Is E-Mail and Web Usage Monitoring by Employers Ethical?

In: Business and Management

Submitted By eniceca
Words 2501
Pages 11
Eni Ceca Is e-mail and web usage monitoring by employers ethical?

All of us have witnessed the rapid growth of information technology, especially during the last decade. Obviously, two of the major inventions achieved by the advancement of information technology are the Internet and Electronic Mail (Email). Internet and Email have already attained a very high level of usage by people of different age groups and in different countries because of the benefits and convenience they offer and the decreasing costs of usage. Internet is developing as a powerful tool of entertainment, communication, trade and research. Thus, it is becoming an essential and integrated part of the business process. The invention of Internet has given rise to several ethical issues, one of which is concerned with the privacy of Internet and email users. The focus of this paper is narrowed to the issue of email and web usage monitoring by employers, which is on the rise not only in USA but also in most of the other countries.
This paper will carefully elaborate the ethical implications of email and web usage monitoring by employers and at the same time argue that the practice of email and web usage monitoring by employers is unethical. J.S. Mill's Theory of Utilitarianism provides for the grounds on which a clear distinction between the ethical and the unethical can be made. Mill's theory claims that a behavior is ethical only if its consequences result in the greatest utility for the greatest number of people. According to Mill, humans project their actions based on the desire to achieve some specific final goals. He defines actions as simply means to a final end. Therefore, the morality of an action should not be judged by the action itself. Instead, the outcomes that result from an action should be carefully analyzed in order to make a judgment of the morality of that…...

Similar Documents

New E-Mail Policy

...New e-mail policy Below are the guide lines we will use to communicate through our company e-mail system. These rules will increase productivity and reduce time sorting through e-mail that does not affect your area of the company. • Be brief and Professional; stick to the facts of what your trying to communicate, keep the bottom line up front and be respectful we are all on the same team. • Courtesy Copy and Reply all too only those needed; ensure you only send your e-mail to people with whom the message is intended for. Reply all can cause problems with personnel getting the wrong information. • Attachment size will be limited; Large attachment clog up e-mail inbox and slow down the performance of the net work. • All attachments will be screened by antivirus before opened; software viruses are a great risk to our company network and no one wants to be the one to crash our communication system. • No forwarding of chain e-mail; chain e-mail can be counterproductive and offensive your fellow employees. • Spell out all words before using Acronyms; Not everyone is familiar with all acronyms so the first time you use an acronym spell the words out then put the acronym next to it in parentheses. • No writing in all CAPs; No shouting within your e-mail. This refers back to being professional and courteous to your fellow employees. • Use spell check; This will not always work to correct all misspelled words and bad grammar, but will cut down on the majority of problems...

Words: 836 - Pages: 4

E-Mail Etiquette

...Associate Level Material Appendix D E-mail Etiquette Read the following e-mails. For each e-mail: * Describe any content and formatting errors found. * Determine if the content is appropriate for a workplace setting. If it is, explain why. If not, identify the errors made and rewrite the e-mail, to be appropriate. E-mail OneTo: TomSubject line: Talent ReallocationTom,This e-mail is in reference to the two employees who are going to be terminated Friday. We have determined that they are Nicole Stone and Lorenzo Torres. As we discussed yesterday, their performances are not on par with those of other employees in the accounting department; interventions with these employees have not been successful in helping them improve their performance. Let’s plan to meet with them individually in the conference room between 3:00 and 4:00 p.m.Thanks,Andrea | Responses to questions 1 and 2. * There are no errors with the formatting or content in this email. The writer is conveying bad news to someone in charge and does so in a professional manner keeping the email short and to the point. * The content is appropriate for a workplace setting, it describes facts and leaves out any personal opinion or bias. | Rewrite e-mail if necessaryE-mail OneTo: Subject line: | E-mail TwoTo: ManagerSubject line: doc u wantedDear Manager,Attached to this e-mail is the doc you wanted with the info on that lake project. I hope everything in it is......

Words: 732 - Pages: 3

Should Employers Be Allowed to Monitor Personal Commuication of Its Employees?

..."Should employers be allowed to monitor personal communication of its employees?"  Ellen Berkeley, Amy Davis, Shawn Molloy, Deborah O’Leary, Karey Raubenheimer BCOM 275 October 31, 2011 Professor Tom Melpolder Although organizations have monitored employees for centuries, a number of developments have greatly expanded the amount and scope of employee monitoring. For example, recent technological advances have dramatically altered the nature of work, the working environment, and employee–employer relationships. As a result, information technology has emerged as an integral part of today’s organizational infrastructure. These new technologies have the potential to improve worker efficiency and effectiveness. However, there are risks associated with any new technology including the potential for employee abuse resulting in negative consequences (Alder, Kuenzi & Schminke, 2008). Private communication such as e-mails and social media in the workplace has emerged as one of the stickiest legal issues of the electronic age” (Cappel, 1995). The debate is divided. One side believes that employers should not have full control over its employee’s personal communication. Their view is that employees should have the ability to communicate with friends and family while on breaks, as long as productivity isn’t affected. Further, they believe that employees have a privacy right and should be allowed to communicate while at work without being......

Words: 1812 - Pages: 8

E-Mail, Internet and Privacy Policies

...Running Header: E-MAIL, INTERNET, AND PRIVACY POLICIES E-Mail, Internet and Privacy Policies University of Phoenix Com 285: Introduction to Business Communication Group: MEBSB039 May 5, 2009 E-Mail, Internet and Privacy Policies With the invention of the internet, many conveniences have been developed to help companies run more efficient. E-Mail was developed to replace standard written messages. This form of communication sped up the receipt of messages from one person to another. Internet and e-mail have become, and will remain a necessary tool for the modern business to succeed. The internet is also used as a way to communicate globally. For instance, a company with offices in the United States and the United Kingdom, now has the ability communicate information at the speed of light. With the advancement of modern technology comes the advancement of ways to steal information and violate the privacy of an employee or the company. Companies have put privacy policies in place to protect employees and the company. Information that could be misused and potentially harm the employee or put the company at risk could easily be sent over the internet through unsecured means. This paper is meant to discuss e-mail, internet use, and privacy policies at the place of employment of the writer. Secondly, we will discuss the laws put in place to regulate employee’s e-mail and internet policies. Thirdly, we will discuss the reasons...

Words: 972 - Pages: 4

E-Mail Ethics

...Hi, Thank you for your e-mail. Please note that I will be out of office on 17th of December 2012 and will have limited access to e-mails. I will reply to your mail on the 18th upon my return to work. Sincerely regret the inconvenience caused. Thank You & Best Regards, Harsha Amarasinghe Hi, Thank you for your e-mail. Please note that I will be out of office on 17th of December 2012 and will have limited access to e-mails. I will reply to your mail on the 18th upon my return to work. Sincerely regret the inconvenience caused. Thank You & Best Regards, Harsha Amarasinghe Hi, Thank you for your e-mail. Please note that I will be out of office on 17th of December 2012 and will have limited access to e-mails. I will reply to your mail on the 18th upon my return to work. Sincerely regret the inconvenience caused. Thank You & Best Regards, Harsha Amarasinghe Hi, Thank you for your e-mail. Please note that I will be out of office on 17th of December 2012 and will have limited access to e-mails. I will reply to your mail on the 18th upon my return to work. Sincerely regret the inconvenience caused. Thank You & Best Regards, Harsha Amarasinghe Hi, Thank you for your e-mail. Please note that I will be out of office on 17th of December 2012 and will have limited access to e-mails. I will reply to your mail on the 18th upon my return to work. Sincerely regret the inconvenience caused. Thank You & Best......

Words: 495 - Pages: 2

Journalist E-Mail Assignment

...Megan Crites 6/22/2014 HUM/176 Journalist E-mail Assignment Hello My Friend, How is everything going for you? Well, over here, there has been quite a challenge ahead of me in regards to this political campaign research. As you well know, being a journalist means I have an obligation to provide legitimate, accurate, honest coverage on whichever topic I am to report on. This is extremely hard because the amount of falsified information out in the real world is bigger than what we can imagine. I would like to use all of my knowledge to show I am worthy of a larger topic to cover aside from the political campaigns. Did you know that every political figure gives information about their opponent with small minor falsified details which makes my job even harder? Why is it so hard to speak only the truth about your worthy opponent? Once each candidate makes their comments about the opposing candidate, then social media has their take at it and that is a challenge all in its own when determining what is real and what is fake. I believe that in a way, the social interactions on media and in person are solely responsible for me even having to cover this story. We have three presidential candidates that are fighting to be the top two elected. One candidate, Ron Paul, had received an outrageous amount of straw votes which is suppose to be a big reason in why someone gets voted as a candidate. Somehow, media is not covering him, and they are covering is runner up, Mitt Romney.......

Words: 822 - Pages: 4

E-Mail Archiving

...Data and E-mail Archiving 1 Data and E-mail Archiving: Legal Concerns Joel Zart Capella University TS5536-Ethics in Technology Data and E-mail Archiving 2 Table of Contents Abstract……………………………………………………………………………………Page 3 Introduction to the world of Archiving……………………………………………………Page 4 Laws and penalties associated with archiving……………………………………………..Page 5 My ethical and legal dilemma……………………………………………………………...Page 6 Ethical dilemmas in archiving……………………………………………………………...Page 6 Process of identifying archiving liability…………………………………………………...Page 7 The solution based on law…………………………………………………………………..Page 8 The affects…………………………………………………………………………………..Page 9 The solution………………………………………………………………………………...Page 10 Conclusion………………………………………………………………………………….Page 11 References………………………………………………………………………………….Page 12 Data and E-mail Archiving 3 Abstract The purpose of this is to analyze the importance of data and e-mail archiving within an enterprise organization. At my organization I am currently in the planning stages of having a fully fledged data and e-mail archiving solution in place by the end of 2009. Archiving data and e-mail within an enterprise is important for legal litigation. According to industry experts 90% of communication in business takes place through e-mail and electronic documentation such as instant messaging and word documents (2009 para.1). Companies are now required to archive all communication to not only protect the company but also their employees....

Words: 2619 - Pages: 11

E-Mail Etiquette

...Manager To: Our Valued Customers Dear, Valued Customers Because there has been a consistent rise in the gas prices, we will have to make some changes to our hours of operation. Our number one priority is and always will be taking care of our valued customers to give them the best reduced prices possible. We will be making these changes so, that we can to continue to give you the best customer service. Beginning immediately we will be closed on Sundays and will open one hour later and close one hour earlier Monday thru Saturday. I truly apologize for any inconvenience that you may experience as a result of our changes but I assure you that these adjustments will help us serve you better. Thank you ------ Public Relations Manager E-Mail To: Managers From: ----- Public Relations Manager Subject: Changes to Store Hours Dear, Managers Because there has been a consistent rise in the gas prices, we will have to make some changes to our hours of operation to decrease our expenses from the gas prices. However, we will not be closing any of our stores, but we unfortunately will not be opening any new stores. Every store will be closed on Sundays now. All full time staff will work 4 ten hour work days and part time employees will combine their hours into 1, 2, or 3 days of work during the week. These changes will help us to keep all of our employees working and not have to lay anyone off. I have sent a letter to our customers and a store memo to our employees......

Words: 527 - Pages: 3

The Effect of E-Money Distribution on Mobile Money Adoption in Africa

...SB/DMK/14/0002 5. NATHANIEL DUAH ADJEI SB/DMK/14/0003 6. FREDRICK A. ASIEDU SB/DMK/14/0010 CASE STUDY MONITORING EMPLOYEES ON NETWORKS: UNETHICAL OR GOOD BUSINESS?. LAUDEN & LAUDEN (2014), PAGE 296-7 Question 1. Should managers monitor employee e-mail and internet usage? Why or Why not? Employee email and Internet usage monitoring in the workplace may put employers and employees in conflict because both sides are trying to protect personal interests. Employees want to maintain their personal privacy while employers want to ensure company resources are not misused. Employers monitor Internet use in the workplace to protect their companies from legal problems that could arise if employees use company computers for inappropriate or illegal online activities, such as racist, sexually explicit or other potentially offensive materials accessed or traded by their employees which could result in adverse publicity. They are also concerned about a decline in productivity as some workers use the Internet to handle personal activities such as checking personal email, responding to instant messages or sneaking in a brief YouTube video which creates series of non-stop interruptions that divert employees’ attention from the job tasks they are supposed to be performing. More over Strict monitoring allows employers to spot potential problems early, get the information offline as quickly as possible and discipline the......

Words: 1460 - Pages: 6

E-Mail Advice Memo

...receives and sends about 121 emails per day. It is important to utilize best practices when drafting e-mails since it is one of the primary modes of communication in the workplace. A helpful guideline for work e-mails is to KISSS – keep it short, simple and sweet. Keep it short. In the beginning of the e-mail, write a clear subject header with a maximum of 5 words and address the person correctly by title. Then, send a greeting in 1-2 sentences, present your main point and call to action in another 3-5 sentences and close with a short closing message and signature. Keep it simple. Make the e-mail simple and easy to read. Receiving a long e-mail is daunting not only to read but also to look at. A quick rule of thumb is to consider limiting e-mails to be no more than 5-10 sentences. Any additional information, like meeting notes and detailed information surrounding a project, should be sent in an attachment. This practice will allow the reader to understand the main point of the e-mail and revisit the details at a more optimal time. Keep it sweet. A recent study has shown that 64% of people have sent or received an e-mail that caused unintentional anger. An e-mail does not always have to be sweet but it is important to practice empathy when writing an e-mail. While proofreading, check your tone. If you have crafted a particularly angry e-mail on purpose, put the e-mail down for a couple hours or even a full day and think again before sending it. It is important to......

Words: 314 - Pages: 2

Ethics E-Mail

...Ethics E-Mail Carolyn Butler The Managerial Environment of Health Care HCS/265 April 18, 2016 The University of Phoenix Send to: Oleathia Subject: Types of Laws and Ethical Issues. Dear. Oleathia It has come to my attention that you are wanting to pursue a manager career in HealthCare. Which I have founded myself working in the healthcare industry for more than 20 years, to be an amazing career. Not only will you earn a good salary. You will enjoy job security. You will be doing the kind of work that interests you. You can live and work anywhere you want because, hospitals and other types of healthcare facilities are in almost every region of the United States. You can find a health career that fits your educational plans, you can learn hand on experience, you will have a clear path to advancement, not only do you get to work with people that are sick or dying you get to make a difference in their lives. The healthcare industry has many scholarships, financial aid programs, grants and student loans that can help you pay for going back school also. However, Otheathia, these are some of the benefit in pursuing a manager career in HealthCare. But there are......

Words: 1166 - Pages: 5

E-Mail and Internet Policy

...E-Mail and Internet Policy Darryn Cooper COM/285 Angie Robert August 24, 2011 E-Mail and Internet Policy The integrity of a business relies on communication, both using internal and external communications. E-mails and the internet are two ways that businesses communicate with shareholders, employees and their customers. In today’s global market, the use of computer guidelines and policies have been implemented to ensure that all employees adhere to those policies. Communication via the internet and use of emails should be carefully considered when using it. This essay will discuss why e-mail and internet policies have been put in place. *1Congress passed the Privacy Act of 1974, as amended, (Privacy Act) to safeguard records of information pertaining to individuals that Federal agencies or components own and maintain. The Department of Defense (DoD) policy regarding e-mail and internet use is very strict. All employees who are employed by the DoD are given a Common Access Card (CAC). The CAC is inserted into the computer and requires that you enter a password. At no time should you leave your CAC in the computer when an individual leaves his or her computer. Ashmore ( 2009), " Many federal laws affect employer regulation of email and internet uses, such as the Federal Wiretap Act; the Electronic Communications Privacy Act; and the Stored Communications Act. In addition,......

Words: 941 - Pages: 4

Monitoring Employees Private Social Networks

...Monitoring Employees Private Social Sites Are Unethical Monitoring employee’s private social network sites is unethical. The Internet has become an excellent medium to connect with the outer World. People use it to connect with other people, sharing files, entertainment and lots of other activities that are useful and beneficial. Although the Internet can be useful, it’s usage can also present a problem for employers. Most companies fear leakage of confidential information and trade secrets through e-mail or blogs. A recent survey conducted by the American Management Association and the ePolicy Institute found that 14 percent of the employees polled admitted they had sent confidential or potentially embarrassing company e-mails to outsiders(pg ). As a result, some companies have monitored their employee’s social networking site; facebook for example. So, a distinction as to why companies monitor their employee’s social sites should be made, as well, as the employee’s rights to privacy. Why do companies monitor their employee’s social networking media? The reasons managers monitor social media was revealed in a new Deloitte survey. Many businesses want to be able to monitor their employees’ social networking activity on sites such as MySpace, Facebook, and Twitter. The main problem with this idea stems from employers wanting to monitor this activity on a subordinate’s off time. Business Week reported that companies want to make sure that their......

Words: 684 - Pages: 3

How Do Employers Monitor Internet Usage at Work

...INTERNET WEB SEARCH ARTICLE #1 HOW DO EMPLOYERS MONITOR INTERNET USAGE AT WORK? This article informs us the readers on how and what forms an employer can monitor our internet usage while at work. The main reason that we see this at work is due to our advance technology at the work place. Almost all companies have access to the internet at work which entices the workers to go to websites that are not work related. This article does not debate whether it is legal or illegal. It provides information on the two basic types that employers use to monitor, internet and desktop surveillance. This article explains that they use spyware like hackers do to monitor an employee’s internet usage, website visits, emails sent, information on emails, and streaming videos. This information provides specific work or unrelated work this employee is conducting to include the time spent. While conducting desktop surveillance it does all of the aforementioned to include offline activity. All systems are connected to the administrator’s computer and he can actually connect via remote and monitor while you are in front without knowing. I believe this article was mediocre in all. It did provide information that I was not aware like the two basic ways employers monitor. I feel they could have gone more in depth in this area. I know this article was not mean to debate whether it was legal or illegal but does cover the basic legal rights the employer and employee have. REFERENCE J. Bean......

Words: 279 - Pages: 2

E-Mail Communications

...E-Mail Communication Miscommunication can be a significant challenge in the health care market. Strategies to improve communication with patients include a variety of communication modalities. Consumers and providers both benefit from the variety of communication modalities; one specific beneficial mode of communication used is e-mail. Providers, who have good communication relationships with patients led to patient satisfaction and trust. Patients have a sense of connection with providers and organizations when they can communicate with the provider at any given time. Although there are several communication modalities, new technologies like e-mail in the health care settings have shown a positive change in the health care industry, relating to patient benefits, the value of maintaining patient confidentiality, and maintaining this use of communication in the health care market (John Fortney, 2010). This research paper will discuss the use of email in the health care setting and the pros and cons. Improving clinical outcomes stems from effective communication with patients and providers. New technology has increased the form of communication with patients and providers. E-mail is used to communicate with family, friends, co-workers, and health care professionals. The use of the Internet and e-mail communication has grown as new technology advance and continue to progress. E-mail seems to be an admirable way for patients to communicate with providers. Patients send emails......

Words: 1278 - Pages: 6

El Objetivo | Gautama Buddha | Hakase to Suraimu-chan