Tuesday, February 4, 2020

Email and Internet use and Privacy Policies Essay

Email and Internet use and Privacy Policies - Essay Example Moreover, the use of internet in working hours is allowed to complete business tasks. However, the use of internet brings the likelihood of contravenes to the safety of secret Company details. Moreover, internet use also causes contagion to our business structure with several spyware, malwares, Trojan horses and viruses. At my job, Email is utilized for performing business activities. However, the private information of the company should not be given away from the Company, without the approval from the company management. Additionally, it is not ethical to perform private dealings using Company PC or electronic mail (Boze & Stevens, 2010; Heathfield, 2011). Employees should keep in mind that the company keeps the record of several communications done using electronic mail or else whatever is shared on company PC. In this scenario, network administration and authorized employees have the full right to view any content in employee’s electronic mail or on employee’s PC wh enever they want. Thus, people should not think that their electronic link, storage or access to be confidential if it is managed or stored at work. Furthermore, in the place of work current developments have altered the ways workers make use of the internet and electronic mail. Thus, the businesses are confining their workers’ use of Internet and email with privacy policies (Boze & Stevens, 2010; Heathfield, 2011). What are the current laws regulating employee e-mail and Internet privacy? A lot of businesses are using the pre-established rules those confine internet and electronic mail usage for workers. In this scenario, these businesses apply privacy rules that bound the extent of privacy workers are allowed to even as in the office. Additionally, the managers are answerable for the acts of their workers or staff. Thus, most of the businesses believe that privacy of the company should have priority over worker’s privacy at the place of work. In this scenario, busine sses apply rules and laws on the internet and e-mail usage in order to defend the company beside robbery, permissible concerns, and maintain the reliability and reputation of the business (OPPapers, 2010; eNotes.com, Inc., 2011; FindLaw, 2011). In this scenario, existing laws those are regulating workers’ internet and e-mail privacy vary from country to country. However, the prime initiative of these laws describe that boss or manager who holds the e-mail framework, internet setup or networks is perfect inside their privileges to check the access to internet or e-mail in addition to practice by the staff. In this scenario, the electronic mails are managed through the Electronic Communications Privacy Act (ECPA) and the Patriot Act.  So over internet the ECPA secures together digital communications as well as electronic mail. Furthermore, the law prohibits their stoppage and detection by 3rd party. In this regard, ECPA outlined a number of distinct crimes: (OPPapers, 2010; e Notes.com, Inc., 2011; FindLaw, 2011) Accessing and trying to interrupt transmission Open connection to the transmission without approval Stopping the transmission for the reason of hindering illegal analysis Capturing communication for business operations Making use of electronic, automatic, or else extra equipment to cut off transmission What assumptions might employees make about their privacy at work? How do these policies affect employee privacy at work? The biggest concern for the majority owners or managers is legal responsibility.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.