SlideShare a Scribd company logo
1 of 5
Paper 2
Employer Monitoring of Employees
Purpose
State of Estates will be tracking or monitoring all employee
usage of internet, tablets, desk and lap tops computers, emails,
cell phones and social media usage. This is to protect the
reputation of our organization from deter any liability as well as
to avoid misuse of company assets. Monitoring the daily
activities of the employees and it is legal and will not overstep
when it comes to anyone’s privacy. Any suspicious activity
will be investigated and the proper authorities will be notified.
Internet Access, Email and the Right to Monitor
State of Estates provides Internet access that is to be used
solely for work related activities and approved training
sessions. We have an IT department that monitors all activity
from the Internet and email. The Email system is property of
State of Estates and it will be archived in the server according
to our retention policy. Please note that we use filters to block
spam and viruses to that could destroy our entire system. State
of Estates purchases all work related equipment so we have the
legal right to monitor anything that has been sent or received on
the company’s intranet - without prior notification.
Violation of Policy
State of Estates reserve the right to monitor employ logs and
activity of usage. Our organization must stay in compliance
with the law and our policy. If it is found that any employee has
violated the rules you may face disciplinary action that could
lead to termination up to prison.
Telephone Calls and Cellular Usage
State of Estates is prohibited by law not to record voice mail.
Wiretapping Act prevents employers from “intercepted a
communication deliberately” How the Wiretap Act Protects
Personal Privacy, 2015). Access to the telephone system is
mainly for work-related activities. Occasional is acceptable as
long as there is not pattern of abuse. Any use of cell phone
cameras during work hours to protect the privacy of State of
Estates. Absolutely no cell phone usage while driving
company vehicles.
Social Media and Communications Monitoring
State of Estates supports social media sites that are used for
work purposes all postings and communications will be
monitored or ensure proper content. Company rules and policies
do apply any content that affects the company in a negative
manner will be addressed.
Federal Laws and Regulations. (n.d.). Retrieved July 17, 2017,
from SAMHSA.gov:
https://www.samhsa.gov/workplace/legal/federal-laws
How the Wiretap Act Protects Personal Privacy. (n.d.).
Retrieved July 17, 2017, from Communications-
media.lawyers.com: http://communications-
media.lawyers.com/privacy-law/wiretapping.html
Law Teacher. (2017). Retrieved from
https://www.lawteacher.net/acts/misuse-of-drugs-act-
1971.php
Managing Workplace Monitoring and Surveillance. (2016,
February 18). Retrieved July 17, 2017, from SHRM.org:
https://www.shrm.org/resourcesandtools/tools-and-
samples/toolkits/pages/workplaceprivacy.aspx
WorkSmart. (2017). Retrieved from
https://worksmart.org.uk/health-advice/health-and-
safety/employer-duties/what-health-and-safety-work-act
Employer Monitoring of Employees
Purpose
State of Estates believes in privacy, however monitoring
workplace activities is important to the integrity of the
company. Though some may be against employer monitoring, it
is an action that is allowed by law. State of Estates has to
protect itself, its customers, and its employees from litigation
and other actions that can be harmful to all parties. The
company will always stay within it business rights to not be
seen as privacy invasion.
Computer and Workstation
State of Estates has the right to monitor both an employee’s
computer and workstation. There is software provided and
managed by the IT department that allows computer terminals to
be viewed. Through this application, the company can
determine how the employee is managing work and what sites
are being frequented throughout the work day. State of Estates
owns the computer, and all related equipment, therefore
monitoring is legal. Although, notice is not required,
communication will be shared when monitoring is in effect.
Email
No employee, regardless of title or class should assume that
email correspondence is private. Anything electronically sent
across the company’s network can be monitored. This allows
the company to track efficiency and productivity of the
employees. Any misuse of company email or electronic
communication, puts State of Estates in jeopardy of litigation.
Internet Use
State of Estates has a strict policy on internet use. Websites
should not be visited that are inappropriate. The company has
blocking devices in place to notify the IT department when
access is attempted on sites that promote unlawful and
inappropriate content.
Telephone Calls
State of Estates is prohibited by law not to record voice mail.
Wiretapping Act prevents employers from “intercepted a
communication deliberately” (How the Wiretap Act Protects
Personal Privacy, n.d.).
Social Media Monitoring
State of Estates supports social media sites but does have a
policy about what should be written. Human Resources can
provide specific information regarding these policies.
Communication
State of Estate will communicate to its employees any cause of
action to monitor a specific issue. “Letting employees know
that they will be monitored removes employees' reasonable
expectation of privacy—the element that often forms the basis
for invasion of privacy lawsuits arising under common law”
(Managing Workplace Monitoring and Surveillance, 2016).
Certificate of Receipt of Workplace Privacy Policy
I, _______________ (employee name), certify that I have
received and understand the attached Workplace Privacy Policy,
on _________________ (today’s date).
References
How the Wiretap Act Protects Personal Privacy. (n.d.).
Retrieved July 17, 2017, from Communications-
media.lawyers.com: http://communications-
media.lawyers.com/privacy-law/wiretapping.html
Managing Workplace Monitoring and Surveillance. (2016,
February 18). Retrieved July 17, 2017, from SHRM.org:
https://www.shrm.org/resourcesandtools/tools-and-
samples/toolkits/pages/workplaceprivacy.aspx
Paper 2Employer Monitoring of EmployeesPurposeState of Estat.docx

More Related Content

Similar to Paper 2Employer Monitoring of EmployeesPurposeState of Estat.docx

Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxGogoOmolloFrancis
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Vijay Dalmia
 
Risk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docxRisk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docxSUBHI7
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIAAnish Rai
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy IntroductionG Prachi
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxsusanschei
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkGary Chambers
 
Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyKunal Sharma
 
Chapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxChapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxnorwinadriatico
 
Cyber fraud and Security - What risks does family office's face in today's wo...
Cyber fraud and Security - What risks does family office's face intoday's wo...Cyber fraud and Security - What risks does family office's face intoday's wo...
Cyber fraud and Security - What risks does family office's face in today's wo...Kannan Subbiah
 
Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.GissaMaeCastino
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docxBHANU281672
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docxlorainedeserre
 

Similar to Paper 2Employer Monitoring of EmployeesPurposeState of Estat.docx (19)

Ethical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docxEthical and security issues on MIS inte 322 assignment.docx
Ethical and security issues on MIS inte 322 assignment.docx
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
Risk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docxRisk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docx
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
CYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIACYBER Crime Cyber Security Cyber Law INDIA
CYBER Crime Cyber Security Cyber Law INDIA
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Data Privacy Introduction
Data Privacy IntroductionData Privacy Introduction
Data Privacy Introduction
 
Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Risk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at WorkRisk Insight - Employee Internet Usage at Work
Risk Insight - Employee Internet Usage at Work
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Defense Team's Security Policy
Cyber Defense Team's Security PolicyCyber Defense Team's Security Policy
Cyber Defense Team's Security Policy
 
Chapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptxChapter 4_Information, Control, and Privacy.pptx
Chapter 4_Information, Control, and Privacy.pptx
 
Cyber fraud and Security - What risks does family office's face in today's wo...
Cyber fraud and Security - What risks does family office's face intoday's wo...Cyber fraud and Security - What risks does family office's face intoday's wo...
Cyber fraud and Security - What risks does family office's face in today's wo...
 
Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.Cybercrime the use of computer as an instrument to further illegal ends.
Cybercrime the use of computer as an instrument to further illegal ends.
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 
3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx3202020 Originality Reporthttpsucumberlands.blackboar.docx
3202020 Originality Reporthttpsucumberlands.blackboar.docx
 

More from bunyansaturnina

Your tasks will be to answer questions based on the indicators that .docx
Your tasks will be to answer questions based on the indicators that .docxYour tasks will be to answer questions based on the indicators that .docx
Your tasks will be to answer questions based on the indicators that .docxbunyansaturnina
 
Your taskYou must identify a specific, local problem (eithe.docx
Your taskYou must identify a specific, local problem (eithe.docxYour taskYou must identify a specific, local problem (eithe.docx
Your taskYou must identify a specific, local problem (eithe.docxbunyansaturnina
 
Your taskis to analyze and evaluate how various types of medi.docx
Your taskis to analyze and evaluate how various types of medi.docxYour taskis to analyze and evaluate how various types of medi.docx
Your taskis to analyze and evaluate how various types of medi.docxbunyansaturnina
 
Your task this week is to check the internet and the Common Vulner.docx
Your task this week is to check the internet and the Common Vulner.docxYour task this week is to check the internet and the Common Vulner.docx
Your task this week is to check the internet and the Common Vulner.docxbunyansaturnina
 
Your task is to take unit I Will Survive Ecosystems and Adaptations.docx
Your task is to take unit I Will Survive Ecosystems and Adaptations.docxYour task is to take unit I Will Survive Ecosystems and Adaptations.docx
Your task is to take unit I Will Survive Ecosystems and Adaptations.docxbunyansaturnina
 
Your task is to perform and document encryption of Thunderbird Email.docx
Your task is to perform and document encryption of Thunderbird Email.docxYour task is to perform and document encryption of Thunderbird Email.docx
Your task is to perform and document encryption of Thunderbird Email.docxbunyansaturnina
 
Your task is to explain the process of the juvenile justice system a.docx
Your task is to explain the process of the juvenile justice system a.docxYour task is to explain the process of the juvenile justice system a.docx
Your task is to explain the process of the juvenile justice system a.docxbunyansaturnina
 
Your task is to create a journalistic profile that focuses on a .docx
Your task is to create a journalistic profile that focuses on a .docxYour task is to create a journalistic profile that focuses on a .docx
Your task is to create a journalistic profile that focuses on a .docxbunyansaturnina
 
Your task is to evaluate the available evidence on the social, emoti.docx
Your task is to evaluate the available evidence on the social, emoti.docxYour task is to evaluate the available evidence on the social, emoti.docx
Your task is to evaluate the available evidence on the social, emoti.docxbunyansaturnina
 
Your task is to conduct research on the ways that universities p.docx
Your task is to conduct research on the ways that universities p.docxYour task is to conduct research on the ways that universities p.docx
Your task is to conduct research on the ways that universities p.docxbunyansaturnina
 
Your task is to compare and contrast two artworks  given Below.docx
Your task is to compare and contrast two artworks  given Below.docxYour task is to compare and contrast two artworks  given Below.docx
Your task is to compare and contrast two artworks  given Below.docxbunyansaturnina
 
Your task is to create a personal essay that focuses on your per.docx
Your task is to create a personal essay that focuses on your per.docxYour task is to create a personal essay that focuses on your per.docx
Your task is to create a personal essay that focuses on your per.docxbunyansaturnina
 
Your Task is to Carry out an independent research study (.docx
Your Task is to Carry out an independent research study (.docxYour Task is to Carry out an independent research study (.docx
Your Task is to Carry out an independent research study (.docxbunyansaturnina
 
Your Research Project is due this week. It must consist of1. 5 .docx
Your Research Project is due this week. It must consist of1. 5 .docxYour Research Project is due this week. It must consist of1. 5 .docx
Your Research Project is due this week. It must consist of1. 5 .docxbunyansaturnina
 
Your supervisor wants the staff to understand the importance of.docx
Your supervisor wants the staff to understand the importance of.docxYour supervisor wants the staff to understand the importance of.docx
Your supervisor wants the staff to understand the importance of.docxbunyansaturnina
 
Your supervisor has asked you to create a new entity-relationship di.docx
Your supervisor has asked you to create a new entity-relationship di.docxYour supervisor has asked you to create a new entity-relationship di.docx
Your supervisor has asked you to create a new entity-relationship di.docxbunyansaturnina
 
Your supervisor asks you to lead a team of paralegals in the office .docx
Your supervisor asks you to lead a team of paralegals in the office .docxYour supervisor asks you to lead a team of paralegals in the office .docx
Your supervisor asks you to lead a team of paralegals in the office .docxbunyansaturnina
 
Your research paper final must be written using APA style and incl.docx
Your research paper final must be written using APA style and incl.docxYour research paper final must be written using APA style and incl.docx
Your research paper final must be written using APA style and incl.docxbunyansaturnina
 
Your submission should be a PowerPoint slide presentation with 1.docx
Your submission should be a PowerPoint slide presentation with 1.docxYour submission should be a PowerPoint slide presentation with 1.docx
Your submission should be a PowerPoint slide presentation with 1.docxbunyansaturnina
 
your research must includeExecutive summaryAbstractP.docx
your research must includeExecutive summaryAbstractP.docxyour research must includeExecutive summaryAbstractP.docx
your research must includeExecutive summaryAbstractP.docxbunyansaturnina
 

More from bunyansaturnina (20)

Your tasks will be to answer questions based on the indicators that .docx
Your tasks will be to answer questions based on the indicators that .docxYour tasks will be to answer questions based on the indicators that .docx
Your tasks will be to answer questions based on the indicators that .docx
 
Your taskYou must identify a specific, local problem (eithe.docx
Your taskYou must identify a specific, local problem (eithe.docxYour taskYou must identify a specific, local problem (eithe.docx
Your taskYou must identify a specific, local problem (eithe.docx
 
Your taskis to analyze and evaluate how various types of medi.docx
Your taskis to analyze and evaluate how various types of medi.docxYour taskis to analyze and evaluate how various types of medi.docx
Your taskis to analyze and evaluate how various types of medi.docx
 
Your task this week is to check the internet and the Common Vulner.docx
Your task this week is to check the internet and the Common Vulner.docxYour task this week is to check the internet and the Common Vulner.docx
Your task this week is to check the internet and the Common Vulner.docx
 
Your task is to take unit I Will Survive Ecosystems and Adaptations.docx
Your task is to take unit I Will Survive Ecosystems and Adaptations.docxYour task is to take unit I Will Survive Ecosystems and Adaptations.docx
Your task is to take unit I Will Survive Ecosystems and Adaptations.docx
 
Your task is to perform and document encryption of Thunderbird Email.docx
Your task is to perform and document encryption of Thunderbird Email.docxYour task is to perform and document encryption of Thunderbird Email.docx
Your task is to perform and document encryption of Thunderbird Email.docx
 
Your task is to explain the process of the juvenile justice system a.docx
Your task is to explain the process of the juvenile justice system a.docxYour task is to explain the process of the juvenile justice system a.docx
Your task is to explain the process of the juvenile justice system a.docx
 
Your task is to create a journalistic profile that focuses on a .docx
Your task is to create a journalistic profile that focuses on a .docxYour task is to create a journalistic profile that focuses on a .docx
Your task is to create a journalistic profile that focuses on a .docx
 
Your task is to evaluate the available evidence on the social, emoti.docx
Your task is to evaluate the available evidence on the social, emoti.docxYour task is to evaluate the available evidence on the social, emoti.docx
Your task is to evaluate the available evidence on the social, emoti.docx
 
Your task is to conduct research on the ways that universities p.docx
Your task is to conduct research on the ways that universities p.docxYour task is to conduct research on the ways that universities p.docx
Your task is to conduct research on the ways that universities p.docx
 
Your task is to compare and contrast two artworks  given Below.docx
Your task is to compare and contrast two artworks  given Below.docxYour task is to compare and contrast two artworks  given Below.docx
Your task is to compare and contrast two artworks  given Below.docx
 
Your task is to create a personal essay that focuses on your per.docx
Your task is to create a personal essay that focuses on your per.docxYour task is to create a personal essay that focuses on your per.docx
Your task is to create a personal essay that focuses on your per.docx
 
Your Task is to Carry out an independent research study (.docx
Your Task is to Carry out an independent research study (.docxYour Task is to Carry out an independent research study (.docx
Your Task is to Carry out an independent research study (.docx
 
Your Research Project is due this week. It must consist of1. 5 .docx
Your Research Project is due this week. It must consist of1. 5 .docxYour Research Project is due this week. It must consist of1. 5 .docx
Your Research Project is due this week. It must consist of1. 5 .docx
 
Your supervisor wants the staff to understand the importance of.docx
Your supervisor wants the staff to understand the importance of.docxYour supervisor wants the staff to understand the importance of.docx
Your supervisor wants the staff to understand the importance of.docx
 
Your supervisor has asked you to create a new entity-relationship di.docx
Your supervisor has asked you to create a new entity-relationship di.docxYour supervisor has asked you to create a new entity-relationship di.docx
Your supervisor has asked you to create a new entity-relationship di.docx
 
Your supervisor asks you to lead a team of paralegals in the office .docx
Your supervisor asks you to lead a team of paralegals in the office .docxYour supervisor asks you to lead a team of paralegals in the office .docx
Your supervisor asks you to lead a team of paralegals in the office .docx
 
Your research paper final must be written using APA style and incl.docx
Your research paper final must be written using APA style and incl.docxYour research paper final must be written using APA style and incl.docx
Your research paper final must be written using APA style and incl.docx
 
Your submission should be a PowerPoint slide presentation with 1.docx
Your submission should be a PowerPoint slide presentation with 1.docxYour submission should be a PowerPoint slide presentation with 1.docx
Your submission should be a PowerPoint slide presentation with 1.docx
 
your research must includeExecutive summaryAbstractP.docx
your research must includeExecutive summaryAbstractP.docxyour research must includeExecutive summaryAbstractP.docx
your research must includeExecutive summaryAbstractP.docx
 

Recently uploaded

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 

Recently uploaded (20)

OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 

Paper 2Employer Monitoring of EmployeesPurposeState of Estat.docx

  • 1. Paper 2 Employer Monitoring of Employees Purpose State of Estates will be tracking or monitoring all employee usage of internet, tablets, desk and lap tops computers, emails, cell phones and social media usage. This is to protect the reputation of our organization from deter any liability as well as to avoid misuse of company assets. Monitoring the daily activities of the employees and it is legal and will not overstep when it comes to anyone’s privacy. Any suspicious activity will be investigated and the proper authorities will be notified. Internet Access, Email and the Right to Monitor State of Estates provides Internet access that is to be used solely for work related activities and approved training sessions. We have an IT department that monitors all activity from the Internet and email. The Email system is property of State of Estates and it will be archived in the server according to our retention policy. Please note that we use filters to block spam and viruses to that could destroy our entire system. State of Estates purchases all work related equipment so we have the legal right to monitor anything that has been sent or received on the company’s intranet - without prior notification. Violation of Policy State of Estates reserve the right to monitor employ logs and activity of usage. Our organization must stay in compliance with the law and our policy. If it is found that any employee has violated the rules you may face disciplinary action that could lead to termination up to prison. Telephone Calls and Cellular Usage State of Estates is prohibited by law not to record voice mail. Wiretapping Act prevents employers from “intercepted a communication deliberately” How the Wiretap Act Protects Personal Privacy, 2015). Access to the telephone system is mainly for work-related activities. Occasional is acceptable as
  • 2. long as there is not pattern of abuse. Any use of cell phone cameras during work hours to protect the privacy of State of Estates. Absolutely no cell phone usage while driving company vehicles. Social Media and Communications Monitoring State of Estates supports social media sites that are used for work purposes all postings and communications will be monitored or ensure proper content. Company rules and policies do apply any content that affects the company in a negative manner will be addressed. Federal Laws and Regulations. (n.d.). Retrieved July 17, 2017, from SAMHSA.gov: https://www.samhsa.gov/workplace/legal/federal-laws How the Wiretap Act Protects Personal Privacy. (n.d.). Retrieved July 17, 2017, from Communications- media.lawyers.com: http://communications- media.lawyers.com/privacy-law/wiretapping.html Law Teacher. (2017). Retrieved from https://www.lawteacher.net/acts/misuse-of-drugs-act- 1971.php Managing Workplace Monitoring and Surveillance. (2016, February 18). Retrieved July 17, 2017, from SHRM.org: https://www.shrm.org/resourcesandtools/tools-and- samples/toolkits/pages/workplaceprivacy.aspx WorkSmart. (2017). Retrieved from https://worksmart.org.uk/health-advice/health-and- safety/employer-duties/what-health-and-safety-work-act Employer Monitoring of Employees Purpose State of Estates believes in privacy, however monitoring workplace activities is important to the integrity of the company. Though some may be against employer monitoring, it
  • 3. is an action that is allowed by law. State of Estates has to protect itself, its customers, and its employees from litigation and other actions that can be harmful to all parties. The company will always stay within it business rights to not be seen as privacy invasion. Computer and Workstation State of Estates has the right to monitor both an employee’s computer and workstation. There is software provided and managed by the IT department that allows computer terminals to be viewed. Through this application, the company can determine how the employee is managing work and what sites are being frequented throughout the work day. State of Estates owns the computer, and all related equipment, therefore monitoring is legal. Although, notice is not required, communication will be shared when monitoring is in effect. Email No employee, regardless of title or class should assume that email correspondence is private. Anything electronically sent across the company’s network can be monitored. This allows the company to track efficiency and productivity of the employees. Any misuse of company email or electronic communication, puts State of Estates in jeopardy of litigation. Internet Use State of Estates has a strict policy on internet use. Websites should not be visited that are inappropriate. The company has blocking devices in place to notify the IT department when access is attempted on sites that promote unlawful and inappropriate content. Telephone Calls State of Estates is prohibited by law not to record voice mail. Wiretapping Act prevents employers from “intercepted a communication deliberately” (How the Wiretap Act Protects Personal Privacy, n.d.). Social Media Monitoring State of Estates supports social media sites but does have a policy about what should be written. Human Resources can
  • 4. provide specific information regarding these policies. Communication State of Estate will communicate to its employees any cause of action to monitor a specific issue. “Letting employees know that they will be monitored removes employees' reasonable expectation of privacy—the element that often forms the basis for invasion of privacy lawsuits arising under common law” (Managing Workplace Monitoring and Surveillance, 2016). Certificate of Receipt of Workplace Privacy Policy I, _______________ (employee name), certify that I have received and understand the attached Workplace Privacy Policy, on _________________ (today’s date). References How the Wiretap Act Protects Personal Privacy. (n.d.). Retrieved July 17, 2017, from Communications- media.lawyers.com: http://communications- media.lawyers.com/privacy-law/wiretapping.html Managing Workplace Monitoring and Surveillance. (2016, February 18). Retrieved July 17, 2017, from SHRM.org: https://www.shrm.org/resourcesandtools/tools-and- samples/toolkits/pages/workplaceprivacy.aspx