This website uses cookies to ensure you have the best experience. Learn more

Monitoring.... Not Spying (Reading Employees Emails And Monitoring Websites)

666 words - 3 pages

People should be able to write whatever they please in an email without worrying about other people reading it other than the recipient. Of course, I believe this is true only when they use his or her personal computer. At the workplace, on the other hand, I believe it is morally acceptable for an employer to read his or her employers email. One of the deontological issues concerning this is privacy of personal communication and the strongest utilitarian consideration is that if employer's email is monitored, then there would be less lost productivity and less cases of sexual harassment. There is obviously a tension between the employee's right to privacy and the business' right to control what goes on in the workplace.One example is of a female administrator who was horrified to find her boss reading printouts of employers email. She lost her job for her protest. She ...view middle of the document...

The research also found that 23 percent of those employers didn't notify employees that the monitoring was going on (Glave, 1999). The deontological issue concerning privacy pf personal communication could be solved by simply notifying the employee that email, among other things, will be monitored. At that the time the individual could decide whether or not they find privacy of email such a big issue and have the opportunity to quit if chosen.This notification would make the utilitarian consideration stated before about less lost productivity and less cases of sexual harassment come to light. If employees know that they are being monitored they will be less apt to use the computer for personal reasons in fear that what they do or say can be used against them later. Whether it be surfing non work-related websites or sending personal emails to coworkers, the fear of losing his or her job will keep them focused on what they should be doing.Companies are strongly encouraged by lawyers and human resources managers to have explicit written policies stating that the company owns the communication system, that the system is intended for business purposes only and that the company can monitor it (Samuels, 1996). Even those who believe monitoring is in an invasion of privacy would rather see employees informed of the company policy than live with the illusion that they are conversing in private.After looking at the main deontological and utilitarian considerations of employers reading his or her employee's email, it is clear that monitoring email is a smart choice for all parties involved in the long run. It is morally acceptable for employers to read his or her employees email because it has the greatest benefit to all parties.Works CitedD'Amico, Marie. "Stop Before You Spy on That Email". 3 Sep. 1996. 20 Jun. 2004..Glave, James. "An Email Bill For Employees". 16 Sep. 1999. 20 Jun. 2004..Samuel, Patrice. "Earning It: Who's Reading Your Email? Maybe the Boss". The New YorkTimes. 12 May 1996. 20 Jun. 2004.Privacy.htm>.

Other Papers Like Monitoring.... Not Spying (Reading Employees Emails And Monitoring Websites)

Develop and Implement Reactive Monitoring Systems for Health and Safety

1866 words - 8 pages which in turn results in lower overall risk and a consequent reduction in injuries and ill health to both staff and prisoners. If the measurement and or monitoring of these incidents are not carried out correctly, the effectiveness of the health and safety management system is undermined and there is no reliable information to inform managers how well the health and safety risks are controlled.Failures in risk control also need to be measured

Scada and Gis for Drinking Water Distribution System Monitoring and Response

851 words - 4 pages the treatment plant and associated water sources. Water quality monitoring is often performed by grab sampling to meet regulatory requirements. While grab sampling is useful in detecting contamination events with long-term consequences, it is not adequate for detecting short-term, intense contamination events.1 Also, because of the resources needed to address high-priority facilities, little attention has been given to the vulnerabilities

Describe How Monitoring of the Environment, the Public, Workers and the Workplace Can Be Used to Control the Pollution Cause by Ionising Radiation (20)

680 words - 3 pages ways, an example is air monitoring in which a device called a Geiger counter is used to measure radiation in the atmosphere. This method of radiation monitoring is also used in places such as workplaces that use radioactive materials, there are currently 1000 of these companies in the UK currently. Radiation may also be monitored in water, there are many sensitive habitats found near and in water ways therefore it is important to measure water

An Investigation Into The Challenges Influencing The Implementation Of Electronic Medical Records Systems For Hivcare Patient Monitoring And Clinical Management. (A Case Study Of Mbagathi District...

550 words - 3 pages CONCEPT PAPER TOPIC: AN INVESTIGATION INTO THE CHALLENGES INFLUENCING THE IMPLEMENTATION OF ELECTRONIC MEDICAL RECORDS SYSTEMS FOR HIVCARE PATIENT MONITORING AND CLINICAL MANAGEMENT. (A case study of Mbagathi District Hospital and Makadara Health Centre in Nairobi County) INTRODUCTION – BACKGROUND OF THE STUDY. The implementation of electronic medical records (EMR) systems is a complex process that is receiving more focus in developing

E-Cigarette

5094 words - 21 pages visible to monitoring software and may not really be private at all. Several cases involving private emails on employer time and equipment have gone against the employee and determined that the employer’s interception or use of an employee’s personal emails was permitted because of policies that allowed it and implied consent and because the employee was using employer owned computers or sending the emails from work. Even cases of employees

Spying of the Nsa, Public Speaking Report

1922 words - 8 pages . Main Point 1: How is it possible that the NSA is spying on civilians? Sub Point 1: What is the NSA; I’m going to begin by telling you a little about what the NSA is. The NSA better known as the National Security Agency is the main producer and manager of the signals intelligence for the United States. The NSA is responsible for the protection of U.S. government. The NSA is tasked with monitoring on targeted individuals in the U.S. But the NSA

Xmg 216 Employee Monitoring

920 words - 4 pages monitor Internet and emails if proper legal steps to ensure privacy rights of employees are not violated. To ensure privacy rights are not violated, employers must notify employees when at work, employees should have no expectation of privacy when facilitating company resources, such as internal information systems, computers, telephones, internet, etc. and each employee is subject to monitoring at all times. Ethically, an employer should provide

Monitoring in the Workplace

1013 words - 5 pages electronic monitoring policy at the company. One could argue that an employee has not consented to monitoring at wife’s company. My conclusion is privacy rights had been violated. She has a duty to operate the company within the laws and regulations set forth by the government. In my opinion, my wife’s boss failed to weigh the moral nature of the monitoring versus the employees right to privacy. Deontological reasoning suggests that the

Spectorsoft, Spytech and Netvizor

1015 words - 5 pages are abusing business work time. NetVizor employee computer monitoring software can operate in total stealth – defeating the built in Windows task manager and popular spyware detection tools. These abilities mean you will not have to worry about your employees discovering you are monitoring them – and even if you inform them they will still not be able to tell how. Logs can even be stored in an encrypted format, so they can only be viewed with

Handling Security and Ethical Issues

1677 words - 7 pages . IT professionals are especially offered many opportunities for unethical behavior. However this issue “Can be reduced by top-level managers who develop, discuss and enforce a code of ethics” (Stair & Reynolds, 2012). Regarding TBWI’s employees, listed are the ethical issues and recommendations for handling them. Monitoring Company Emails Communication is important in any business and emails provide a means for TBWI staff to communicate

Employee Privacy Report

1108 words - 5 pages in these emails and can find offensive words or phrases. There are other reasons that somebody can use an email to sue a company, which why it is crucial that these companies imply a policy and actually follow through and monitor the usage. There may be employees out there that believe no matter what, they are entitled to their privacy. Having your email, internet, and even telephone usage monitored at work is not about the invasion of

Related Essays

Monitoring Employees Essay

644 words - 3 pages Monitoring Employees on Networks William C. Bridges IT/205 February 28, 2014 Professor Song Tang   The e-mail process benefits organizations by allowing for inter-company communications faster and more direct. . Email benefits an organization in speed of communication between its employees as well as management and also the decreased cost of this method of instant communication. Using e-mail lets employees communicate with each other

Monitoring Employees On Networks Essay

1256 words - 6 pages right to monitor employee’s Internet and e-mail usage because they are legally liable for things their employees may be looking at or discussing. This is why employers are allowed to monitor their employees' communications, within reasonable limits. With that said, employers must make sure that their monitoring does not violate their workers' privacy rights. And, on a practical level, employers must decide how much monitoring is necessary to serve

Monitoring Employees On Networks Essay

878 words - 4 pages There are several reasons an organization should limit their employees viewing personal e-mail, especially during work hours. Employees who check their e-mail during working hours are not focusing on their duties at hand. Some may become so involved in reading and responding to e-mail that their work does not get finished, causing poor production for their employer. E-mail checkers can also cause clogging of the “company’s network” which

Testing And Monitoring Security Controls Essay

776 words - 4 pages requirement for all employees throughout the scope of the business and the close monitoring of the network traffic are vital to keeping your information safe and secure and prevent attacks by anyone whether by intentional or unintentional methods.