SlideShare a Scribd company logo
1 of 16
PRIVACY IN THE USA WORKPLACE
( PERSONAL POSSESSIONS, ELECTRONIC FOOTPRINTS, AND EMAIL)
David F Amakobe
BADM840-1603C-01 Business Legal and Ethical Environment
Professor Michael Alexander, PhD
27 October 2016
Introduction – Citizens’ Privacy
 The source law for U.S Citizens’ right to
privacy is the 4th Amendment of the
U.S Constitution (Gray & Citron, 2013)
 Guarantees the right of the people to
be secure in their persons, houses,
papers, and effects, against
unreasonable searches and seizures
Introduction – Citizens’ Privacy
continued
 Unless there be a probable cause, supported
by oath or affirmation, and describing the
place to be searched, and the persons or
things to be seized (“US. Constitution -
Fourth Amendment ", 2016)
 Privacy rights only triggered when there is an
established reasonable expectation of privacy,
and the searches are unreasonable (Gray &
Citron, 2013; Kim, 2012; Renan et al., 2016)
Introduction - Workplace
 No expectation of physical privacy in public spaces, workplaces
or infrastructure like roads and public buildings (Gray &
Citron, 2013)
 Public policy concerns may override individual privacy rights to
bodily integrity, avoiding intrusion on physical spaces,
protection against the searches and or seizure of personal
items, prevention of disclosure of personal information and
assurance of individual autonomy (Chen & Marceau, 2015;
Gray & Citron, 2013; Kim, 2012)
Workplace Privacy – Personal Property
 Public policy concerns place upon all
employers the responsibility to provide a
healthy and safe work environment (Kim,
2012; Volokh, 2014).
 The Leaders’ duty of care requires
organizations to ensure the safety and
proper use of assets (Volokh, 2014)
 Tort law place pressure employers into
more investigation of employees’, lives
(Volokh, 2014)
Workplace Privacy – Personal Property
Employers who are pressured to put
up surveillance cameras since they
can comply with that duty without
incurring a substantial risk of liability for
invasion of privacy (Volokh, 2014).
Personal belongings may be
searched, and persons may be
examined for safety and security
(Volokh, 2014)
Workplace Privacy – Electronic Footprint
The workspaces may be under
constant surveillance and observation
(Chen & Marceau, 2015; Kim, 2012;
Renan et al., 2016)
When employees go to work, they
knowingly expose themselves to public
observation and therefore waive their
right to dressed up real privacy (Gray
& Citron, 2013)
Workplace Privacy – Electronic Footprint
 Employees have reasonable expectations of
privacy with private password protected web
based personal email accounts if Corporate
policies permits reasonable personal use of
the equipment especially when a public policy
concern is involved
 The reasonable expectation of privacy is
diminished if the organizations policy
forbids personal use of both equipment and
system (Gray & Citron, 2013).
Workplace Privacy – Email
 Once an employee communicates any information
to a second person over corporate e-mail system
any reasonable expectation of privacy is lost
(Halbert & Ingulli, 2015)
 An Organization’s interest in preventing illegal
activity over its e-mail system outweighs any
privacy interest the employee may have a claim to
(Halbert & Ingulli, 2015)
 The common-law tort of intrusion may apply if the
organization were to have forensic experts retrieve or
reconstruct the web files or automatically
achieved data (Kim, 2012).
Summary
 Federal privacy standards in workplaces are
informed by the Fourth Amendment and U.S
Supreme Court rulings ("U.S. Constitution - Fourth
Amendment ", 2016)
 The Right to Privacy is conditional and
subordinate to the rights of others
 In public places and workplaces the duty of
leaders to provide security and safety overrides
individual right to privacy
 The government may claim probable cause,
obtain a warrant and carry out a search and or
seizure or third party doctrine to obtain
information
Recommendations - Surveillance
All Employees shall assume
that they are under constant
Surveillance and
observation in everything
they do in their work place
and work systems
Recommendations – Corporate Policies
All Employees should
familiarize themselves with
corporate policies as is
written and presented to
them in the employee
handbook whatever level
they may be in the company.
Conclusion - Tort Law Unburden some
As technology becomes more
invasive, surveillance and
observation becomes un-
burdensomely cheap, and
record keeping capacity
increases REASONABLE
expectation of privacy
DECREASES
Conclusion
Truth be told, if you do not
want something shown or
told on the Newspaper
headline or Cable News, do
say it, don’t sent it, don’t
record it!
References
Chen, A. K., & Marceau, J. (2015). High Value Lies, Ugly Truths, and the First
Amendment. Vanderbilt Law Review, 68(6), 1435-1507.
Gray, D. C., & Citron, D. K. (2013). A SHATTERED LOOKING GLASS:
THE PITFALLS AND POTENTIAL OF THE MOSAIC THEORY OF
FOURTH AMENDMENT PRIVACY
North Carolina Journal of Law and Technology, 14(2), 381-430.
Halbert, T., & Ingulli, E. (2015). Law and Ethics in the Business Enviroment:
Cengage Learning.
Kim, P. T. (2012). Electronic Policy and Employee Speech. Chicago-Kent Law
Review, 87(3).
Renan, D., Andrias, K., Baer, M., Barkow, R., Bulman-Pozen, J., Cox, A., . . .
Zittrain, J. (2016). The Fourth Amendment as Administrative Governance.
Stanford Law Review, 68(5), 1039-1129.
Schlabach, G. R. (2015). PRIVACY IN THE CLOUD: THE MOSAIC
THEORY AND THE STORED COMMUNICATIONS ACT. Stanford
Law Review, 67(3), 677-721.
U.S. Constitution - Fourth Amendment (2016, October 24). Retrieved from
https://www.law.cornell.edu/constitution/fourth_amendment
Volokh, E. (2014). TORT LAW VS. PRIVACY. Columbia Law Review, 114(4),
879-948.
Professor's Commentary
Total points earned (rounded): 100 out of 100 (100%).
Task Requirements points earned: 25 out of 25 (100%).
Demonstration and application of knowledge points
earned: 55 out of 55 (100%).
Academic writing and format points earned: 20 out of
20 (100%).
Strengths: You provided a good presentation on
workplace privacy. I liked you section giving
information and usage of personal email. This is an
area where most questions arise, how can I use my
personal networks.
Opportunities for improvement: None at this time.
Additional Comments: You provided a good discussion
on workplace privacy standards. You had some
interesting material of how this topic evolved. Your
opinion was well expressed and presented a viable
alternative

More Related Content

What's hot

Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologiessidra batool
 
Employee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the LawEmployee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the LawEnercare Inc.
 
Osgoode pdp e discovery certificate slides
Osgoode pdp e discovery certificate slidesOsgoode pdp e discovery certificate slides
Osgoode pdp e discovery certificate slidesDan Michaluk
 
Introduction to Employment Law 101
Introduction to Employment Law 101Introduction to Employment Law 101
Introduction to Employment Law 101DeirdreJ6972
 
Legal & ethical issues
Legal & ethical issuesLegal & ethical issues
Legal & ethical issuesmiajay414
 
FW275 Legal Aspects in Exercise Science
FW275 Legal Aspects in Exercise ScienceFW275 Legal Aspects in Exercise Science
FW275 Legal Aspects in Exercise ScienceMatt Sanders
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate ResponsibilityCharles Mok
 
Top 5 Labor/Employment Law Risks for a Company in 2010
Top 5 Labor/Employment Law Risks for a Company in 2010Top 5 Labor/Employment Law Risks for a Company in 2010
Top 5 Labor/Employment Law Risks for a Company in 2010Tom Daly
 
The New Normal
The New NormalThe New Normal
The New Normalwychepa
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesChantial
 
Safety's Role in Labor Relations (Workplace Safety Wednesdays - Feb 2014)
Safety's Role in Labor Relations (Workplace Safety Wednesdays - Feb 2014)Safety's Role in Labor Relations (Workplace Safety Wednesdays - Feb 2014)
Safety's Role in Labor Relations (Workplace Safety Wednesdays - Feb 2014)Matthew Korn
 

What's hot (11)

Personal privacy and computer technologies
Personal privacy and computer technologiesPersonal privacy and computer technologies
Personal privacy and computer technologies
 
Employee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the LawEmployee Privacy Rights: New Developments in the Law
Employee Privacy Rights: New Developments in the Law
 
Osgoode pdp e discovery certificate slides
Osgoode pdp e discovery certificate slidesOsgoode pdp e discovery certificate slides
Osgoode pdp e discovery certificate slides
 
Introduction to Employment Law 101
Introduction to Employment Law 101Introduction to Employment Law 101
Introduction to Employment Law 101
 
Legal & ethical issues
Legal & ethical issuesLegal & ethical issues
Legal & ethical issues
 
FW275 Legal Aspects in Exercise Science
FW275 Legal Aspects in Exercise ScienceFW275 Legal Aspects in Exercise Science
FW275 Legal Aspects in Exercise Science
 
Internet Corporate Responsibility
Internet Corporate ResponsibilityInternet Corporate Responsibility
Internet Corporate Responsibility
 
Top 5 Labor/Employment Law Risks for a Company in 2010
Top 5 Labor/Employment Law Risks for a Company in 2010Top 5 Labor/Employment Law Risks for a Company in 2010
Top 5 Labor/Employment Law Risks for a Company in 2010
 
The New Normal
The New NormalThe New Normal
The New Normal
 
Legal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologiesLegal and ethical issues associated with modern technologies
Legal and ethical issues associated with modern technologies
 
Safety's Role in Labor Relations (Workplace Safety Wednesdays - Feb 2014)
Safety's Role in Labor Relations (Workplace Safety Wednesdays - Feb 2014)Safety's Role in Labor Relations (Workplace Safety Wednesdays - Feb 2014)
Safety's Role in Labor Relations (Workplace Safety Wednesdays - Feb 2014)
 

Viewers also liked

Dnbd эффективные бизнес процессы власть доверие манипуляции
Dnbd эффективные бизнес процессы власть доверие манипуляцииDnbd эффективные бизнес процессы власть доверие манипуляции
Dnbd эффективные бизнес процессы власть доверие манипуляцииАндрей Анатольевич Ващенко
 
Money Laundering and Its Fall-out - REGULATION OF MONEY LAUNDERING: GLOBAL P...
Money Laundering  and Its Fall-out - REGULATION OF MONEY LAUNDERING: GLOBAL P...Money Laundering  and Its Fall-out - REGULATION OF MONEY LAUNDERING: GLOBAL P...
Money Laundering and Its Fall-out - REGULATION OF MONEY LAUNDERING: GLOBAL P...Resurgent India
 
108.3-Mail Transfer Agent(MTA) basics
108.3-Mail Transfer Agent(MTA) basics108.3-Mail Transfer Agent(MTA) basics
108.3-Mail Transfer Agent(MTA) basicsbehrad eslamifar
 
NCAT Solar Powered Air Conditioning - Is it a Viable Option? Antonio Chan
NCAT Solar Powered Air Conditioning - Is it a Viable Option? Antonio ChanNCAT Solar Powered Air Conditioning - Is it a Viable Option? Antonio Chan
NCAT Solar Powered Air Conditioning - Is it a Viable Option? Antonio ChanAntoniocwchan
 
Croс mba полезное и результативное совещание 27 октября 2016г
Croс mba полезное и результативное совещание 27 октября 2016гCroс mba полезное и результативное совещание 27 октября 2016г
Croс mba полезное и результативное совещание 27 октября 2016гАндрей Анатольевич Ващенко
 
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"NICSA
 
атопийн дерматит
атопийн дерматитатопийн дерматит
атопийн дерматитdulmaa munkhbat
 
Урок 36 для 11 класу - Вибирання елементів з масиву за певним критерієм.
Урок 36 для 11 класу - Вибирання елементів з масиву за певним критерієм.Урок 36 для 11 класу - Вибирання елементів з масиву за певним критерієм.
Урок 36 для 11 класу - Вибирання елементів з масиву за певним критерієм.VsimPPT
 
TypeScript and Visual Studio Code
TypeScript and Visual Studio Code TypeScript and Visual Studio Code
TypeScript and Visual Studio Code Akira Inoue
 

Viewers also liked (10)

Dnbd эффективные бизнес процессы власть доверие манипуляции
Dnbd эффективные бизнес процессы власть доверие манипуляцииDnbd эффективные бизнес процессы власть доверие манипуляции
Dnbd эффективные бизнес процессы власть доверие манипуляции
 
Money Laundering and Its Fall-out - REGULATION OF MONEY LAUNDERING: GLOBAL P...
Money Laundering  and Its Fall-out - REGULATION OF MONEY LAUNDERING: GLOBAL P...Money Laundering  and Its Fall-out - REGULATION OF MONEY LAUNDERING: GLOBAL P...
Money Laundering and Its Fall-out - REGULATION OF MONEY LAUNDERING: GLOBAL P...
 
108.3-Mail Transfer Agent(MTA) basics
108.3-Mail Transfer Agent(MTA) basics108.3-Mail Transfer Agent(MTA) basics
108.3-Mail Transfer Agent(MTA) basics
 
NCAT Solar Powered Air Conditioning - Is it a Viable Option? Antonio Chan
NCAT Solar Powered Air Conditioning - Is it a Viable Option? Antonio ChanNCAT Solar Powered Air Conditioning - Is it a Viable Option? Antonio Chan
NCAT Solar Powered Air Conditioning - Is it a Viable Option? Antonio Chan
 
Croс mba полезное и результативное совещание 27 октября 2016г
Croс mba полезное и результативное совещание 27 октября 2016гCroс mba полезное и результативное совещание 27 октября 2016г
Croс mba полезное и результативное совещание 27 октября 2016г
 
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
NICSA Webinar | AML Enhanced Customer Due Diligence - "Beneficial Owner Rule"
 
атопийн дерматит
атопийн дерматитатопийн дерматит
атопийн дерматит
 
Урок 36 для 11 класу - Вибирання елементів з масиву за певним критерієм.
Урок 36 для 11 класу - Вибирання елементів з масиву за певним критерієм.Урок 36 для 11 класу - Вибирання елементів з масиву за певним критерієм.
Урок 36 для 11 класу - Вибирання елементів з масиву за певним критерієм.
 
TypeScript and Visual Studio Code
TypeScript and Visual Studio Code TypeScript and Visual Studio Code
TypeScript and Visual Studio Code
 
Nation at Play
Nation at PlayNation at Play
Nation at Play
 

Similar to Privacy in the usa Workplace

Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docxPaper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docxsmile790243
 
Ethics Research Paper-Employee Surveillance
Ethics Research Paper-Employee SurveillanceEthics Research Paper-Employee Surveillance
Ethics Research Paper-Employee Surveillanceitsika
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplaceBailey and Wyant PLLC
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulationblogzilla
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxsmile790243
 
Privacy at Work —Ethical CriteriaAnders J. PerssonSven.docx
Privacy at Work —Ethical CriteriaAnders J. PerssonSven.docxPrivacy at Work —Ethical CriteriaAnders J. PerssonSven.docx
Privacy at Work —Ethical CriteriaAnders J. PerssonSven.docxsleeperharwell
 
Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacymkeane
 
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxChapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxwalterl4
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hrTushar Rajput
 
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer EthicsBaase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethicsdordunureubenmawukok
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 PrivacyLance Hoffman
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxadampcarr67227
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive EssayJill Lyons
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Dan Michaluk
 
1. INTRODUCTIONWe are currently living in the so-called informatio.pdf
1. INTRODUCTIONWe are currently living in the so-called informatio.pdf1. INTRODUCTIONWe are currently living in the so-called informatio.pdf
1. INTRODUCTIONWe are currently living in the so-called informatio.pdfanurag1231
 

Similar to Privacy in the usa Workplace (20)

Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docxPaper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
 
Ethics Research Paper-Employee Surveillance
Ethics Research Paper-Employee SurveillanceEthics Research Paper-Employee Surveillance
Ethics Research Paper-Employee Surveillance
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplace
 
Data science and privacy regulation
Data science and privacy regulationData science and privacy regulation
Data science and privacy regulation
 
Links Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docxLinks Associated with Privacy Death of privacy ‘Your ce.docx
Links Associated with Privacy Death of privacy ‘Your ce.docx
 
Privacy at Work —Ethical CriteriaAnders J. PerssonSven.docx
Privacy at Work —Ethical CriteriaAnders J. PerssonSven.docxPrivacy at Work —Ethical CriteriaAnders J. PerssonSven.docx
Privacy at Work —Ethical CriteriaAnders J. PerssonSven.docx
 
Evolving Issues in Workplace Privacy
Evolving Issues in Workplace PrivacyEvolving Issues in Workplace Privacy
Evolving Issues in Workplace Privacy
 
Review questions
Review questionsReview questions
Review questions
 
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docxChapter 2PrivacyBased on slides prepared by Cyndi C.docx
Chapter 2PrivacyBased on slides prepared by Cyndi C.docx
 
Unit 6 Privacy and Data Protection 8 hr
Unit 6  Privacy and Data Protection 8 hrUnit 6  Privacy and Data Protection 8 hr
Unit 6 Privacy and Data Protection 8 hr
 
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer EthicsBaase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
Baase_Henry_GoF5e_Ch2.pptx Gift of Fire Computer Ethics
 
Research Proposal K.M.Sangeetha
Research Proposal K.M.SangeethaResearch Proposal K.M.Sangeetha
Research Proposal K.M.Sangeetha
 
2008 12 08 2008 Privacy
2008 12 08 2008 Privacy2008 12 08 2008 Privacy
2008 12 08 2008 Privacy
 
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docxhttpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
httpsdigitalguardian.comblogsocial-engineering-attacks-common.docx
 
Data security training
Data security trainingData security training
Data security training
 
4514611.ppt
4514611.ppt4514611.ppt
4514611.ppt
 
NSA Persuasive Essay
NSA Persuasive EssayNSA Persuasive Essay
NSA Persuasive Essay
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)Introduction to FOI law (the law of information)
Introduction to FOI law (the law of information)
 
1. INTRODUCTIONWe are currently living in the so-called informatio.pdf
1. INTRODUCTIONWe are currently living in the so-called informatio.pdf1. INTRODUCTIONWe are currently living in the so-called informatio.pdf
1. INTRODUCTIONWe are currently living in the so-called informatio.pdf
 

Recently uploaded

Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramBeyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramCIToolkit
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Nehwal
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineeringthomas851723
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentationmintusiprd
 
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...AgileNetwork
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsCIToolkit
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insightWayne Abrahams
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)jennyeacort
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证jdkhjh
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Roomdivyansh0kumar0
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sectorthomas851723
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentationcraig524401
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Reviewthomas851723
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchRashtriya Kisan Manch
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingCIToolkit
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixCIToolkit
 

Recently uploaded (17)

Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why DiagramBeyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
Beyond the Five Whys: Exploring the Hierarchical Causes with the Why-Why Diagram
 
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
Pooja Mehta 9167673311, Trusted Call Girls In NAVI MUMBAI Cash On Payment , V...
 
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Servicesauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
sauth delhi call girls in Defence Colony🔝 9953056974 🔝 escort Service
 
Introduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-EngineeringIntroduction to LPC - Facility Design And Re-Engineering
Introduction to LPC - Facility Design And Re-Engineering
 
Fifteenth Finance Commission Presentation
Fifteenth Finance Commission PresentationFifteenth Finance Commission Presentation
Fifteenth Finance Commission Presentation
 
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
ANIn Gurugram April 2024 |Can Agile and AI work together? by Pramodkumar Shri...
 
Measuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield MetricsMeasuring True Process Yield using Robust Yield Metrics
Measuring True Process Yield using Robust Yield Metrics
 
Reflecting, turning experience into insight
Reflecting, turning experience into insightReflecting, turning experience into insight
Reflecting, turning experience into insight
 
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
Call Us🔝⇛+91-97111🔝47426 Call In girls Munirka (DELHI)
 
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
原版1:1复刻密西西比大学毕业证Mississippi毕业证留信学历认证
 
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With RoomVIP Kolkata Call Girl Rajarhat 👉 8250192130  Available With Room
VIP Kolkata Call Girl Rajarhat 👉 8250192130 Available With Room
 
LPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business SectorLPC Warehouse Management System For Clients In The Business Sector
LPC Warehouse Management System For Clients In The Business Sector
 
Board Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch PresentationBoard Diversity Initiaive Launch Presentation
Board Diversity Initiaive Launch Presentation
 
LPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations ReviewLPC Operations Review PowerPoint | Operations Review
LPC Operations Review PowerPoint | Operations Review
 
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan ManchFarmer Representative Organization in Lucknow | Rashtriya Kisan Manch
Farmer Representative Organization in Lucknow | Rashtriya Kisan Manch
 
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes ThinkingSimplifying Complexity: How the Four-Field Matrix Reshapes Thinking
Simplifying Complexity: How the Four-Field Matrix Reshapes Thinking
 
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency MatrixUnlocking Productivity and Personal Growth through the Importance-Urgency Matrix
Unlocking Productivity and Personal Growth through the Importance-Urgency Matrix
 

Privacy in the usa Workplace

  • 1. PRIVACY IN THE USA WORKPLACE ( PERSONAL POSSESSIONS, ELECTRONIC FOOTPRINTS, AND EMAIL) David F Amakobe BADM840-1603C-01 Business Legal and Ethical Environment Professor Michael Alexander, PhD 27 October 2016
  • 2. Introduction – Citizens’ Privacy  The source law for U.S Citizens’ right to privacy is the 4th Amendment of the U.S Constitution (Gray & Citron, 2013)  Guarantees the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures
  • 3. Introduction – Citizens’ Privacy continued  Unless there be a probable cause, supported by oath or affirmation, and describing the place to be searched, and the persons or things to be seized (“US. Constitution - Fourth Amendment ", 2016)  Privacy rights only triggered when there is an established reasonable expectation of privacy, and the searches are unreasonable (Gray & Citron, 2013; Kim, 2012; Renan et al., 2016)
  • 4. Introduction - Workplace  No expectation of physical privacy in public spaces, workplaces or infrastructure like roads and public buildings (Gray & Citron, 2013)  Public policy concerns may override individual privacy rights to bodily integrity, avoiding intrusion on physical spaces, protection against the searches and or seizure of personal items, prevention of disclosure of personal information and assurance of individual autonomy (Chen & Marceau, 2015; Gray & Citron, 2013; Kim, 2012)
  • 5. Workplace Privacy – Personal Property  Public policy concerns place upon all employers the responsibility to provide a healthy and safe work environment (Kim, 2012; Volokh, 2014).  The Leaders’ duty of care requires organizations to ensure the safety and proper use of assets (Volokh, 2014)  Tort law place pressure employers into more investigation of employees’, lives (Volokh, 2014)
  • 6. Workplace Privacy – Personal Property Employers who are pressured to put up surveillance cameras since they can comply with that duty without incurring a substantial risk of liability for invasion of privacy (Volokh, 2014). Personal belongings may be searched, and persons may be examined for safety and security (Volokh, 2014)
  • 7. Workplace Privacy – Electronic Footprint The workspaces may be under constant surveillance and observation (Chen & Marceau, 2015; Kim, 2012; Renan et al., 2016) When employees go to work, they knowingly expose themselves to public observation and therefore waive their right to dressed up real privacy (Gray & Citron, 2013)
  • 8. Workplace Privacy – Electronic Footprint  Employees have reasonable expectations of privacy with private password protected web based personal email accounts if Corporate policies permits reasonable personal use of the equipment especially when a public policy concern is involved  The reasonable expectation of privacy is diminished if the organizations policy forbids personal use of both equipment and system (Gray & Citron, 2013).
  • 9. Workplace Privacy – Email  Once an employee communicates any information to a second person over corporate e-mail system any reasonable expectation of privacy is lost (Halbert & Ingulli, 2015)  An Organization’s interest in preventing illegal activity over its e-mail system outweighs any privacy interest the employee may have a claim to (Halbert & Ingulli, 2015)  The common-law tort of intrusion may apply if the organization were to have forensic experts retrieve or reconstruct the web files or automatically achieved data (Kim, 2012).
  • 10. Summary  Federal privacy standards in workplaces are informed by the Fourth Amendment and U.S Supreme Court rulings ("U.S. Constitution - Fourth Amendment ", 2016)  The Right to Privacy is conditional and subordinate to the rights of others  In public places and workplaces the duty of leaders to provide security and safety overrides individual right to privacy  The government may claim probable cause, obtain a warrant and carry out a search and or seizure or third party doctrine to obtain information
  • 11. Recommendations - Surveillance All Employees shall assume that they are under constant Surveillance and observation in everything they do in their work place and work systems
  • 12. Recommendations – Corporate Policies All Employees should familiarize themselves with corporate policies as is written and presented to them in the employee handbook whatever level they may be in the company.
  • 13. Conclusion - Tort Law Unburden some As technology becomes more invasive, surveillance and observation becomes un- burdensomely cheap, and record keeping capacity increases REASONABLE expectation of privacy DECREASES
  • 14. Conclusion Truth be told, if you do not want something shown or told on the Newspaper headline or Cable News, do say it, don’t sent it, don’t record it!
  • 15. References Chen, A. K., & Marceau, J. (2015). High Value Lies, Ugly Truths, and the First Amendment. Vanderbilt Law Review, 68(6), 1435-1507. Gray, D. C., & Citron, D. K. (2013). A SHATTERED LOOKING GLASS: THE PITFALLS AND POTENTIAL OF THE MOSAIC THEORY OF FOURTH AMENDMENT PRIVACY North Carolina Journal of Law and Technology, 14(2), 381-430. Halbert, T., & Ingulli, E. (2015). Law and Ethics in the Business Enviroment: Cengage Learning. Kim, P. T. (2012). Electronic Policy and Employee Speech. Chicago-Kent Law Review, 87(3). Renan, D., Andrias, K., Baer, M., Barkow, R., Bulman-Pozen, J., Cox, A., . . . Zittrain, J. (2016). The Fourth Amendment as Administrative Governance. Stanford Law Review, 68(5), 1039-1129. Schlabach, G. R. (2015). PRIVACY IN THE CLOUD: THE MOSAIC THEORY AND THE STORED COMMUNICATIONS ACT. Stanford Law Review, 67(3), 677-721. U.S. Constitution - Fourth Amendment (2016, October 24). Retrieved from https://www.law.cornell.edu/constitution/fourth_amendment Volokh, E. (2014). TORT LAW VS. PRIVACY. Columbia Law Review, 114(4), 879-948.
  • 16. Professor's Commentary Total points earned (rounded): 100 out of 100 (100%). Task Requirements points earned: 25 out of 25 (100%). Demonstration and application of knowledge points earned: 55 out of 55 (100%). Academic writing and format points earned: 20 out of 20 (100%). Strengths: You provided a good presentation on workplace privacy. I liked you section giving information and usage of personal email. This is an area where most questions arise, how can I use my personal networks. Opportunities for improvement: None at this time. Additional Comments: You provided a good discussion on workplace privacy standards. You had some interesting material of how this topic evolved. Your opinion was well expressed and presented a viable alternative