This website uses cookies to ensure you have the best experience. Learn more

Electronic Surveillance Essay

1139 words - 5 pages

“Electronic Surveillance of Employees”
Katy Romero
Law, Ethics and Corporate Governance
Dr. Andrea N. Brvenik
Strayer University
July 17, 2011

Electronic Surveillance of Employees
An employer has the right to monitor the employees to increase the productivity and efficiency of its business. In the other hand, every person has the right of privacy within the organization. Human beings must experience a degree of privacy to thrive. Electronic surveillance is increasing every year within the organizations worldwide. This practice has created a debate among employees and employers.

1. Explain where an employee can reasonably expect to have privacy in a workplace
Employees are ...view middle of the document...

Outside his or her own workspace, a corporate officer or employee has a reasonable expectation of privacy to challenge a search if he or she has a "possessory or proprietary interest" in the area searched and there is a connection between this area and his or her own workspace. The Electronic Communication Privacy Act of 1986 (ECPA) is a statue that offers little privacy protection in communications to employees. The ECPA makes illegal to intercept, disclose or access messages without authorization. Appears to protect workers from electronic eavesdropping. There are some exceptions to the ECPA, there is no protection for communication that are “readily accessible to the general public” such as public chat room exchanges. The law does not apply to the extent that employees give consent to monitoring, which would seem to eliminate ECPA coverage in the many workplaces where people are told that their communications are not private. Employers can monitor networks for business purposes and employers can monitor based on consent by notifying. For people who work for the public or government employees have some protections by the Fourth Amendment. Government employees can have a “reasonable expectation of privacy” in his desk or file cabinets. The government still has to right to perform searches that serve interest in promoting efficiency within the operation of the workplace.
3. Explain if Herman’s need to know whether his salesperson are honest is a sufficient ground for utilizing electronic surveillance
Herman as a business owner or business manager needs to know if the performances of his employees are adequate. Ethical and honest behavior is expected from the employer. Electronic surveillance is justified if the employer discovers evidence that the policies of his company are not being followed as required. Herman discovered dishonest behavior from one of his employees. During a meeting with a potential customer, the employee gave inaccurate information about a car. The sales representative was not truthful. The electronic surveillance equipment allowed Herman to target the problem and fixed it in the spot. Corrective actions were taken and new recommendations were made. Thanks to this system the customer was able to received the real information and protect the company’s name.
4. Explain to what extent an employer can engage in electronic surveillance of employees
An employer can engage as much as they need to in electronic surveillance of employees. Workplace surveillance is that employers have a legitimate right to conduct surveillance for the benefit of themselves and the community at large, for purposes such as the detection of fraud and other crimes, the deterrence of criminality, and in order to comply with laws such as...

Other assignments on Electronic Surveillance

Eco 370 Week 3 Dqs Essay

355 words - 2 pages drug company, shopping mall, bank, or university. Write a 1,400- to 2,100-word budget proposal for the security department of a company or organization for the coming fiscal year. As the security director, your proposal must seek to improve all aspects of access control for the organization. Include the following in your proposal: o  Compare electronic technologies in relation to access control and surveillance. o  Determine

Information Technology Act Essay

291 words - 2 pages   In the world we live in today, there’s some type of electronic device being used to connect to the Internet.   “The world-wide platform enable individuals to connect, compute, communicate, compete, and collaborate everywhere, and anywhere, anytime and all the time, and to access limitless amounts of information, services, and entertainment”(Kelly Rainer Jr. & Cegielski, 2011). “This platform operates without regard to geography, time, distance

Criminal Justice Trends

1253 words - 6 pages a sledge hammer. Surveillance makes prison safer for inmates and correctional officers. New technology in prisons are using radio frequency identification tracking. The inmates wears an electronic bracelet that tracks his or her movement throughout the prison. If an inmate enters a prohibited area and is wearing an electronic bracelet an alarm will sound, it is also easier to count the prisoners. This electronic bracelet can provide

Organizatitonal Redesign

1816 words - 8 pages importance will be explained. AMR • AMR (Automated Medical Records) is a term used at the early stage of electronic medical documentation. It was information retained on a customary personal computer and did not comply with legal ramifications for electronic medical records. Therefore a paper file was maintained. The computer information is used as a working file, and then pages are printed and filed in the chart (Fishman, 2005

Hawkins V. The State. Court Of Appeals Of Georgia

2133 words - 9 pages Report on E evidence admissibility issues in the case of HAWKINS v. THE STATE. Court of Appeals of Georgia. MEMORANDUM Subject: E evidence admissibility issues Using an online data base or an internet search engine, search for a situation in which an electronic device or recorder implicated someone of a crime or wrong doing. Write a report on the E evidence admissibility issues in the case. In your report, describe how that evidence

Employee At-Will Doctrine

1708 words - 7 pages . Mr. Smith believed that he was justified in sending the messages and that his privacy had been invaded when his emails were intercepted (Halbert, 2012).” Employee internet and email use is indispensable in today’s society due to the need to surf the net for research purposes, but discretion is always advised. Since 2001, The American Management Association (AMA) has conducted studies about electronic surveillance from videotaping to


1186 words - 5 pages is maintained or transmitted through electronic means in association with certain administrative and financial transactions such as electronic transfer of health insurance claims. The covered entity, in most cases, is required to obtain an individual’s authorization prior to disclosing any health information. And in   most circumstances the patient or a legal representative of the patient controls the disclosure of PHI to any third party

Big Data

1023 words - 5 pages Privacy Act of 1974, the Communication Assistance for Law Enforcement Act (CALEA), the PATRIOT Act, the Protect America Act, and the Foreign Intelligence Surveillance Act 2. Additional privacy protective laws including the Fair credit reporting Act, and the Electronic Communication Privacy Act 3. Industry specific privacy laws–HIPAA, GLBA, and HITECH—p. 124-136 in the custom textbook You may need to use trade journals and newspaper stories in

Google Database Stuructures In Business Databases

1547 words - 7 pages structures that contains electronic medical records to track patient’s interaction with the medical staff from birth to death. To stay current in ever changing technology hospitals has adopted a strategic plan called electronic health information management, which ensures availability of health information to facilitate healthcare and critical related decision-making across all hospital departments. Healthcare will only run properly if healthcare


3746 words - 15 pages discussed whether Snowden should be seen as a traitor or hero. Edward Snowden acted in great personal risk to leaked files that revealed the United States was spying on key officials of the European Union, NSA surveillance programs, and NSA hacking in Hong Kong and mainland China. this article contributed to the whistleblowing research in that the whistleblowers put the community, public and the world ahead of the personal safety. Regarding Edward

Clinical Documentation

2727 words - 11 pages ) encompassing 25 hospitals, affiliated physician offices, and ancillary facilities.  CareConnect allows physicians and management to access the system on their mobile devices and home computer for real time data.  The shift for CIS is set for implementation throughout the United States by 2015.  The clients served are those in the community that THR provides healthcare services to.  The electronic health record is shared amongst the healthcare

Similar Documents

Leg 500 Electronic Surveillance Of Employees

2350 words - 10 pages Electronic Surveillance of Employees Law Ethics and Corporate Governance Electronic Surveillance of Employees 1. Explain where an employee can reasonably expect to have privacy in the workplace. From the time an employee reaches his work place or is on a sales call he is typically on either company property or he may be on property owned by a customer of his company.   So that employee is now utilizing company time- which he is being

Nsa Surveillance Program Essay

2180 words - 9 pages specify the identity of the target, the location and the type of establishment placed under surveillance, the type of communication monitored, and the period of time approved for the surveillance. Moreover, section 1809 of FISA act says, “ it is a crime to collect electronic surveillance beyond the scope of this exclusive means […] when Congress declares war, the president shall have fifteen days to conduct warrantless wiretapping, but fifteen days and

Fmla Essay

714 words - 3 pages should not be discussed with anybody but the two parties who was present for the conversation. The answer probably depends on whether there are alternative methods of ascertaining the honesty of salespersons that are less invasive of the employees' privacy. For example, Herman could use surveys of customers to find out this information. In fact, many businesses use customer surveys rather than electronic surveillance to evaluate

Eco 370 Week 5 Dqs Essay

378 words - 2 pages drug company, shopping mall, bank, or university. Write a 1,400- to 2,100-word budget proposal for the security department of a company or organization for the coming fiscal year. As the security director, your proposal must seek to improve all aspects of access control for the organization. Include the following in your proposal: o  Compare electronic technologies in relation to access control and surveillance. o  Determine