SlideShare a Scribd company logo
1 of 3
Email Monitoring: Is it Reasonable for Employers to Monitor their Employees’ Email?
WHAT
EXPLANATION
EXAMPLES/EVIDENCE
DO
With employers being responsiblefor the consequences of any illegal,
discriminatory or offensive material that is used or sent by their ITsystems (De
Pree & Jude, 2006, p. 46), thereare severalvalid reasons to consider
monitoring the use of email and other internet use in an organisation. These
include the employers’ desireto guard against‘malware’ or preventlow
productivity due to non-work related email (Kiser et al., 2010; Wheelwright,
2002), as wellas to protect company’s assets and ensurethere is no ‘disclosure
of confidential information’ (Wheelwright, 2002, p.72). For example, Coca Cola
employees werediscovered attempting to ‘sell trade secrets to Pepsi’ (Kiser et
al., 2010, p.32), to protectthe company’s public image and to ensurelawful
use of email by employees. Itcould then be argued that it is reasonablefor
management to implement methods of controlling or monitoring such
communication as a form of protection.
However, there are severalarguments againstmonitoring electronic
communication in the workplace. In many workplaces, thereis an
understanding’ that personalcorrespondenceand personalphonecalls at work
will remain personaland not subjected to monitoring. Itis argued that such
surveillancecan create a climate of distrustand an unnecessarily stressful
atmospherefor employees (Kiser et al, 2010). Itcould even lower employee
productivity. This can be illustrated by the possibility that employees could
take an extra hour to get Christmas shopping doneinstead of shopping for ‘15
minutes online’ (Wheelwright, 2002, p. 71 ). Therefore, it can be seen as an
unadvisablemanagement strategy because fostering positive morale amongst
staff is an important part of management. Itcontributes to employees staying
in their posts for longer and encourages them to work moreproductively.
Therefore, surveillance of their emails could ultimately be counterproductive.
The blurring of boundaries between personaland private useof company
email has created a significantchallenge for employers and employees. This is
shown by an incident in which one university professor had his private email to
another colleague leaked, leading to his suspension (McNeilage, 2014).
Although the professor’s comments weresentin an email to one friend with
whom he was playing ‘an ironic game’ (Fenely, 2014, p. 29), theemail
contained language that contravened the universities anti-discrimination
policy. In the instance of the professor’sprivatebutracist comments being
made public, the university became obliged to take public action. This
demonstrates that while many employees consider email communication to be
private, there is a difference between a paper personalletter addressed to an
individual in an organisation and a so called ‘private’ email communication. It
could be said, then, that it is reasonableto monitor email in order to preventa
similar outcome occurring to an individual in any organisation and it is a
reminder that professionalstandards apply in all of our communication in the
workplace.
The manager’s role in implementing a monitoring practice that considers all
employees, and which overcomes the possibledisadvantages of monitoring
emails is essential. Managers also need to be more active in foreseeing and
preventing potential problems of email misuse. The key management functions
of planning, organising, leading and controlling need to be incorporated into
email monitoring for it to be considered a reasonable strategy. Managers
should take a proactive role by explaining the purposeof email monitoring and
how it can protect all stakeholders in the organisation, including
employees (Kiser et al., 2010). Managers could work in teams with employees
to co-constructsuitable and transparentITpolicies. Preventative measures
involving ITtraining that raiseemployees’ awareness of proper conductfor
email use and the potential consequences of misusecould also be
implemented. The danger of not having such clear processes is shown by the
dismissalof three postoffice workers who received an inappropriateemail to
their work email addresses from a personalemail account due to a software
filter picking it up. The courts upheld their claim of unfair dismissaland granted
them compensation due to their not knowing the filter was being applied
((Byrnes, 2013). This casedemonstrates the importance of monitoring being
accompanied by an effective policy and clear communication if both
individuals and companies are not to suffer, and that maybe ITsurveillance
alone is not enough to encourage proper professionalstandards.

More Related Content

Similar to Wk4 paragraph jigsaw paragraphs (002)

Development of Lecture Attendance System for Staff Performance Rating in a Te...
Development of Lecture Attendance System for Staff Performance Rating in a Te...Development of Lecture Attendance System for Staff Performance Rating in a Te...
Development of Lecture Attendance System for Staff Performance Rating in a Te...Dr. Amarjeet Singh
 
Topic- Contemporary business issueName of the Student .docx
Topic- Contemporary business issueName of the Student .docxTopic- Contemporary business issueName of the Student .docx
Topic- Contemporary business issueName of the Student .docxjuliennehar
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizationsijtsrd
 
Confidentiality
ConfidentialityConfidentiality
ConfidentialityRCarlisle
 
Ict applications in school management and record keeping
Ict applications in school management and record keepingIct applications in school management and record keeping
Ict applications in school management and record keepingRex Mwamba
 
Detecting Anomalous Online ReviewersAn Unsupervised Approac.docx
Detecting Anomalous Online ReviewersAn Unsupervised Approac.docxDetecting Anomalous Online ReviewersAn Unsupervised Approac.docx
Detecting Anomalous Online ReviewersAn Unsupervised Approac.docxkhenry4
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxjeanettehully
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxglendar3
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxtodd581
 
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)ijcncs
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxsusanschei
 
The Three Dimensions of Security
The Three Dimensions of SecurityThe Three Dimensions of Security
The Three Dimensions of SecurityCSCJournals
 
A lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesA lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesErrol A. Adams, J.D., M.L.S.
 
A lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issuesA lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issuesAndres Baytelman
 
ITS 833 – INFORMATION GOVERNANCEChapter 12 – Information Gov.docx
ITS 833 – INFORMATION GOVERNANCEChapter 12 – Information Gov.docxITS 833 – INFORMATION GOVERNANCEChapter 12 – Information Gov.docx
ITS 833 – INFORMATION GOVERNANCEChapter 12 – Information Gov.docxvrickens
 
ITS 833 – INFORMATION GOVERNANCEChapter 12 – Information Gov.docx
ITS 833 – INFORMATION GOVERNANCEChapter 12 – Information Gov.docxITS 833 – INFORMATION GOVERNANCEChapter 12 – Information Gov.docx
ITS 833 – INFORMATION GOVERNANCEChapter 12 – Information Gov.docxdonnajames55
 
Junyan Wu Healthcare information security control on insider threat proposal
Junyan Wu Healthcare information security control on insider threat proposalJunyan Wu Healthcare information security control on insider threat proposal
Junyan Wu Healthcare information security control on insider threat proposalJunyan Wu
 

Similar to Wk4 paragraph jigsaw paragraphs (002) (20)

Development of Lecture Attendance System for Staff Performance Rating in a Te...
Development of Lecture Attendance System for Staff Performance Rating in a Te...Development of Lecture Attendance System for Staff Performance Rating in a Te...
Development of Lecture Attendance System for Staff Performance Rating in a Te...
 
Topic- Contemporary business issueName of the Student .docx
Topic- Contemporary business issueName of the Student .docxTopic- Contemporary business issueName of the Student .docx
Topic- Contemporary business issueName of the Student .docx
 
Electronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare OrganizationsElectronic Healthcare Record Security and Management in Healthcare Organizations
Electronic Healthcare Record Security and Management in Healthcare Organizations
 
Confidentiality
ConfidentialityConfidentiality
Confidentiality
 
Moving beyond email
Moving beyond emailMoving beyond email
Moving beyond email
 
Ict applications in school management and record keeping
Ict applications in school management and record keepingIct applications in school management and record keeping
Ict applications in school management and record keeping
 
Detecting Anomalous Online ReviewersAn Unsupervised Approac.docx
Detecting Anomalous Online ReviewersAn Unsupervised Approac.docxDetecting Anomalous Online ReviewersAn Unsupervised Approac.docx
Detecting Anomalous Online ReviewersAn Unsupervised Approac.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docxRunning head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
Running head POLICIES FOR MANAGING PRIVACY1POLICIES FOR M.docx
 
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
Neural Network Web-Based Human Resource Management System Model (NNWBHRMSM)
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
 
Case study 7
Case study 7Case study 7
Case study 7
 
The Three Dimensions of Security
The Three Dimensions of SecurityThe Three Dimensions of Security
The Three Dimensions of Security
 
A lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesA lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issues
 
A lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issuesA lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issues
 
Sample Assignment on Employee Relation
Sample Assignment on Employee RelationSample Assignment on Employee Relation
Sample Assignment on Employee Relation
 
ITS 833 – INFORMATION GOVERNANCEChapter 12 – Information Gov.docx
ITS 833 – INFORMATION GOVERNANCEChapter 12 – Information Gov.docxITS 833 – INFORMATION GOVERNANCEChapter 12 – Information Gov.docx
ITS 833 – INFORMATION GOVERNANCEChapter 12 – Information Gov.docx
 
ITS 833 – INFORMATION GOVERNANCEChapter 12 – Information Gov.docx
ITS 833 – INFORMATION GOVERNANCEChapter 12 – Information Gov.docxITS 833 – INFORMATION GOVERNANCEChapter 12 – Information Gov.docx
ITS 833 – INFORMATION GOVERNANCEChapter 12 – Information Gov.docx
 
Junyan Wu Healthcare information security control on insider threat proposal
Junyan Wu Healthcare information security control on insider threat proposalJunyan Wu Healthcare information security control on insider threat proposal
Junyan Wu Healthcare information security control on insider threat proposal
 

More from JAHennessyMurdoch

Editing and proof reading for l7
Editing and proof reading for l7Editing and proof reading for l7
Editing and proof reading for l7JAHennessyMurdoch
 
Using your reading effectively dissertations
Using your reading effectively   dissertationsUsing your reading effectively   dissertations
Using your reading effectively dissertationsJAHennessyMurdoch
 
Writing your essays at l7 jhm
Writing your essays at l7 jhmWriting your essays at l7 jhm
Writing your essays at l7 jhmJAHennessyMurdoch
 
(9)what is academic writing ljmu jhm
(9)what is academic writing ljmu jhm(9)what is academic writing ljmu jhm
(9)what is academic writing ljmu jhmJAHennessyMurdoch
 
Using reading in your writing1
Using reading in your writing1Using reading in your writing1
Using reading in your writing1JAHennessyMurdoch
 
Using reading in your writing
Using reading in your writingUsing reading in your writing
Using reading in your writingJAHennessyMurdoch
 
Wk 5 gathering ideas about business
Wk 5 gathering ideas about businessWk 5 gathering ideas about business
Wk 5 gathering ideas about businessJAHennessyMurdoch
 
Academic writing critical analysis l7
Academic writing   critical analysis l7Academic writing   critical analysis l7
Academic writing critical analysis l7JAHennessyMurdoch
 
Wk4 communicating about business (003)
Wk4 communicating about business (003)Wk4 communicating about business (003)
Wk4 communicating about business (003)JAHennessyMurdoch
 
Pg academic writing critical analysis - activity (002)
Pg academic writing   critical analysis - activity (002)Pg academic writing   critical analysis - activity (002)
Pg academic writing critical analysis - activity (002)JAHennessyMurdoch
 
Academic writing critical analysis l7
Academic writing   critical analysis l7Academic writing   critical analysis l7
Academic writing critical analysis l7JAHennessyMurdoch
 
Critical reading and writing level 7 british values
Critical reading and writing level 7   british valuesCritical reading and writing level 7   british values
Critical reading and writing level 7 british valuesJAHennessyMurdoch
 
L7 critical analysis and reading october 2019
L7 critical analysis and reading october 2019L7 critical analysis and reading october 2019
L7 critical analysis and reading october 2019JAHennessyMurdoch
 

More from JAHennessyMurdoch (20)

Getting started at LJMU
Getting started at LJMUGetting started at LJMU
Getting started at LJMU
 
Getting Started at LJMU
Getting Started at LJMUGetting Started at LJMU
Getting Started at LJMU
 
10 min time management
10 min time management10 min time management
10 min time management
 
Editing and proof reading for l7
Editing and proof reading for l7Editing and proof reading for l7
Editing and proof reading for l7
 
Using your reading effectively dissertations
Using your reading effectively   dissertationsUsing your reading effectively   dissertations
Using your reading effectively dissertations
 
Writing your essays at l7 jhm
Writing your essays at l7 jhmWriting your essays at l7 jhm
Writing your essays at l7 jhm
 
(9)what is academic writing ljmu jhm
(9)what is academic writing ljmu jhm(9)what is academic writing ljmu jhm
(9)what is academic writing ljmu jhm
 
Developing academic writing
Developing academic writingDeveloping academic writing
Developing academic writing
 
Writing your reports jhm
Writing your reports jhmWriting your reports jhm
Writing your reports jhm
 
Using reading in your writing1
Using reading in your writing1Using reading in your writing1
Using reading in your writing1
 
Using reading in your writing
Using reading in your writingUsing reading in your writing
Using reading in your writing
 
Wk 5 gathering ideas about business
Wk 5 gathering ideas about businessWk 5 gathering ideas about business
Wk 5 gathering ideas about business
 
Academic writing critical analysis l7
Academic writing   critical analysis l7Academic writing   critical analysis l7
Academic writing critical analysis l7
 
Level 7 note making
Level 7 note makingLevel 7 note making
Level 7 note making
 
Wk4 communicating about business (003)
Wk4 communicating about business (003)Wk4 communicating about business (003)
Wk4 communicating about business (003)
 
Pg academic writing critical analysis - activity (002)
Pg academic writing   critical analysis - activity (002)Pg academic writing   critical analysis - activity (002)
Pg academic writing critical analysis - activity (002)
 
Academic writing critical analysis l7
Academic writing   critical analysis l7Academic writing   critical analysis l7
Academic writing critical analysis l7
 
Critical reading and writing level 7 british values
Critical reading and writing level 7   british valuesCritical reading and writing level 7   british values
Critical reading and writing level 7 british values
 
Sway test
Sway testSway test
Sway test
 
L7 critical analysis and reading october 2019
L7 critical analysis and reading october 2019L7 critical analysis and reading october 2019
L7 critical analysis and reading october 2019
 

Recently uploaded

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 

Wk4 paragraph jigsaw paragraphs (002)

  • 1. Email Monitoring: Is it Reasonable for Employers to Monitor their Employees’ Email? WHAT EXPLANATION EXAMPLES/EVIDENCE DO With employers being responsiblefor the consequences of any illegal, discriminatory or offensive material that is used or sent by their ITsystems (De Pree & Jude, 2006, p. 46), thereare severalvalid reasons to consider monitoring the use of email and other internet use in an organisation. These include the employers’ desireto guard against‘malware’ or preventlow productivity due to non-work related email (Kiser et al., 2010; Wheelwright, 2002), as wellas to protect company’s assets and ensurethere is no ‘disclosure of confidential information’ (Wheelwright, 2002, p.72). For example, Coca Cola employees werediscovered attempting to ‘sell trade secrets to Pepsi’ (Kiser et al., 2010, p.32), to protectthe company’s public image and to ensurelawful use of email by employees. Itcould then be argued that it is reasonablefor management to implement methods of controlling or monitoring such communication as a form of protection. However, there are severalarguments againstmonitoring electronic communication in the workplace. In many workplaces, thereis an understanding’ that personalcorrespondenceand personalphonecalls at work will remain personaland not subjected to monitoring. Itis argued that such surveillancecan create a climate of distrustand an unnecessarily stressful atmospherefor employees (Kiser et al, 2010). Itcould even lower employee productivity. This can be illustrated by the possibility that employees could take an extra hour to get Christmas shopping doneinstead of shopping for ‘15 minutes online’ (Wheelwright, 2002, p. 71 ). Therefore, it can be seen as an unadvisablemanagement strategy because fostering positive morale amongst staff is an important part of management. Itcontributes to employees staying in their posts for longer and encourages them to work moreproductively. Therefore, surveillance of their emails could ultimately be counterproductive.
  • 2. The blurring of boundaries between personaland private useof company email has created a significantchallenge for employers and employees. This is shown by an incident in which one university professor had his private email to another colleague leaked, leading to his suspension (McNeilage, 2014). Although the professor’s comments weresentin an email to one friend with whom he was playing ‘an ironic game’ (Fenely, 2014, p. 29), theemail contained language that contravened the universities anti-discrimination policy. In the instance of the professor’sprivatebutracist comments being made public, the university became obliged to take public action. This demonstrates that while many employees consider email communication to be private, there is a difference between a paper personalletter addressed to an individual in an organisation and a so called ‘private’ email communication. It could be said, then, that it is reasonableto monitor email in order to preventa similar outcome occurring to an individual in any organisation and it is a reminder that professionalstandards apply in all of our communication in the workplace. The manager’s role in implementing a monitoring practice that considers all employees, and which overcomes the possibledisadvantages of monitoring emails is essential. Managers also need to be more active in foreseeing and preventing potential problems of email misuse. The key management functions of planning, organising, leading and controlling need to be incorporated into email monitoring for it to be considered a reasonable strategy. Managers should take a proactive role by explaining the purposeof email monitoring and how it can protect all stakeholders in the organisation, including employees (Kiser et al., 2010). Managers could work in teams with employees to co-constructsuitable and transparentITpolicies. Preventative measures involving ITtraining that raiseemployees’ awareness of proper conductfor email use and the potential consequences of misusecould also be implemented. The danger of not having such clear processes is shown by the dismissalof three postoffice workers who received an inappropriateemail to their work email addresses from a personalemail account due to a software filter picking it up. The courts upheld their claim of unfair dismissaland granted them compensation due to their not knowing the filter was being applied ((Byrnes, 2013). This casedemonstrates the importance of monitoring being
  • 3. accompanied by an effective policy and clear communication if both individuals and companies are not to suffer, and that maybe ITsurveillance alone is not enough to encourage proper professionalstandards.