StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

E-Mail, Internet Use, and Privacy Policies - Assignment Example

Cite this document
Summary
This report examines email use, internet use and privacy policies at an organizational workplace. This report assesses the company practices of internet and email use policies and measures that employees' need to consider at the workplace in order to ensure privacy in internet use…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
E-Mail, Internet Use, and Privacy Policies
Read Text Preview

Extract of sample "E-Mail, Internet Use, and Privacy Policies"

 E-Mail, Internet Use, And Privacy Policies Introduction The internet has brought major changes in the business contexts. Even though internet can play vital role in helping human resource management in performing various functions like recruiting, training and knowledge management, it also has negative sides of employee misuse of email and internet at workplaces. Internet misuse among employees and need for internet and email policies have recently become matters of debate among human resource experts and corporate managements. This report examines email use, internet use and privacy policies at an organizational workplace. The current laws regarding internet use, internet privacy and email use are also detailed in this report. This report assesses the company practices of internet and email use policies and measures that employee need to consider at workplace in order to ensure privacy in internet use. E-mail use, Internet use, and privacy policies When employees are at workplace, the main emphasis is normally given on improving the overall productivity and employee performance. E-mail and internet use among employees at workplace have created issues that it is merely a time consuming and more over there can be issues of misuse as well. Employees may share the company matters with others or through social media like twitter or facebook and this adversely affect the company. Telstra, an Australian Carrier and media company with 49000 employees, has become an example of organization that brought set of rules and regulations for employees regarding internet use (Peter Williams, July 2009). Internet policy is guidelines and instructions given to the employees regarding the use of internet facilities including surfing of the web, e-mail use, and social media and chatting etc. The main objective of internet policy is to increase employee productivity and reduce legal liabilities that may happen due to the employee misuse of internet. Noonan (2004) emphasized that an internet policy must be able to define who is allowed to access internet at workplace and what types of access are permitted (p. 34). One of the main issues related with internet is the misuse of social media like twitter.com, linkedin.com etc. according to Solis and Breakenridge (2009), public relations are ever changing and social media sites are empowering new domains of authoritative voices that should never be ignored. Social media can alter the entire media landscape because power of influence can be placed in few hands if they have goods commenting power (p. 1). Social media can create greater challenge on both Human resources management as well on the organization in general. Because, employees may access social media sites and comment on company matters that can create many issues of legal liabilities and public interest. Current laws regulating employee e-mail and internet privacy When an employer provides oral or written policy regarding any issue in the workplace including internet use or privacy issues, that policies are legally considered to be binding. The employees are legally responsible to know what are the privacy policies prevailing in the workplace (Privacy Rights Clearinghouse, 2010). In the law case of Smyth v Pillsbury, the employee’s termination from the job was upheld by the court, because, the employee sent messages to colleagues that were inappropriate for the workplace, though employees in the same workplace were allowed of internet and email use in the workplace (Privacy Rights Clearinghouse). There are currently few laws that regulate employee monitoring in terms of their internet use. When the employer or employees have issues regarding internet use and privacy policies, they are supposed to contact federal legislators. In any case, the fundamental legal view will be that the policies that employers have issued to the employees will be legally binding. Why do companies implement e-mail and Internet use policies? Companies need to implement email and internet use policies basically as part of its goal. The fundamental goal of any business is to achieve maximum utilization of available resources and thus to enhance increased productivity and high performance working. Employees are the human capital and they are the most valuable assets of a business. If they are better utilized, the business can achieve success by increasing the employee productivity. All the businesses try to protect company and business affairs from liabilities that may arise including those risks that are caused by employee internet misuse. Email, social media websites and other internet uses among employees, especially when they are at workplace, have been found that these cause reduce the employee productivity and it is mere time consuming. A well defined internet policy can help human resource management dismiss or terminate an employee when he or she breaches the internet policies of the company and when he creates liability through internet misuse. Personal emails that an employee receives at workplace may consume the time of employee, company resources and risk of virus transmission to the company documents or resources kept in the computers (Baker and McKenzie, 2008, p. 1118). It shows that increased use of email by employees for non-job related purposes create challenges of the company and this should be restricted through internet policies. Smith and Mazin (2004) argued that inappropriate email use by employees; computer and internet use by them are serious problems for HRM as these misuses will create hosting of legal problems for the organization. Email transmission is regarded to be a document and it is potential document that can be used against an employer in a lawsuit (p. 171). What assumptions might employees make about their privacy at work? How do these policies affect employee privacy at work? Employees are required to know about the privacy policies issued by the employer and these policies will be considered to be legally binding. Breaching of any of the policies can cause legal liabilities to him. Employees are expected not to misuse internet or email while they are at workplace and they should not share company maters or important documents with others or comment about them in social media sites like twitter or linkedin. The internet policies may affect the privacy of employees in a number of ways. The internet policy may specify what kind of emails can be received and what kinds of emails or documents can be sent from his computers. Inappropriate emails will be prohibited. Emails that contain immoral pictures or description and accessing inappropriate or immoral sites may be prohibited be the company. As part of internet policy, the company may record employees uses of internet and e-mails and all the information that are transmitted from his computer and are received to his computer will be some time recorded with specific software. This may record employees’ private matters and personal information. Conclusion Employee use of email and internet is creating challenges on both the company and HRM. The internet misuse can cause legal liabilities as well. In this changing business context, internet policy has become highly important and it can help a company litigate risks and liabilities associated with internet misuse of employees. This paper has outlined need for internet policy and explained the prevailing legal practices of internet misuse among employees in an organization. References Baker and McKenzie (2008), Australian master human resources guide, CCH Australia Noonan W. J (2004), Hardening Network Infrastructure, Illustrated Edition, McGraw-Hill Professional Smith S.A and Mazin R.A (2004), The HR answer book: an indispensable guide for Managers and human resources professionals, AMACOM Div American Mgmt Assn Solis B and Breakenridge D (2009), Putting the Public Back in Public Relations: How Social Media Is Reinventing the Aging Business of PR, FT press Williams P (July 2009), A Little Bird Told Me, Social Media, HR Monthly Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“E-Mail, Internet Use, and Privacy Policies Assignment”, n.d.)
E-Mail, Internet Use, and Privacy Policies Assignment. Retrieved from https://studentshare.org/human-resources/1735536-e-mail-internet-use-and-privacy-policies
(E-Mail, Internet Use, and Privacy Policies Assignment)
E-Mail, Internet Use, and Privacy Policies Assignment. https://studentshare.org/human-resources/1735536-e-mail-internet-use-and-privacy-policies.
“E-Mail, Internet Use, and Privacy Policies Assignment”, n.d. https://studentshare.org/human-resources/1735536-e-mail-internet-use-and-privacy-policies.
  • Cited: 0 times

CHECK THESE SAMPLES OF E-Mail, Internet Use, and Privacy Policies

The Value of Digital Privacy in an Information Technology Age

The paper “The Value of Digital privacy in an Information Technology Age” will discuss computer hacking, which has been rampantly used to access sensitive individual information.... Different cabling companies have different terms of use in regard to privacy.... Invasion of personal privacy shows inefficiency on the government's part and other organizations that keep citizens' records.... This information may then be used to facilitate citizens' use of websites, to send information to citizens and to conduct business....
4 Pages (1000 words) Research Paper

The United Kingdoms Approach to Privacy Law

Company Law Essay April 18, 2013 1843 words Name of Author Name of School Introduction The United Kingdom's approach to privacy law has always been in contrast to other nations in Europe.... In fact, there have been no significant laws to protect private information, despite various attempts by the UK parliament to introduce a general privacy law.... hellip; Since 1961, bills on privacy have been introduced, but none of them succeeded in enacting a general law on privacy in the UK....
7 Pages (1750 words) Essay

Communications-Medium vs. Message - Fitting the Message to the Channel

My organization has explicit guidelines if any of the policies of the company.... A lot of companies like G mail, Yahoo, Hot mail etc are providing free e mail services which anybody can use by registering with the concerned service provider.... Apart from the benefit of speed, e mails are very convenient to use.... Most of the free services provide web mail system, while POP 3 mails services come with a subscription to any internet service....
4 Pages (1000 words) Essay

Beach Trinkets E-Mail Policy

The employees shall ensure these necessary conditions while sending an e-mail:The e-mail messages sent, received, or transmitted using e-mail is provided by the company are the property of the company, and the employees have no reasonable expectation of privacy.... This policy is meant to lay the guidelines for what company deems as acceptable and unacceptable use.... The purpose of this policy is to prevent such use of the e-mail system.... Employees may use their e-mails for personal purposes, but such usage is limited to communicating with family members during work breaks only and should make sure that this does not hinder work performance or business needs....
4 Pages (1000 words) Essay

Contribution of Internet Use to Privacy

Contribution of internet use to Privacy College This research is being submitted on the for (course number) (name of course) Contribution of internet use to Privacy Most everything these days can be had, can be seen, and can be done online....   Even with the appropriate legislative policies enacted by government authorities these measures still fail to protect people's privacy.... Even with the appropriate legislative policies enacted by government authorities, these measures still fail to protect people's privacy....
2 Pages (500 words) Essay

The Obtuseness and Length of Privacy Policies

The paper "The Obtuseness and Length of privacy policies" presents a moral right to control who can access their private information just.... More has defined privacy as the control one has over access to their information, which is a necessary constituent of human wellbeing.... hellip; Moore does not exclude situations whereby there may be tension between privacy and security; nevertheless, he insists that even in such situations procedural protocols should be followed....
8 Pages (2000 words) Essay

Email privacy

Like any other form of privacy invasion, there are some… A responsible employer monitors internet use by the workforce.... responsible employer monitors internet use by the workforce.... Smart policies for Workplace Technologies: Email, Blogs, Cell Phones & More.... Employers are always terrified of Email privacy Currently, it is possible for an employer to monitor all the activities that occur in an organization.... Like any other form of privacy invasion, there are some advantages and disadvantages of employer monitoring....
1 Pages (250 words) Research Paper

Privacy Issues Related to Cyberspace

This term paper "Privacy Issues Related to Cyberspace" tries to analyze the privacy policies of three companies in the mobile industry and they include Verizon wireless, T-mobile and AT&T Company.... hellip; The paper will describe the organizations and their main missions in the industry, compare and contrast the privacy policies, and propose recommendations that better protect the privacy of the consumers and give the organizations flexibility.... The company has spread its wings to 22 countries where it provides customers with products and services such as the internet, branded telephones, VoIP services and engages in the sale of televisions under the U- verse brand....
8 Pages (2000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us