and receive. Some E-mail systems copy all messages that pass through them and others create backup copies of new messages as they arrive. Workers who logically assume their...

Other Essays Like Email Privacy

Email Encryption Market by Deployment Type: Jsbmarketresearch

2885 words - 12 pages DURING THE FORECAST PERIOD 30 FIGURE 16 IMPLEMENTATION OF PRIVACY STANDARDS IN THE EMAIL ENCRYPTION MARKET IS EXPECTED TO PLAY A CRUCIAL ROLE 34 FIGURE 17 EMAIL ENCRYPTION MARKET SEGMENTATION: BY DEPLOYMENT TYPE 34 FIGURE 18 EMAIL ENCRYPTION MARKET SEGMENTATION: BY INDUSTRY VERTICAL 35 FIGURE 19 EMAIL ENCRYPTION MARKET SEGMENTATION: BY REGION 35 FIGURE 20 DRIVERS, RESTRAINTS, OPPORTUNITIES, AND CHALLENGES ANALYSIS 36 FIGURE 21 PORTER’S

Employee Privacy Report

1085 words - 5 pages computer without proper authorization will cause the computer to shut down and the computer systems administrator will be notified for any further actions. Laws regulating employee email and Internet privacy When an individual becomes an employee of a company, their right to privacy is increasingly dominated by their employers. According to Friedman & Reed (2007), “several factors have influenced this wearing down of workplace privacy

Management

610 words - 3 pages people use the handwriting mail, and read even take in. The email will be convenience. 5. Chairperson usually holds the casting vote Conflict of interest provisions Consensus is required for all decisions Majority of member to agree for all decision 6. Privacy. Privacy is very important problem in Australia’s law. So I am running the meeting, as the chairperson, ensure protect the personal details of participants, responsible for team

Internet Privacy Laws In China

2402 words - 10 pages Internet Privacy Laws in China Introduction As domestic economies globalize, the line has blurred from where an item is built, where it is sold and where it is serviced. It provides opportunities for individuals in many communities to expand their knowledge and learn about other cultures. Outsourcing has flourished in China and it has enabled its citizens to hone their skills by broadening their education to learn new trades and has

Health Care Communication

799 words - 4 pages email communication in health care, it also poses many risks. Patient confidentiality is still important. It is the legal and ethical obligation of the provider to ensure patient privacy no matter which form of communication is being demonstrated. The disadvantage of email is that although many think it is safe, it on the contrary is not as secure as one would like to think. Often times the email is sent to the wrong person, and can be accessed

Communication Paper

1230 words - 5 pages and importance of maintaining patient confidentiality when utilizing email as a mode of communication. The HIPAA privacy act is designed for the protection, confidentiality, and security of patients while their information is allowed to be transferred to the necessary healthcare insurers and providers. This rule includes all personal health information being written, given orally, and being sent electronically. It is specifically designed for

Analyze Message

1086 words - 5 pages AM >>> Last question.  It is going to be updated on the inet right?    Confidentiality Notice: This email message, including all attachments, is for the sole use of the intended recipient(s) and may contain confidential student and/or employee information. Unauthorized use and/or disclosure is prohibited under the federal Family Education Rights & Privacy Act (20 U.S.C. §1232g, 34 CFR Part 99, 19 TAC 247.2, Texas Government Code

Assignment5

2026 words - 9 pages Assignment #1 – Electronic Surveillance of EmployeesStrayer University        LEG500 – Law, Ethics, and Corporate Governance   Assignment #1 – Electronic Surveillance of EmployeesExplain Where an Employee Can Reasonably Expect to Have Privacy in the WorkplaceAlthough the law on employee privacy rights is still developing, various federal and state laws limit and define what employers can do when monitoring their employees (Dillon, Hamilton

Public Figures Right to Privacy

1008 words - 5 pages Public figures have a right to privacy Independent, The (London) , Apr 27, 2005 by PHILIP HENSHER Email Print The law on privacy has reached, surely, a most peculiar point. It's very difficult for an observer to understand the justice which underlies the most recent piece of celebrity scandal. If you had never heard of David and Victoria Beckham, had no idea of their fame, it would be all but impossible to understand why a court had

Using Social Networking Sites - Twitter

652 words - 3 pages their lives and breaking news faster than ever before in history. Although I’ am experienced at using computers and social networking sites, setup was a breeze. I had no issues or problems setting up my account and I’ am positive that anyone can accomplish this process fairly easily regardless of skill level if they have an email address. The process is very user friendly and can be done by anyone. Privacy settings in Twitter are very

Cloud Computing

990 words - 4 pages the end of the traditional standard computer based programs. Many consumers already use Cloud services but don’t realize it. The cloud in its simplest form can be found in your personal email “the cloud is a metaphor for the space on the Internet that can be used to store your data, as well as applications to manipulate it. The Gmail™ application exists online, and to use it, all you need is a connection to the Internet and a browser. Likewise

Related Papers

Employee Privacy Report

1142 words - 5 pages Employee Privacy Report • Write a 1,050- to 1,200-word report addressing e-mail, Internet use, and privacy policies. Answer the following questions in your report: o What are the e-mail use, Internet use, and privacy policies at your job? The email policy at my job at the Florida Foundation for Families (hereinafter “FFF”) are that work email is strictly to be used for work purposes and not for personal use. The policy is covered in

Electroinc Surveillance Of Employees Essay

4567 words - 19 pages to outside companies.� V. Legal issues involved in workplace privacy A. Email Privacy protection in the workplace can be found in a variety of sources, including the Fourth Amendment (providing protection from unreasonable searches and seizures by the government only), the federal Electronic Communications Privacy Act, state constitutions and statutes, and common law remedies for invasion of privacy.� Specific contracts or collective

Spam: Counteractive Measures Essay

925 words - 4 pages malicious attacks. This report will outline what the user can do in order to effectively counter the consequent negative aspects of having experienced the various associated digital attacks and privacy violations. Precautionary measures will also be discussed along with other ways in which users can take preventative care in order to ensure that the maximum level of safety and security can be achieved for all users during their email interactions

Privacy Concerns In Information Computer Technology

1108 words - 5 pages and sold models to other commercial companies. Secondly, email is becoming an essential tool of communication nowadays but it is not a secure way to protect privacy. On the way emails travel from host computers to their destination, they pass through several relaying hosts. Administrators of these hosts can easily access to mails. In a local network like a company’s intranet, network administrators have chances to change users’ passwords in