Ask Management Information System Expert

Your Internet Job Rights Three Ethical Scenarios Whether you're an employer or an employee, you should know what your rights are when it comes to Internet use in the workplace. Recently federal and state courts have ruled that e-mail has little or no expectation of privacy in many circumstances. A number of employees have been terminated or warned for misuse, improper use, or inappropriate use of organizational resources by sending/reading personal e-mail on the firm's computers and net- works while on their own time (during lunch, or before/after work hours). The type of Internet use also comes into question, particularly when surfing Web sites the firm may consider "questionable" or "adult" (i.e., pornography).

Generally, these types of materials fall into three groups: pornographic, obscene, or indecent, and definitions and penalties vary from state to state, and even from town to town. A firm should have written policies for computer and network use, and employees should be schooled in these requirements. Many firms today require employees to sign a statement that they have been advised of these policies.

Mark Grossman, a Florida attorney who specializes in computer and Internet law, gives answers to some basic questions. Scenario 1 Nobody told you that your Internet use in the office was being monitored. Now you've been warned you'll be fired if you use the Internet for recreational surfing again. What are your rights?

Bottom Line. When you're using your office computer, you have virtually no rights. You'd have a tough time convincing a court that the boss invaded your privacy by monitoring your use of the company PC on company time. You should probably be grateful you got a warning. Scenario 2 Your employees are abusing their Internet privileges, but you don't have an Internet usage policy.

What do you do? Bottom line. Although the law isn't fully developed in this area, courts are taking a straight- forward approach: If it's a company computer, the company can control the way it's used. You don't need an Internet usage policy to prevent inappropriate use of your company computers.

To protect yourself in the future, distribute an Internet policy to your employees as soon as possible. Scenario 3 Employee John Doe downloads adult material to his PC at work, and employee Jane Smith sees it. Smith then proceeds to sue the company for sexual harassment. As the employer, are you liable? Bottom line. Whether it comes from the Internet or from a magazine, adult material simply has no place in the office. So Smith could certainly sue the company for allowing a sexually hostile environment. The best defense is for the company to have an Internet usage policy that prohibits visits to adult sites.

Of course, you have to follow through. If someone is looking at adult material in the office, you must at least send the offending employee a written reprimand. If the company lacks a strict Internet policy, though, Smith could prevail in court.

a. Do you agree with the advice of attorney Mark Grossman in each of the scenarios? Why or why not?

b. What would your advice be? Explain your positions.

c. Identify any ethical principles you may be using in explaining your position in each of the scenarios.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M91325606
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Management Information System

Search the csu library the internet or any specific

Search the CSU library, the Internet, or any specific websites, and scan IT industry magazines to find an example of an IT project that had problems due to organizational issues. Write a paper summarizing the key stakeho ...

Question how can company protect the new emerging

Question : How can company protect the new emerging technology ventures from profit pressures of the parent organization (APA format required, Turntin check required . Minimum 250 words essay) How do companies overcome l ...

Communication and team decision makingpart 1 sharpening the

Communication and Team Decision Making Part 1: Sharpening the Team Mind: Communication and Collective Intelligence A. What are some of the possible biases and points of error that may arise in team communication systems? ...

Question provide an explanation of ifwherehow does active

Question : Provide an explanation of if/where/how does Active Directory support network security,14 pages (2,000-2,500) in APA format. Include abstract and conclusion. Do not include wikis, message boards, support forums ...

Question how companies could effectively use emerging

Question : How companies could effectively use emerging technology to win over its competitors. APA format required. 250 words essay required. The response must be typed, single spaced, must be in times new roman font (s ...

Question how customers could effectively use emerging

Question : How customers could effectively use emerging technology to win over its customers. APA format required. 250 words essay required. turntin check require. The response must be typed, single spaced, must be in ti ...

Part 1 - create an 8 slide powerpoint presentation on

Part 1 - Create an 8 slide PowerPoint presentation on foundational concepts specific to physical security. Part 2 - Write 4 pages detailing the framework for the design of an integrated data center. Assessment Instructio ...

In chapter 2 of the text - managing amp using information

In Chapter 2 of the text - Managing & Using Information Systems: A Strategic Approach, the chapter discusses why information systems experience failure often because of organizational strategy. A classic example of this ...

Review at least 4 articles on balanced scorecard and

Review at least 4 articles on Balanced Scorecard and complete the following activities: 1. Write annotated summary of each article. Use APA throughout. 2. As an IT professional, discuss how you will use Balanced Scorecar ...

Data resources management questionsq1 the dama dmbok

Data Resources Management QUESTIONS Q1. The DAMA DMBOK textbook describes the following two core activities as part of the Data Architecture management exercise: "Understanding enterprise information needs" and "Develop ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As