Corporate Privacy In The Workplace

Great Essays
Corporate privacy has become a contentious issue in the current technological world where email, voicemail, and fax is the norm for most companies. Business creates corporate privacy policies to describe how personal information and organizational information is gathered, stored and used (Boddington 1). However, with an advent of modern technology, especially the internet, ethical dilemmas which rises include how to keep the corporate and personal information private to avoid infringing on either party 's right while maintaining managerial control to enhance efficiency at workplace. To both employees and the business communication technology has redefined what is good and what is bad. In this paper, I will discuss the ethical issues that the …show more content…
In doing so, the employees should create a relaxed environment where employees can interact freely without fear of being watched as long as the employees also care for the company. The implication would be, both the employer and the employees would not use email, fax, and voicemail in a manner that jeopardizes the corporate privacy and personal privacy. The biggest challenge with the theory is that people’s behavior are hard to predict and to let employees freely use companies’ communication technology to share to do personal activities can lead to a privacy breach. For example, voicemail is a corporate asset and key component of a communication system (White 2). Therefore, its content is the company’s property, and the company thus reserve the right to monitor the use and even retrieve the content is it is legitimate for referral (William 1). When a firm allows employees to use voicemail for personal purposes, the employees may be tempted to may be tempted to share information with unauthorized persons or the employees may use the voicemail system for personal use entirely which can be costly and ineffective. Further, employees and authorized users are required to maintain their password and keep the safe (Woodbury 2). However, these employees may share these passwords with family, friends and other unauthorized people who …show more content…
Electronic transactions communication is both a blessing and a curse to firms, and employees since the systems enhance and compromise corporate privacy in equal measure. Business today are faced with the dilemma of how to strike a balance between communication control and avoiding to interfere with employees’ private rights. System such email, voicemail, and fax when used well lead to fast and efficient communication and fosters teamwork. However, when misused, can result in a conflict of interest and unethical behaviors. But organizational control and monitor are good for the overall benefit of the firm and employees. When the company tracks how the employees use the communication system and what information they share, the business will avoid misuse of the resources and block conflict of interest between employees and management. With sanity and team work, a company can operate efficiently and achieve its

Related Documents

  • Improved Essays

    Caftori and Steve (2002) conducted research on issue of privacy in the Information age. The study conducted by Lee on Trust and Privacy online revealed that people are concerned about privacy, but they are ready to share their information when they have some benefits.…

    • 347 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    At no time should the workstation be used for personal email use, (i.e. sending or receiving), or social networking sites. The company has a secondary Internet Service Provider (ISP), and that should be used for personal email and social networking via your personal devices, such as cell phones and tablets. Again, you are not permitted to send company information using personal devices or email/social media. Key Control Maintaining constant watch over who has access to what electronic and physical key access is imperative.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Azman's Article Analysis

    • 215 Words
    • 1 Pages

    As published in the ABA Journal (2016) Azman, a lawyer that was fired from the law firm where he used to work, used computer access codes and logins to delete e-mails from Piscitelli’s computer (his former boss) as well as peers. According to the article the employee who had been fired attempted to black mail his former boss by telling him that would steal his clients, criticize and disparage his performance and reputation. When Piscitelli warned the former employee (Azman) that he would take legal actions if he acted upon his treats, Azman used credentials he had gained access from work to delete e-mail communication about his threats to his boss Piscitelli. Information security is a major issue not only for personal computer users…

    • 215 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Hrm/300 Week 2

    • 1986 Words
    • 8 Pages

    1. In your own words, describe what privacy means and what privacy protection companies should give employees. I feel that privacy in the workplace means personal information that an individual shares with an organization is protected and will not be shared with any other individual or entity other than those who are required and have access to the information and those who have consent to view the information. In addition, privacy can refer to the degree that an employer observes and gathers facts on the activities such as various forms of communication such as telephone conversations and emails sent on work computers. Privacy protection in the workplace given to employees should include protection of their personal information.…

    • 1986 Words
    • 8 Pages
    Great Essays
  • Great Essays

    Introduction The case, Comcast Corporation v. Federal Communication Commission and Steinbach v. Village of Forest Park discusses important aspects of utilizing the Internet for business and potential technology and privacy concerns. The Internet is growing rapidly. A growing concern to manage the growth and reliability of the Internet is net neutrality. It is important to understand how it can be regulated by the Federal Communication Commission and what authority Internet service providers maintain. As electronic communications are now becoming a staple in individuals and businesses daily operation, it is vital to understand the potential privacy concern of utilizing email.…

    • 1656 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Record360 Privacy Policy

    • 1061 Words
    • 5 Pages

    We may collect and possess personal information about employees of a Client that are users of our services (“User Information”). User Information may include contact information including the name of employees, your job titles or roles, phone numbers and email address. The source of the User Information is you as the individual user or your employer. We collect and process User Information for the purposes of providing our services and securing access to the services. We may legally collect this personal information by consent and for proper delivery of our services and for monitoring and ensuring the security the…

    • 1061 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Passwords cannot be stored in an easy to find location and should never be shared; not even with family members. • Employees that need to use private equipment and connect to the company network must meet company’s security policy for owned equipment remote access and be aware of the risks of exposing company information and its consequences. • Hosts using company or private computer to connect to CRI internal networks via remote access must be protected by using the most recent and powerful anti-virus…

    • 1019 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Bans are getting made on social media to prevent people from using technology from work to use for personal or non-business use (Lyncheski, 2010). The pros involve the rights of the employees while on social media. This is the case when a company didn’t allow their employees to discuss wages or employment to a third party. A national board then fined the company because this is unlawful (Horowitz, 2014). Social Media in the Workplace: Effects on Employees…

    • 743 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The communication privacy theory focuses on privacy boundaries and what information one chooses to withhold from another person. This privacy management system is focused on three parts: privacy ownership, privacy control, and privacy turbulence. Privacy ownership is our private information that only we know and others do not. This also encompasses our personal privacy boundaries. Depending on the person, our privacy boundaries could either be thin and porous, or thick and hard to break through (Griffin p. 151).…

    • 1200 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    In this paper the topics about ethics and privacy are going to be the main topics of discussion. Two businesses are going to be used in order to give examples about ethics and privacy. The bank Wells Fargo is going to be used to explained bad ethics and bad privacy. Wells Fargo has failed the code of ethics, and also violated their costumer’s privacy, because they used information that should have been used without the customer’s consent. The company Nike is going to be used to represent good ethics and good privacy, and what they do in order to be the amazing company they are today.…

    • 1272 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Technical System

    • 589 Words
    • 3 Pages

    For an organization with only a formal system and a technical system, multiple problems may arise within the institution. It has been discovered that most insecurity cases involving information handling occur from the employees within. Many at times the employees are not aware that they are breaking company policies when they engage in informal communication in a public setting. Problems that may arise include; (i) The organization has no control over how much information or the sensitivity of the information being spread to the public.…

    • 589 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Technology and media play a significant role in most people 's lives in today 's society. Digital devices are starting to rule over people 's lives. In Fahrenheit 451, Ray Bradbury illustrates a fictional society that revolves around electronics. The people living in Bradbury 's creation are brainwashed by the government, almost programmed to be the same, with a world in which reading books is illegal. The novel sends a clear warning to the real world showing how electronics can destroy freedom and independence.…

    • 1601 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Article of the Week Two Workplace spying has occurred for over a century. In the Industrial Revolution, factory workers were timed through stopwatches, while today, employees are monitored through technology. For instance, many companies can legally surveil employees’ internet use, track emails, and even log keystrokes to determine their work rate. Some companies can also identify a worker’s exact location, driving speed, and conversation length.…

    • 732 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Privacy ownership consists of boundaries that surround ones information that they have that other ’s do not. These boundaries can be either small and penetrable or thick and unbreakable. These boundaries help the owner of this private information keep this information secure and secret. The next part of the Communication Privacy Management Theory…

    • 356 Words
    • 2 Pages
    Decent Essays

Related Topics