ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

Workplace Privacy

Essay by   •  March 7, 2011  •  Essay  •  411 Words (2 Pages)  •  1,042 Views

Essay Preview: Workplace Privacy

Report this essay
Page 1 of 2

Workplace Privacy

Privacy in the workplace is a controversial issue. The expectation of privacy in the workplace man not be the same as elsewhere. Employers hire an employee to do a job and to perform necessary services. An employer has a right to monitor an employee's performance. Employers need to monitor employee's performance and have access to information that must legitimately be related to employment purposes.

Employee Monitoring

The tradition of employers watching over employees has changed with an increase in technology. The ability to monitor email, phone conversations, voicemail, and instant messages has decreased the privacy of employees in the workplace. Monitoring employees electronically allows employers to probe more deeply into the employee's lives. Bosses are able to watch work habits more closely than ever before.

Ð'* Increasing levels of stress and decreasing motivation and trust result from the excessive monitoring of employee work

Ð'* Employee's feeling are related to dignity, trust, respect, autonomy, and individuality

Ð'* Invasions of privacy occur and employees feeling change

Ð'* Employees feel that self-worth, morale, and overall quality of working life are eroded

Ð'* Negative impact of invasions of privacy on work quality and productivity is hidden human and real cost, not often calculated by employers

Other Means of Workplace Privacy Invasion

Employers monitor the activities of their employees is to covertly access their electronic mail (e-mail) communications. People operate under the mistaken belief that e-mail is confidential and secure. Staff should be informed about the realities of e-mail security.

Ð'* Employers have a right to see what their employees are doing and how they are spending their time on the job

Ð'* Employees should be told this is happening and how it is happening

Ð'* The security of e-mail is similar to a postcard: both are open and accessible to being read by third parties

...

...

Download as:   txt (2.2 Kb)   pdf (53 Kb)   docx (9.5 Kb)  
Continue for 1 more page »
Only available on ReviewEssays.com