Legal and Policy Issues Associated with Monitoring Employee E-mail

Legal and Policy Issues Associated with Monitoring Employee E-mail PDF Author: Mark A. Segura
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description

Legal and Policy Issues Associated with Monitoring Employee E-mail

Legal and Policy Issues Associated with Monitoring Employee E-mail PDF Author: Mark A. Segura
Publisher:
ISBN:
Category :
Languages : en
Pages :

Get Book Here

Book Description


Use and Monitoring of E-mail, Intranet, and Internet Facilities at Work

Use and Monitoring of E-mail, Intranet, and Internet Facilities at Work PDF Author: Roger Blanpain
Publisher: Kluwer Law International B.V.
ISBN: 9041122664
Category : Law
Languages : en
Pages : 322

Get Book Here

Book Description
Two legitimate statements in search of legal doctrine: ?An employee must have a reasonable expectation of privacy.? ?The efficient operation of the company must be safeguarded.? As a lawyer considers each of these assertions, a significant region of incompatibility emerges. In the context of the use of information technology systems in the workplace, a collision of rights is exposed that has engendered a virtual battleground in the theory and practice of labour law. This remarkable and timely book draws together all the strands of law in this controversial area, both de facto and de jure. Its comprehensive coverage includes such eminently useful materials as the following: thirty actual company policies regarding on-line communications, from a wide variety of business sectors, with detailed analysis; texts of four company codes of practice; actual views of trade unions and employers? organizations; analysis of relevant existing laws on access, monitoring, liability, sanctions, and the rights of employee representatives; two proposed model codes of practice, one for the individual user and one for employee representatives; and, appendices including Belgium?s National Collective Agreement No. 81 and the regulatory bill and advisory opinions that led up to it. The authors? focus on practice is advantageous, as it brings the central issues and conflicts into high relief. The close analysis and investigation of how employers, trade unions, and legislative and advisory bodies are dealing with the essential matters?which include communications facilities at work, employer?s prerogative, the company?s rights of ownership and disposal, and the fundamental privacy rules of legitimate purpose, proportionality, and transparency?provide very valuable guidance to parties in any country concerned with developing a viable set of legal principles and rules for this challenging and unsettled area of labour law.

Webmail at Work

Webmail at Work PDF Author: Marc A Sherman
Publisher:
ISBN:
Category :
Languages : en
Pages : 0

Get Book Here

Book Description
This paper is about privacy in the workplace. Specifically, I address the issue of employer monitoring of employee email. The law allows employers to monitor their workers' email - even when messages contain private information. However, although the law is clear with respect to employer-provided email, it is not yet defined as to webmail. That is - this paper shows that relevant statutes and court decisions generally have not yet addressed the privacy issues that arise when an employer monitors email sent by an employee via the employee's personal web-based email account. After revealing this webmail gap in the law, I analyze the business, public, and personal policy issues involved. I cast the issue in the broader context of privacy law and societal norms. Finally, the paper concludes with policy suggestions for employers that take into account their legitimate business purposes for monitoring employee email as well as their employees' legitimate privacy concerns.

Monitoring Electronic Mail in the Workplace

Monitoring Electronic Mail in the Workplace PDF Author: Marshall B. Babson
Publisher:
ISBN:
Category : Data protection
Languages : en
Pages : 46

Get Book Here

Book Description


Tolley's Managing Email & Internet Use

Tolley's Managing Email & Internet Use PDF Author: Lynda Macdonald
Publisher: Routledge
ISBN: 1136355162
Category : Business & Economics
Languages : en
Pages : 394

Get Book Here

Book Description
Email and Internet use is increasingly topical as employers and employees test the boundaries of acceptable use of new communications technology in the workplace. The potential legal liabilities make this a crucial decision-making area for all involved in human resources management. Tolley’s Managing Email and Internet Use will provide you with the essential legal guidance and practical advice to establish, implement and enforce a policy for internet and Email use in your workplace. Tolley’s Managing Email and Internet Use analyses and interprets (in plain language) the law on monitoring employees’ Email and internet activity, the use of confidentiality notices, privacy, harassment and Email interception by employers. It also provides information on the key regulations and guidelines which affect Email and internet policy, including the Human Rights Act 1998, Data Protection Act 1998 and the Regulation of Investigatory Powers Act 2000. Tolley’s Managing Email and Internet Use is the only practical guide to offer you: - strategic guidance on implementing, policing and maintaining an effective Email and internet policy - Current thinking on managing Email and internet use - Sample policies, disclaimers, rules and procedures to assist in establishing your own guidelines - A practical approach featuring questions and answers, checklists and case studies - An accessible read regardless of previous legal experience - Latest case law from recent cases involving Email and internet policy Tolley’s Managing Email and Internet Use is a complete reference source for Email and internet policy in the workplace.

Legal Issues in Information Security

Legal Issues in Information Security PDF Author: Joanna Lyn Grama
Publisher: Jones & Bartlett Publishers
ISBN: 1284054756
Category : Computers
Languages : en
Pages : 570

Get Book Here

Book Description
This revised and updated second edition addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers. --

Workplace Privacy

Workplace Privacy PDF Author: Jonathan Remy Nash
Publisher: Kluwer Law International B.V.
ISBN: 9041131639
Category : Law
Languages : en
Pages : 778

Get Book Here

Book Description
Employers everywhere today must delicately balance the need to maintain a safe and proper workplace with employees rights and the risk of liability. The fact that new technologies make it easier for employers to monitor their employees whereabouts, communications, and activities only serves to make the issue more acute. Now, in this collection of essays by outstanding scholars and practitioners in U.S. labour law and practice, employers and their legal counsel will find a broad array of important contributions to the law and study of workplace privacy. Based on papers delivered at the 58th annual labour conference of the New York University Center on Labor and Employment Law, this book reflects and analyzes recent developments, providing the best comprehensive work on U.S. workplace privacy. How far should employers be allowed to go in monitoring employers? Where do employers rights to run their businesses end and employees privacy rights begin? Is the existing law sufficient to resolve recurring conflicts? These are among the big questions tackled in these articles. Among the many specific issues covered are the following: use of global positioning systems (GPS) in tracking employees; background checking for job applicants; email monitoring; physical monitoring of employees; scope and lawfulness of so-called lawful activity laws; employer involvement in employees nonworkplace behaviour (e.g., drug testing); employees rights of association; regulation of fraternizing and dating among employees; employee privacy issues in employer-union bargaining; privacy issues in public sector employment; privacy issues and threats of terrorism; and efforts by employers to verify employees nationality and immigration status. Authors pay special attention to fast-break developments such as in the extraterritorial reach of the European Union s data protection directive and the current status of the U.S. National Labor Relations Board s Register-Guard decision. A special feature is a very early draft of a chapter of the forthcoming Restatement (Third) of Labor and Employment Law made available through the graces of the American Law Institute on the U.S. common law of employee privacy rights. As always, this important annual publication offers definitive current scholarship in its theme area of labour and employment law. As such, it will be of inestimable value to practitioners, government officials, academics, and others interested in developments in employment and labour relations law and practice.

Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations

Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations PDF Author: Hossein Bidgoli
Publisher: John Wiley & Sons
ISBN: 0470051205
Category : Business & Economics
Languages : en
Pages : 1008

Get Book Here

Book Description
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.

Modern Public Information Technology Systems: Issues and Challenges

Modern Public Information Technology Systems: Issues and Challenges PDF Author: Garson, G. David
Publisher: IGI Global
ISBN: 1599040530
Category : Computers
Languages : en
Pages : 420

Get Book Here

Book Description
Examines the most important dimensions of managing IT in the public sector and explores the impact of IT on governmental accountability and distribution of power, the implications of privatization as an IT business model, and the global governance of IT.

Security Policies and Implementation Issues

Security Policies and Implementation Issues PDF Author: Robert Johnson
Publisher: Jones & Bartlett Learning
ISBN: 1284230066
Category : Computers
Languages : en
Pages : 505

Get Book Here

Book Description
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Policies and Implementation Issues, Third Edition offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by industry experts, the new Third Edition presents an effective balance between technical knowledge and soft skills, while introducing many different concepts of information security in clear simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks. Instructor Materials for Security Policies and Implementation Issues include: PowerPoint Lecture Slides Instructor's Guide Sample Course Syllabus Quiz & Exam Questions Case Scenarios/Handouts About the Series This book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking—putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well.