Employee Privacy Case Study

Improved Essays
Linked to every single human being that uses technology, the biggest, most controversial feature of technology is privacy. With the advancement of the Internet, day to day activities and tedious tasks can be completed in no time. But the cost of using technology comes before our eyes when our personal information is at risk. Each action that we perform on the Internet is being monitored and recorded. With the push of a button, anyone can access an individual’s information on the Internet without permission. However, monitoring and recording information can be a useful resource in protecting a company’s assets.
Most organizations need information technology to operate, thus making technology a crucial part of their success. Since the Internet was brought to the workplace, there has been a significant increase in the number of ways to intrude into the system, steal information, commit fraud and sabotage a business, whether intentionally or unintentionally. Due to the fact that these organizations are always prone to such security threats, they tend to keep an eye on their employees. Many argue that recording and monitoring an employee’s information is invading their privacy because it hinders the way an
…show more content…
As human beings, the employees have a natural urge to feel territorial. Smith and Tabak claim that monitoring of employee e-mails “may result in less engagement in organizational citizenship behaviors due to the negative impact on employees’ perceptions of privacy and fairness as well as employee resistance” (43). Although the fact that when employees work under the company, they are using the company’s resources wins over the argument of the invasion of employees’ privacy. Therefore, as the company owns the e-mail system and has to protect its interests, they are not invading an employee’s privacy by monitoring the

Related Documents

  • Improved Essays

    Loo1 Unit 2 Research Paper

    • 1344 Words
    • 6 Pages

    Blackboard Name: Sanya Murgai PSID: 1264832 LO1: Discuss information privacy and methods for improving the privacy of information. LO2: Explain the effects on information privacy of e-mail, data collection, and censorship. In today’s day and age, privacies definition can be manipulated to personal preferences. Once we put something on the internet, it will be accessible forever even if we delete it.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In this case we are faced with an employee caught in the crossfire or an employee setting boundaries to protect employees, students and other involved, but also violates those same groups right to privacy. Under most circumstances, those employed by the city, state or federal government are subjected to limited privacy. Organization are often uncertain were to draw the line between protecting the company’s assets and employees while providing a safe and secure work and school environment. In this case we discuss an employer who installs a surveillance camera to solve the problem of continuous theft of student’s personal good.…

    • 612 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Under the HIPAA Privacy Rule, the two important terms that need to be understood and followed properly include “use” and “disclosure”. The use of PHI involves the information to be utilized and communicated within the healthcare entity. The disclosure of PHI involves the information to be released to an individual or outside entity that follows a request. In general, HIPAA Privacy Rule protect individual’s rights to their PHI and holds covered entities accountable for providing an accounting of disclosures for PHI. With that being said, covered entities need take proper protocols on implementing the best method to track disclosures.…

    • 349 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology, the American people 's privacy has shrunk, we are monitored at all times. Cameras at every street corner, cell phones being tracked to the exact foot, every website and Google search seen stored and collected. All of this is done in the name of our safety, but how much of this data is about our safety and more about controlling us? In Adam Penenberg’s essay The Surveillance Society, readers are informed of these measures and are lead to believe the invasion of our privacy is necessary. Some form of surveillance is a necessity in the world we live in today, crimes and terror attacks have been prevented because of it.…

    • 1425 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Many users on the internet distrust communication, sharing, and storing in fear of government surveillance. Many cannot express their will freely because they are aware the government will be supervising their data. If people know that there is a government data base that records information and stores every search or call, this poses a chilling effect for their free speech. The large amounts of data removes a person’s ability to move on from past experiences if it can be recalled (Schneier 2015). The 3rd amendment has been interpreted by courts that there would be privacy of the home; there is no privacy because individuals are constantly monitored.…

    • 1412 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    The 14th Amendment Essay

    • 932 Words
    • 4 Pages

    Technological changes have created a more complex phenomenon in the area of employee’s surveillance. Various technologies have made it easy for the employers to monitor their employee’s jobs especially through internet, emails, computer terminals, and telephone. Almost everything perfumed by the…

    • 932 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    However, despite all of are major accomplishments in the past forty years, we’re facing a major problem with our privacy. As a result of almost 90% of Americans using the internet on a day to day basis, the Senate of the United States has just passed a resolution that removes our very right to privacy. As of matter of fact, the resolution known as “SJ Resolution 34” has been passed as a law and will remain a law until a supreme court justice deems it unconstitutional or the legislation repeals it. Presently, as of May…

    • 713 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The similar threat of constant surveillance in our modern lives is prevalent. The technological and corporate control of firms such as Facebook and Google, show that we are being constantly tracked. “Progressive migration online raises concerns over surveillance and exposure. Even casual Facebook users develop a presence that matters” (Trottier 2012.) Social media has the power to track everything that one may connect or have to do with it.…

    • 1109 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Gleen Greenwald believes those who say that privacy does not matter to them instinctively take action in protecting their privacy. He talks about how people being social animals still need their own privacy and how scrutinized people’s perspective on privacy is in today’s world. He expresses his thoughts and examines examples of where people unconsciously choose to protect their privacy even after they verbally deny the importance of privacy. He also says how mass surveillance has invaded our privacy and how it controls our behaviours as people becomes obedient and compliant. He talks about the history of mass surveillance and how important it is to go against such an invasive idea.…

    • 650 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In our daily lives, we relinquish some of our private information ignorantly. As human beings, many of us tend to simply hand out our information in exchange for other items or free services. Many times, online shopping offers better prices but at what cost? Sometimes, better prices means relinquishing your private information that could be obtained by anyone at anytime. In the article, The Convenience-Surveillance Tradeoff, the author makes compelling points on how our society is unaware of the repercussions that come with relinquishing our…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    With the continuing development of the Internet, the center stage of individual, business, and government discussions became a new globally sought after resource, data. Since its origin, Internet users have been warned about the dangers of posting personal, intimate information publicly; however, recent events have shifted privacy discussions away from discouraging posting ill-advised information to bringing awareness to under the radar data collection. Data is a very broad term that encompasses almost all Internet activity. What users search, click, view, and type is all collected and processed by either the website, Internet browser, or even the device itself. The demand for this personal data is enormous.…

    • 1224 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    As humans continue to crave convenience, large technological companies are starting to add features to make products easier to use. However, the consumers do not realize that in order for them to receive such large amounts of convenience, they are sacrificing their privacy. Some of Samsung’s new Smart Televisions ship off “...voice data to an unnamed third party—presumably for the purpose of translating the speech to text”(Newman). This perfectly illustrates how today’s latest technology is invading privacy, one step at a time. People who use the voice command feature on their television can accidentally say something that they should no tell others.…

    • 1601 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays