1,174
14
Essay, 10 pages (2500 words)

Business essays – employee monitoring privacy

Employee Monitoring Privacy

Employee Monitoring Violates Privacy

“ Privacy Under Siege: Electronic Monitoring in the Workplace, ” National Workrights Institute, 2004, pp. 2–5, 10, 17. Reproduced by permission.

“ The company had installed concealed cameras in its public toilets – some cameras indicating straight at the urinals. ”

Harmonizing to the National Workrights Institute ( NWI ) in the point of view that follows, employers regularly videotape workers, listen to their phone calls, undercover agent on their Internet use and Web hunts, look into their difficult thrusts, and read their personal electronic mails. Overall, these Acts of the Apostless are highly invasive, laments the NWI. The group besides protests that employees frequently do non cognize that they are being monitored, when they are being monitored, or what activities may be monitored. In the NWI ‘s sentiment, employers must be barred from perpetrating these untenable invasions into the lives of their employees. National Workrights Institute is dedicated to protecting human rights in the workplace.

As you read, see the undermentioned inquiries:

  • In the NWI ‘s averment, what is wipe outing the boundary between the place and the workplace?
  • What engineering does the writer name the most invasive of all?
  • When employees work from place, what personal information might their employers gain entree to, harmonizing to the NWI?

Everyone in the office knew that Gail would alter her apparels in her cell for the gym after the work twenty-four hours was done. When her employers installed a concealed camera to supervise the individual in the adjacent cell ‘s suspected illegal activities, her day-to-day rite was captured on movie. The first few times could hold been labeled as errors, but the cinematography of Gail altering her apparels over a five month period was inexcusable.

Electronic monitoring is a quickly turning phenomenon in American concerns. Introduced in the early 20th century for such limited utilizations as timing interruptions and mensurating hand-eye motions, systematic electronic monitoring has since grown into the really cloth of American concern pattern. As engineerings become more powerful and easy and cheap to put in and keep, the rates of electronic monitoring in this state have skyrocketed. In 1999 the per centum of employers who electronically monitor their workers was 67 % .

Merely two old ages subsequently, in the twelvemonth 2001 this figure had increased to 78 % . By 2003, 92 % of employers were carry oning some signifier of workplace monitoring. This rapid growing in monitoring has virtually destroyed any sense of privateness as we know it in the American workplace. Employers now conduct picture surveillance, listen in on employee telephone calls, reexamine employee computing machine usage such as electronic mail and the Internet and supervise their every move utilizing GPS [ Global Positioning System ] . But as legitimate work merchandise is being monitored, so are the personal wonts and lives of employees.

As engineering has proliferated in the workplace, it has become of all time more acute and intrusive. And yet there are few, if any, legal protections for employees. There has been no effort to equilibrate employer demands with legitimate employee privateness concerns. Collection and usage of personal information is a rampant by-product of workplace monitoring and threatens the really freedoms that we cherish as Americans. Legislation is necessary to regulate the pattern of electronic monitoring in the workplace, protect employee privateness and return a sense of cardinal equity and self-respect to the American workplace.

Personal Communicationss in the Workplace

While employers by and large initiate electronic monitoring in response to legalize concern concerns, the consequences have been lay waste toing to employee privateness. Virtually everything we do and state at work can be, and is, monitored by our employers. Our employers watch us on picture cameras, read our electronic mails, listen to our voice mail, reappraisal paperss on our difficult thrusts, and look into every web site we visit.

This would be bad plenty if it involved merely work related behaviour and communicating, but it does n’t. The coming of cell phones, beepers, and place computing machines is quickly wipe outing the traditional wall between the place and the workplace. Peoples now on a regular basis receive communications from their employer at place.

Maggie Jackson, former workplace letter writer for the Associated Press, estimates that the mean professional or managerial employee now receives over 20 electronic messages from work every hebdomad. This new flexibleness besides means that personal communicating progressively occurs in the workplace. An employee who spent much of the weekend on a cell phone with her foreman will non ( and should non ) see it inappropriate to do a personal call from the office.

This means that employer supervising systems often record personal communications. Often, this communicating is non sensitive. But sometimes the messages are really personal. An employee who sends their partner a romantic electronic mail while eating tiffin at his or her desk can happen that their love missive has been read by their foreman. Or a note to a head-shrinker stored in an employee ‘s difficult thrust is disclosed.

Internet and Video Monitoring

Internet monitoring can be highly invasive. Peoples today turn to the Internet as their primary beginning of information, including sensitive topics they would be uncomfortable pass oning about on their office telephone or electronic mail. In portion, this is because of the efficiency of Internet research. Even an untrained individual can happen information on the web in proceedingss that would hold taken hours or even yearss to happen by traditional agencies ( if they could happen it at all ) . Peoples besides turn to the Internet for information because they can make so anonymously.

The consequence is that people turn to the Internet for information and aid about the most sensitive topics conceivable. Womans who are victims of domestic maltreatment bend to the Internet for information about shelters and other signifiers of aid. Peoples besides turn to the Web for information and aid with drug and intoxicant jobs, fiscal troubles, matrimonial jobs, and medical issues. Monitoring Web entree gives an employer a image window into employees ‘ most sensitive personal jobs.

Most invasive of all is video monitoring. Some cameras are appropriate. Security cameras in stairwells and parking garages make us all safer without irrupting on privateness. But employers frequently install cameras in countries that are wholly untenable. Many employers have installed concealed picture cameras in cabinet suites and bathrooms, sometimes inside the stables. No 1 should be subjected to sexual voyeurism on the occupation.

Improper Methods

Such jobs are made worse by the mode in which monitoring is frequently conducted. Most employers make no attempt to avoid supervising personal communications. The bulk of employers install systems that make no differentiation between concern and personal messages, even when more discriminating systems are available.

In add-on to official monitoring, IT [ information engineering ] employees frequently monitor their fellow employees for personal grounds. Most employers give such employees carte blanche entree to employee communications. While it is possible to put up proficient barriers to guarantee that monitoring is confined to official plans, few employers use them. Many employers do non even hold policies directing IT employees to curtail their monitoring to official plans. Even employers with such policies seldom have processs to implement them. As a consequence, employees involved in supervising frequently read the messages of fellow employees for their ain amusement.

The concluding indignity is that employees do n’t even cognize when they are being watched. While a bulk of employers provide employees what is described as notice, still many do non and the information presently provided is by and large useless. The standard employer notice states merely that the company militias the right to supervise anything at any clip. Employees do non cognize whether it is their e-mail, voice mail, Web entree, or difficult thrust that is monitored. They do non cognize whether the monitoring is uninterrupted, random, or as needed. They do non even know whether they are being monitored at all. Such notice is about worse than no notice at all.

Particular Problems for Telecommuters

Equally bad as the state of affairs is today, it is likely to be far worse in the hereafter. Many people today do work for their employer on their place computing machines. The most direct illustration of this is telecommuting. Approximately 20 million employees and independent contractors now work at place at least one twenty-four hours per month, and this figure is turning quickly. Millions more have linked their place computing machine to their office web so they can work from place informally on eventides and weekends.

When this occurs, people ‘s place computing machines are capable to monitoring by their employer. Workplace computing machine supervising systems monitor the full web, including a place computing machine that is temporarily portion of the web. This means that personal communications in our place computing machines will be revealed to our employers.

Personal e-mail sent from or received by our place computing machines will be disclosed to our employers, along with personal letters, fiscal records, and any other personal information in our place computing machines. Not merely is this possible, it is extremely likely. When asked if they would be interested in holding personal information from employees ‘ place computing machines, corporate lawyers responded positively.

Employers by and large conduct electronic monitoring in order to increase productiveness. It is far from clear, nevertheless, that supervising achieves this end. In fact, excessively much monitoring can really diminish productiveness by increasing employee emphasis and diminishing morale. …

Narratives of Workplace Monitoring Across America

At a Neiman-Marcus Store in Fashion Island Newport Beach [ California ] , Kelly Pendleton, a two-time “ employee of the twelvemonth ” discovered a concealed camera in the ceiling of the changing room used by female employees that was being monitored by male co-workers.

Employees of Consolidated Freightways were horrified to happen that the company had installed concealed cameras in its public toilets – some cameras indicating straight at the urinals. Over a 1000 hours of picture records were made covering 1000s of employees. “ The cats were truly shaken, and some of the adult females went place weeping, ” says Joe Quilty, the stevedore who discovered the concealed cameras.

An AT & A ; T employee received a formal rebuke for utilizing the company e-mail system to direct a love note to his married woman, besides an AT & A ; T employee…

The detonation of workplace surveillance in recent old ages has stripped Americans of virtually all their privateness on the occupation. About 80 % of employers now use electronic surveillance. Soon it will be cosmopolitan.

Further Readings

Books

  • Paul Abramson, Steven Pinkerton, and Mark Huppin Sexual Rights in America . New York: New York University Press, 2003.
  • George J. Annas The Rights of Patients: The Authoritative ACLU Guide to the Rights of Patients . Carbondale: Southern Illinois University Press, 2004.
  • Clay Calvert Voyeur State: Media, Privacy, and Peering in Modern Culture . Boulder, CO: Westview Press, 2000.
  • Nancy Chang Hushing Political Dissent: How Post-September 11 Anti-Terrorism Measures Threaten Our Civil Liberties . New York: Seven Stories Press, 2002.
  • Jamie Court Corporateering: How Corporate Power Steals Your Personal Freedom—And What You Can Make About It . New York: Jeremy P. Tarcher/Putnam, 2003.
  • James X. Dempsey and David Cole Terrorism and the Fundamental law: Sacrificing Civil Liberties in the Name of National Security . Washington, DC: First Amendment Foundation, 2002.
  • Joseph W. Eaton The Privacy Card: A Low Cost Strategy to Combat Terrorism . Lanham, MD: Rowman & A ; Littlefield, 2003.
  • Herbert N. Foerstel Refuge of a Villain: The Patriot Act in Libraries . Westport, CT: Libraries Unlimited, 2004.
  • Simson Garfinkel Database State: The Death of Privacy in the twenty-first Century . Cambridge, MA: O’Reilly, 2000.
  • Evan Gerstmann Same-Sex Marriage and the Fundamental law . Los Angeles: Loyola Marymount University, 2003.
  • Eric J. Gertler Prying Eyess: Protect Your Privacy from Peoples Who Sell to You, Spy on You, and Steal from You . New York: Random House Reference, 2004.
  • Richard A. Glenn The Right to Privacy: Rights and Autonomies Under the Law . Santa Barbara, CA: ABC-CLIO, 2003.
  • John Hagel III and Marc Singer Net Worth: Determining Markets When Customers Make the Rules . Boston: Harvard Business School Press, 1999.
  • Richard Hunter World Without Secrets: Business, Crime, and Privacy in the Age of Ubiquitous Calculating . New York: John Wiley & A ; Sons, 2002.
  • Bruce Kasanoff Making It Personal: How to Profit from Personalization Without Invading Privacy . Cambridge, MA: Perseus, 2001.
  • Frederick S. Lane The Naked Employee: How Technology Is Compromising Workplace Privacy . New York: AMACOM Books, 2003.
  • Al Lautenslager Ultimate Guide to Direct Marketing . Irvine, CA: Entrepreneur Press, 2005.
  • David Lyon Surveillance After September 11 . Cambridge, England: Polity Press, 2003.
  • Raneta Lawson Mack and Michael J. Kelly Equal Justice in the Balance: America ‘s Legal Responses to the Emerging Terrorist Threat . Ann Arbor: University of Michigan Press, 2004.
  • Albert J. Marcella and Carol Stucki Privacy Handbook: Guidelines, Exposures, Policy Implementation, and International Issues . Hoboken, NJ: John Wiley & A ; Sons, 2003.
  • C. William Michaels No Greater Menace: America After September 11 and the Rise of a National Security State . New York: Algora Publishing, 2002.
  • Mark Monmonier Descrying with Maps: Surveillance Technologies and the Future of Privacy . Chicago: University of Chicago Press, 2002.
  • Donald J. Musch, erectile dysfunction. Civil Liberties and the Foreign Intelligence Surveillance Act . Dobbs Ferry, NY: Oceana Publications, 2003.
  • Robert O’Harrow Jr. No Place to Hide . New York: Free Press, 2005.
  • Jeffrey Rosen The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age . New York: Random House, 2004.
  • Charles J. Sykes The End of Privacy: Personal Rights in the Surveillance Society . New York: St. Martin ‘s Press, 1999.
  • Reg Whitaker The End of Privacy: How Total Surveillance Is Becoming a World . New York: New Press, 1999.

Reports

  • Robert W. Hahn An Appraisal of the Costss of Proposed Online Privacy Legislation . Washington, DC: Association for Competitive Technology, May 7, 2001. www. bbbonline. org.
  • Philippa Jeffery Keeping Large Brother from Watching You: Privacy in the Internet Age . Washington, DC: Citizens Against Government Waste, May 14, 2001. www. cgaw. org.
  • Ed Mierzwinski et Al, explosive detection systems. The Clean Credit and Identity Theft Protections Act: Model State Laws . Washington, DC: State Public Interest Research Groups and Consumers Union of U. S. , Inc. , November 2005. www. uspirg. org.
  • National Forum on Education Statisticss Forum Guide to Protecting the Privacy of Student Information: State and Local Education Agencies . NCES 2004-330. Washington, DC: National Forum on Education Statistics, 2004. www. nces. ed. gov.
  • Marc Rotenberg and Cedric Laurant Privacy and Human Rights 2004: An International Survey of Privacy Laws and Developments . Washington, DC: Electronic Privacy Information Center and Privacy International, November 17, 2004. www. privacy. international. org.
  • U. S. Congress Tools Against Panic: How the Administration Is Implementing New Laws in the Fight to Protect Our Homeland . Washington, DC: U. S. Government Printing Office, 2004. www. gpoaccess. gov.
  • Philip Ward The Identity Cards Bill . Research Paper 05/43. London, England: House of Commons Library, June 13, 2005. www. parliament. uk.

Periodicals

  • Clyde Wayne Crews Jr. ” Monitoring Biometric Technologies in a Free Society, ” USA Today ( Magazine ), July 2003.
  • European Civil Aviation Conference ” Biometricss, ” presented to the ICAO acme, Cairo, Egypt, March 22-April 2, 2004. www. icao. int.
  • Terry Jones ” It ‘s the Internet, Stupid, ” St. Louis Journalism Review , October 2003.
  • Ted Koppel ” Take My Privacy, Please! ” New York Times , June 13, 2005.
  • Etelka Lehoczky ” Watch Yourself—You Might Be Monitored, ” Boston Globe , October 10, 2004.
  • Tom Ridge ” Remarks at the Center for Strategic and International Studies, ” Washington, DC, January 12, 2005. www. dhs. gov.
  • Eugene Volokh ” Big Brother Is Watching—Be Grateful! ” Wall Street Journal , March 26, 2002.
  • Robin L. Wakefield ” Employee Monitoring and Surveillance—The Growing Trend, ” CPA Journal , July 2004.
  • Dick Zunkel ” The Other Side of Privacy: Protecting Information with Biometricss, ” Security Technology & A ; Design , June 2005.

Beginning Citation:

National Workrights Institute. “ Employee Monitoring Violates Privacy. ” Opposing Point of views: Privacy . Ed. Jamuna Carroll. Detroit: Greenhaven Press, 2006. Opposing Viewpoints Resource Center . Thomson Gale. University of MD University College. 5 Nov. 2007

Thank's for Your Vote!
Business essays – employee monitoring privacy. Page 1
Business essays – employee monitoring privacy. Page 2
Business essays – employee monitoring privacy. Page 3
Business essays – employee monitoring privacy. Page 4
Business essays – employee monitoring privacy. Page 5
Business essays – employee monitoring privacy. Page 6
Business essays – employee monitoring privacy. Page 7
Business essays – employee monitoring privacy. Page 8
Business essays – employee monitoring privacy. Page 9

This work, titled "Business essays – employee monitoring privacy" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Business essays – employee monitoring privacy'. 10 January.

Reference

AssignBuster. (2022, January 10). Business essays – employee monitoring privacy. Retrieved from https://assignbuster.com/business-essays-employee-monitoring-privacy/

References

AssignBuster. 2022. "Business essays – employee monitoring privacy." January 10, 2022. https://assignbuster.com/business-essays-employee-monitoring-privacy/.

1. AssignBuster. "Business essays – employee monitoring privacy." January 10, 2022. https://assignbuster.com/business-essays-employee-monitoring-privacy/.


Bibliography


AssignBuster. "Business essays – employee monitoring privacy." January 10, 2022. https://assignbuster.com/business-essays-employee-monitoring-privacy/.

Work Cited

"Business essays – employee monitoring privacy." AssignBuster, 10 Jan. 2022, assignbuster.com/business-essays-employee-monitoring-privacy/.

Get in Touch

Please, let us know if you have any ideas on improving Business essays – employee monitoring privacy, or our service. We will be happy to hear what you think: [email protected]