SlideShare a Scribd company logo
1 of 7
JEREMY AND JEANNETTE
CASE
 By: Michael Perez
 Instructor: Gina Riestra
 MGT 3610 Human Resource Management
 Polytechnic University of Puerto Rico
Does Jeremy have a right to privacy
in his personal computer at work?


 Jeremy have the right to protect his privacy of his
  personal computer because the machine belong
  to him.
Does it matter that the employer has
policy prohibiting personal Internet
surfing?

Employer has the right to of prohibiting
 personal internet surfing because employer
 lost money, employee lost productivity

Possibility that a user will use enterprise
 property to download viruses, transmit
 sensitive company information, or use
 enterprise property to break the law.
Does the fact that Jeremy works for a
government employer make a difference in terms
of the law to be applied to the analysis? If so,
what difference does it make?

 He is at work he and the policy say “electronic
  communications are monitored need”.

 In government workplace are something warrantless for
  search and monitory privacy, when you violating the policy
  and break the law not matter if is your personal computer

 As a general rule, a government employee would continue
  to have an expectation of privacy in his or her personal
  belongings that have been brought into the workplace
  environment.
If Jeremy is indeed going to
pornographic sites and a colleague
objects, does Jeremy’s behavior expose
the employer to liability?

 If Jeremy is indeed going to porno site, employer can take
  a disciplinary action against for his behavior and sexual
  harassment complaint.

 The company need blocked pornographic site for this kind
  of issue don’t happen in the future.

 Make the prohibited of the use of personal computer at
 work.
Bibliography

 Maidment, F. (2011). Annual Editions: Human Resources 10/11
  (19th Edition ed.). (F. Maidment, Ed.) McGraw-Hill Higher
  Education.

 Lemons, B. R. (n.d.). Warrantless Workplace Searches of
  Government Employees.       Retrieved 8 26, 2011, from Warrantless
  Workplace Searches of Government Employees:
  www.khodges.com/iacp/GovernmentEmployeeSearches.doc

More Related Content

What's hot

The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingDan Michaluk
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplaceBailey and Wyant PLLC
 
Uop hrm 420 week 1 assignment privacy concerns scenario new
Uop hrm 420 week 1 assignment privacy concerns scenario newUop hrm 420 week 1 assignment privacy concerns scenario new
Uop hrm 420 week 1 assignment privacy concerns scenario neweyavagal
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereKelly Savage
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Case IQ
 
Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsEnergy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsAmy Shriner
 
Social Media in California: Policing Workers Online
Social Media in California: Policing Workers OnlineSocial Media in California: Policing Workers Online
Social Media in California: Policing Workers OnlineAllen Matkins
 
Uop hrm 420 week 1 assignment privacy concerns scenario new
Uop hrm 420 week 1 assignment privacy concerns scenario newUop hrm 420 week 1 assignment privacy concerns scenario new
Uop hrm 420 week 1 assignment privacy concerns scenario newvindaniel123
 
Employers and Social Media: You Love to Love It & Love to Hate It
Employers and Social Media:  You Love to Love It & Love to Hate ItEmployers and Social Media:  You Love to Love It & Love to Hate It
Employers and Social Media: You Love to Love It & Love to Hate ItJanine Anthony Bowen, Esq.
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy PresentationSarah Forbes
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Anirudhya Reevu
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationChristina Gagnier
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Shawn Tuma
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technologyWish Mrt'xa
 

What's hot (20)

The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computingThe ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
 
Privacy and social media in the workplace
Privacy and social media in the workplacePrivacy and social media in the workplace
Privacy and social media in the workplace
 
Cyber ethics
Cyber ethicsCyber ethics
Cyber ethics
 
Internet Misuse inside the Company
Internet Misuse inside the CompanyInternet Misuse inside the Company
Internet Misuse inside the Company
 
Uop hrm 420 week 1 assignment privacy concerns scenario new
Uop hrm 420 week 1 assignment privacy concerns scenario newUop hrm 420 week 1 assignment privacy concerns scenario new
Uop hrm 420 week 1 assignment privacy concerns scenario new
 
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and BlogosphereEmployee Misuse of Internet and Blogosphere
Employee Misuse of Internet and Blogosphere
 
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
 
Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsEnergy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities Pittfalls
 
Social Media in California: Policing Workers Online
Social Media in California: Policing Workers OnlineSocial Media in California: Policing Workers Online
Social Media in California: Policing Workers Online
 
Uop hrm 420 week 1 assignment privacy concerns scenario new
Uop hrm 420 week 1 assignment privacy concerns scenario newUop hrm 420 week 1 assignment privacy concerns scenario new
Uop hrm 420 week 1 assignment privacy concerns scenario new
 
Fact Pattern Analysis
Fact Pattern AnalysisFact Pattern Analysis
Fact Pattern Analysis
 
Employers and Social Media: You Love to Love It & Love to Hate It
Employers and Social Media:  You Love to Love It & Love to Hate ItEmployers and Social Media:  You Love to Love It & Love to Hate It
Employers and Social Media: You Love to Love It & Love to Hate It
 
Workplace Privacy
Workplace PrivacyWorkplace Privacy
Workplace Privacy
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy Presentation
 
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
 
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago PresentationGagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
 
Electronic defamation
Electronic defamationElectronic defamation
Electronic defamation
 
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
 
Social Media Risk Management – Part 2
Social Media Risk Management – Part 2Social Media Risk Management – Part 2
Social Media Risk Management – Part 2
 
Ethical implications of information technology
Ethical implications of information technologyEthical implications of information technology
Ethical implications of information technology
 

Viewers also liked

Viewers also liked (12)

Owensboro
OwensboroOwensboro
Owensboro
 
թուրքիա
թուրքիաթուրքիա
թուրքիա
 
Oval
OvalOval
Oval
 
Armstrong Resume
Armstrong ResumeArmstrong Resume
Armstrong Resume
 
Celostot 1
Celostot 1Celostot 1
Celostot 1
 
Cuadro de referencia
Cuadro de referencia Cuadro de referencia
Cuadro de referencia
 
Northrop Grumman
Northrop GrummanNorthrop Grumman
Northrop Grumman
 
Como saber si es el chico indicado
Como saber si es el chico indicadoComo saber si es el chico indicado
Como saber si es el chico indicado
 
Varsity College
Varsity CollegeVarsity College
Varsity College
 
Deere ROI Case Study
Deere ROI Case StudyDeere ROI Case Study
Deere ROI Case Study
 
իրան
իրանիրան
իրան
 
Newspaper articles
Newspaper articlesNewspaper articles
Newspaper articles
 

Similar to Jeremy and jeannette case

Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxsusanschei
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)hassan777898
 
spy after employees
spy after employeesspy after employees
spy after employeesJuscutum
 
Read Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxRead Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxleonorepour284
 
Social Media and the Workplace
Social Media and the WorkplaceSocial Media and the Workplace
Social Media and the WorkplaceAllisha Anderson
 
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxChapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxbartholomeocoombs
 
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docx
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docxRunning head EMPLOYEE WORKPLACE PRIVACY 1 .docx
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docxjeanettehully
 
Chapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxChapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxketurahhazelhurst
 
Chapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxChapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxbartholomeocoombs
 
Privacy Slideshow
Privacy SlideshowPrivacy Slideshow
Privacy Slideshowkatsan11
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technohoney690131
 
Employee extortion
Employee extortionEmployee extortion
Employee extortionrhey02
 
NET 303 Policy Primer
NET 303 Policy PrimerNET 303 Policy Primer
NET 303 Policy PrimerBrett Elphick
 
Social media
Social mediaSocial media
Social mediaSheila A
 
Employment Law and the Bottom Line
Employment Law and the Bottom LineEmployment Law and the Bottom Line
Employment Law and the Bottom LineCBIZ, Inc.
 
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docxPaper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docxsmile790243
 
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyAmy Larrimore
 

Similar to Jeremy and jeannette case (18)

Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
 
Business communication (zayani)
Business communication (zayani)Business communication (zayani)
Business communication (zayani)
 
spy after employees
spy after employeesspy after employees
spy after employees
 
Read Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxRead Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docx
 
Social Media and the Workplace
Social Media and the WorkplaceSocial Media and the Workplace
Social Media and the Workplace
 
IS201 facebook
IS201 facebookIS201 facebook
IS201 facebook
 
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docxChapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
 
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docx
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docxRunning head EMPLOYEE WORKPLACE PRIVACY 1 .docx
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docx
 
Chapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxChapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docx
 
Chapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docxChapter 14 The Employee’s Right to Privacy and Management of.docx
Chapter 14 The Employee’s Right to Privacy and Management of.docx
 
Privacy Slideshow
Privacy SlideshowPrivacy Slideshow
Privacy Slideshow
 
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking technoArticle 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
 
Employee extortion
Employee extortionEmployee extortion
Employee extortion
 
NET 303 Policy Primer
NET 303 Policy PrimerNET 303 Policy Primer
NET 303 Policy Primer
 
Social media
Social mediaSocial media
Social media
 
Employment Law and the Bottom Line
Employment Law and the Bottom LineEmployment Law and the Bottom Line
Employment Law and the Bottom Line
 
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docxPaper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
 
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based TechnologyEverything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based Technology
 

Jeremy and jeannette case

  • 1. JEREMY AND JEANNETTE CASE By: Michael Perez Instructor: Gina Riestra MGT 3610 Human Resource Management Polytechnic University of Puerto Rico
  • 2. Does Jeremy have a right to privacy in his personal computer at work? Jeremy have the right to protect his privacy of his personal computer because the machine belong to him.
  • 3. Does it matter that the employer has policy prohibiting personal Internet surfing? Employer has the right to of prohibiting personal internet surfing because employer lost money, employee lost productivity Possibility that a user will use enterprise property to download viruses, transmit sensitive company information, or use enterprise property to break the law.
  • 4. Does the fact that Jeremy works for a government employer make a difference in terms of the law to be applied to the analysis? If so, what difference does it make?  He is at work he and the policy say “electronic communications are monitored need”.  In government workplace are something warrantless for search and monitory privacy, when you violating the policy and break the law not matter if is your personal computer  As a general rule, a government employee would continue to have an expectation of privacy in his or her personal belongings that have been brought into the workplace environment.
  • 5.
  • 6. If Jeremy is indeed going to pornographic sites and a colleague objects, does Jeremy’s behavior expose the employer to liability?  If Jeremy is indeed going to porno site, employer can take a disciplinary action against for his behavior and sexual harassment complaint.  The company need blocked pornographic site for this kind of issue don’t happen in the future.  Make the prohibited of the use of personal computer at work.
  • 7. Bibliography  Maidment, F. (2011). Annual Editions: Human Resources 10/11 (19th Edition ed.). (F. Maidment, Ed.) McGraw-Hill Higher Education.  Lemons, B. R. (n.d.). Warrantless Workplace Searches of Government Employees. Retrieved 8 26, 2011, from Warrantless Workplace Searches of Government Employees: www.khodges.com/iacp/GovernmentEmployeeSearches.doc