Your SlideShare is downloading. ×
Workplace environment e-mail_and_internet_privacy_at_work
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Introducing the official SlideShare app

Stunning, full-screen experience for iPhone and Android

Text the download link to your phone

Standard text messaging rates apply

Workplace environment e-mail_and_internet_privacy_at_work

117
views

Published on


0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
117
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. E-Mail and Internet Privacy at Work
  • 2. E-Mail and Internet IssuesCyber-loafing accounts for 30% to40% of lost worker productivity.
  • 3. E-Mail and Internet IssuesAs much as 70% of traffic on pornsites occurs during work hours.
  • 4. E-Mail and Internet IssuesCheck your company’s policy one-mail and Internet use at work.
  • 5. Employer Policies
  • 6. Employer PoliciesBe aware of your company’s employeeconduct policy.
  • 7. Employer PoliciesYour company reserves the right toread and monitor all communicationsmade by employees at work.
  • 8. Employer PoliciesAn employee conduct policy restrictspersonal use of company property to“reasonable” use.
  • 9. Employer PoliciesSome companies prohibit any personaluse, which is perfectly legal.
  • 10. Employer PoliciesThe use of company resourcesis subject to the company’sno-harassment andno-discrimination policies.
  • 11. Employer PoliciesNearly three-fourths of majorU.S. companies are recording andreviewing some aspect of theiremployees’ communications.
  • 12. Employer PoliciesAbout 40% of companies are usingWeb-monitoring software to recordand track employees’ Web activities.
  • 13. The Law
  • 14. The LawThe courts have generally upheld anemployer’s right to review or monitortheir employees’ use of Internet ande-mail.
  • 15. The LawEmployees don’t have an expectation ofprivacy even when the company assuresit will not intercept communications.
  • 16. The LawBecause all communication equipmentbelongs to the employer, it has theright to access and review informationon it.
  • 17. Lawsuits
  • 18. LawsuitsA major newspaper fired 23employees for e-mailing distastefuljokes.
  • 19. LawsuitsA major chemical company fired 50workers and disciplined 200 more fortransmitting pornography throughemployee e-mail.
  • 20. LawsuitsWork-related e-mails on someone’shome computer were subpoenaed in alawsuit involving a major airline.
  • 21. LawsuitsE-mail has become one of the richestsources of information used againstemployers and managers in lawsuits.
  • 22. LawsuitsE-mail that contains discriminatory orsexually harassing material isbecoming commonplace at work.
  • 23. LawsuitsIt generally takes more than onee-mail to support a claim of a hostileenvironment in a court of law.
  • 24. Productivity: A Big Issue
  • 25. Productivity: A Big IssueAs many as 70% of a leadingbrokerage firm’s customers do theironline trading from their office desks.
  • 26. Productivity: A Big IssueProductivity could potentially becomethe biggest casualty of indiscriminateInternet use.
  • 27. Productivity: A Big IssueKnow and stay within your company’sguidelines for e-mail and Internet use.
  • 28. Productivity: A Big IssueBe aware that e-mail and Internet usecan add up and eventually show up inyour company’s monitoring system.
  • 29. Productivity: A Big IssueCheck your company policy forguidelines of e-mail and Internet use.
  • 30. Productivity: A Big IssueTake personal responsibility for howyou spend your time.
  • 31. Using Others’ Equipment
  • 32. Using Others’ EquipmentNever log on to a system as someoneelse.
  • 33. Using Others’ EquipmentNever log on to someone else’s harddrive or access his or her systemwithout approval.
  • 34. Summary of Risks
  • 35. Summary of RisksIt is your responsibility to examine thecontents of your communications.
  • 36. Summary of RisksEnsure your communications do notviolate the policies of your employer.
  • 37. Summary of RisksBe aware that anything that passesthrough your fingertips intocyberspace may be discovered.
  • 38. Summary of RisksYour employer owns your e-mail andInternet resources and can legally usethem to find out information aboutyou.
  • 39. Summary of RisksYour employer’s resources are to beused productively.
  • 40. Summary of RisksRedirecting those resources excessivelytowards personal use not aligned withthe company’s goal may result intermination.
  • 41. Staying Out of Trouble
  • 42. Staying Out of TroubleRead your company’s e-mail andInternet policy.
  • 43. Staying Out of TroubleAssume your boss is reading youre-mail or looking over your Web usage.
  • 44. Staying Out of TroubleDo not send jokes or subscribe to a jokelist at work.
  • 45. Staying Out of TroubleStart limiting your time spent onpersonal usage of the Web, includinge-mail.
  • 46. Staying Out of TroubleAvoid emotional comments andsarcasm. Focus on objective, verifiablefacts.
  • 47. Staying Out of TroubleDo not e-mail employee problems tohuman resources or management. Callinstead.
  • 48. The Family TestAsk yourself whether you’d be sayingor doing the same thing in front ofyour family.
  • 49. The Newspaper TestWould you say or do the same thingeven if it was published on the frontpage of the newspaper?
  • 50. Staying Out of TroubleNearly one-third of companies in a pollhave fired workers for improperInternet use, and two-thirds have had todo some disciplining.
  • 51. E-Mail and Internet Privacy at Work