Employee Privacy Case Study

Good Essays
Linked to every single human being that uses technology, the biggest, most controversial feature of technology is privacy. With the advancement of the Internet, day to day activities and tedious tasks can be completed in no time. But the cost of using technology comes before our eyes when our personal information is at risk. Each action that we perform on the Internet is being monitored and recorded. With the push of a button, anyone can access an individual’s information on the Internet without permission. However, monitoring and recording information can be a useful resource in protecting a company’s assets.
Most organizations need information technology to operate, thus making technology a crucial part of their success. Since the Internet was brought to the workplace, there has been a significant increase in the number of ways to intrude into the system, steal information, commit fraud and sabotage a business, whether intentionally or unintentionally. Due to the fact that these organizations are always prone to such security threats, they tend to keep an eye on their employees. Many argue that recording and monitoring an employee’s information is invading their privacy because it hinders the way an
…show more content…
As human beings, the employees have a natural urge to feel territorial. Smith and Tabak claim that monitoring of employee e-mails “may result in less engagement in organizational citizenship behaviors due to the negative impact on employees’ perceptions of privacy and fairness as well as employee resistance” (43). Although the fact that when employees work under the company, they are using the company’s resources wins over the argument of the invasion of employees’ privacy. Therefore, as the company owns the e-mail system and has to protect its interests, they are not invading an employee’s privacy by monitoring the

Related Documents

  • Decent Essays

    With the extensive growing use of social media, lawsuits of all sorts have also been growing in numbers. Employers should be motivated to monitor social media to limit the amount of possibilities for lawsuits. Employers are able to use certain programs to track how much work each employee is getting done (Workplace, 2015). Employers need to use any rights they have to guarantee their employees are working. Employers have many legal rights that most of them are not aware of (Workplace, 2015).…

    • 1691 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Social media, podcasting and online role-playing games have become a part of our life because Internet nowadays can easily access. We could not consider about the day without it. Unfortunately, Internet addiction affects many people’s lives involuntarily such as grades, school life, Jobs, responsibilities and relationships. However, there are two sides to every coin, there are perks of using Internet in many ways too. This essay will give a definition of the Internet and the social media addiction.…

    • 1471 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    Almost every news story always have to do something with any Social network or Technology, even if it is bad or good news. There are too many reasons why the internet is bad for today's society, there are three specific ones to point out. Teens post things that they do not want specific people to see, they also can hurt their ability to do things, and teens get…

    • 1518 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    As the Internet was created, thousands of files of personal information suddenly became easily accessible to any sort of hacker with the right set of skills or potential monitoring by the government. It is a common debate of how much control the government should possess when monitoring the internet. However, people should also know the risk of uploading and sharing content on the internet. Therefore, the government--federal, state, and local--should have complete and free reign to monitor internet content because it is the choice of the internet user…

    • 978 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Added to that, many corporate take advantage of the rising number of security firms to load their halls and entrances with these guards, who restrict in a large percentage all kinds of breach in the company’s they protect. To conclude, I will say IT security, enterprise security and information security are three accountability information security and are essential and complementary for any company that want to protects its information as well as those of their clients. They can be dissuasive as the physical enterprise security, preventive like the information security, and curative like the IT security.…

    • 773 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Abstract- Modern technological advancement made our current internet on the pinnacle of everything related to information technology. However, it is always threatened by various types of security issues, which are mostly due to hackers, their bots and malicious scripts. They attacks, corrupts, collects and destroys the essential information in the system of the valuable organizations. To stop their such harmful and hazardous activities or to take preventive measures, most organizations now started to keep their own hackers who are known as ethical hackers or white hat hackers. This paper is based on what exactly an ethical hacker does, his protective system from illegal trespassing and on the field of ethical hacking with its various aspects.…

    • 1032 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    One a more serious note, they can be a menace to the strength of your organization. Every supervisor has had to deal with a harmful employee at one point and time. These are employees who just are not suitable with the culture of your company. Sometimes, they cannot avoid their own personal lives from trickling over into their professional career. A negative employee’s attitude can wreak…

    • 1067 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Large companies in particular have to be vigilant when it comes to cyber-crime because of the size and volume of information that is being held there. Organizations must take steps to protect themselves against internal and external crimes. Most companies believe that their information is secure but the truth of the matter is that it is not (Calder, A., 2008). No matter how confident a company is there will always be someone out there that has more knowhow about computers that will be able to hack a system and steal information from honest hard working people. Companies will use malware, spyware and firewall software programs to keep their information safe preventing from loss of…

    • 731 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Internal Security Threats

    • 1296 Words
    • 6 Pages

    This is how many employees with the wrong intentions can login under another employee ID and commit fraud or steal customer information. It is also important to remember that everyone has different access to certain areas within the system, meaning one employee may not have access to payroll, but the other does. This can open the flood gates for a serious internal attack. The second example of watching, managing, and protecting access is closely related to the protection…

    • 1296 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    With the rise of the Internet in today’s society it plays a more important role in elections like generally for the better whether it’s the threat of virality, access to new information quicker, and new platforms to reach voters through social media, however the Internet does have room for bias that could be negatively affecting elections results. Growing up with the Internet, I was always told to be careful what I post on the internet, and this holds true for political candidates as well. In today’s campaigns, candidates are under a microscope, since everything they say or…

    • 1805 Words
    • 8 Pages
    Decent Essays