(855) 4-ESSAYS

Type a new keyword(s) and press Enter to search

Privacy


            Running head: WORKPLACE PRIVACY IN THE INTERNET AGE.
            
             Employers want their employees to do a good job, but employees do not want their every move logged. New technologies make it possible for employers to monitor many aspects of their employees" performance, especially when employees are using the Internet and e-mail. This monitoring is, for the most part, unregulated. Therefore, unless an employer's policy specifically states to the contrary, employees must be mindful that most of their workplace communications are being listened to and read. .
             Workplace privacy in the internet age.
             Module 5 - Workplace Privacy Issues.
             Introduction.
             The workplace in the United States has undergone a dramatic shift in the way .
             business is conducted due to the introduction of the ubiquitous personal computer. While businesses have been using mainframe computers for decades in many roles, these systems were reserved for particular uses and were certainly not accessible to every user. With the revolution of personal computers, employees in a wide variety of fields encompassing all elements of the economy are increasingly using electronic means to get all or most of their work done. The addition of the Internet and its applications such as e-mail and the World Wide Web has also turned the office computer into the primary means for both personal and private communications and information access in many of today's office work environments.
             Discussion.
             With the increasing use of computers in the business environment, and the related rise of the Internet and Internet access in the office some inevitable conflicts and questions are arising over employees" and employers" rights in relation to privacy and electronic information in the workplace. With Internet access very common amongst business computer users, it is almost unheard of for a user not to utilize their network connection to conduct personal businesses.
            
            
            
            
            
            
            
            
            
            
            
            
            
            
            
            
            
            
            
            
            
            
            
            
            
            
            


Essays Related to Privacy


Got a writing question? Ask our professional writer!
Submit My Question