SlideShare uma empresa Scribd logo
1 de 51
E-Mail and Internet
 Privacy at Work
E-Mail and Internet Issues


Cyber-loafing accounts for 30% to
40% of lost worker productivity.
E-Mail and Internet Issues


As much as 70% of traffic on porn
sites occurs during work hours.
E-Mail and Internet Issues


Check your company’s policy on
e-mail and Internet use at work.
Employer Policies
Employer Policies


Be aware of your company’s employee
conduct policy.
Employer Policies


Your company reserves the right to
read and monitor all communications
made by employees at work.
Employer Policies


An employee conduct policy restricts
personal use of company property to
“reasonable” use.
Employer Policies


Some companies prohibit any personal
use, which is perfectly legal.
Employer Policies


The use of company resources
is subject to the company’s
no-harassment and
no-discrimination policies.
Employer Policies


Nearly three-fourths of major
U.S. companies are recording and
reviewing some aspect of their
employees’ communications.
Employer Policies


About 40% of companies are using
Web-monitoring software to record
and track employees’ Web activities.
The Law
The Law


The courts have generally upheld an
employer’s right to review or monitor
their employees’ use of Internet and
e-mail.
The Law


Employees don’t have an expectation of
privacy even when the company assures
it will not intercept communications.
The Law


Because all communication equipment
belongs to the employer, it has the
right to access and review information
on it.
Lawsuits
Lawsuits


A major newspaper fired 23
employees for e-mailing distasteful
jokes.
Lawsuits


A major chemical company fired 50
workers and disciplined 200 more for
transmitting pornography through
employee e-mail.
Lawsuits


Work-related e-mails on someone’s
home computer were subpoenaed in a
lawsuit involving a major airline.
Lawsuits


E-mail has become one of the richest
sources of information used against
employers and managers in lawsuits.
Lawsuits


E-mail that contains discriminatory or
sexually harassing material is
becoming commonplace at work.
Lawsuits


It generally takes more than one
e-mail to support a claim of a hostile
environment in a court of law.
Productivity: A Big Issue
Productivity: A Big Issue


As many as 70% of a leading
brokerage firm’s customers do their
online trading from their office desks.
Productivity: A Big Issue


Productivity could potentially become
the biggest casualty of indiscriminate
Internet use.
Productivity: A Big Issue


Know and stay within your company’s
guidelines for e-mail and Internet use.
Productivity: A Big Issue


Be aware that e-mail and Internet use
can add up and eventually show up in
your company’s monitoring system.
Productivity: A Big Issue


Check your company policy for
guidelines of e-mail and Internet use.
Productivity: A Big Issue


Take personal responsibility for how
you spend your time.
Using Others’ Equipment
Using Others’ Equipment


Never log on to a system as someone
else.
Using Others’ Equipment


Never log on to someone else’s hard
drive or access his or her system
without approval.
Summary of Risks
Summary of Risks


It is your responsibility to examine the
contents of your communications.
Summary of Risks


Ensure your communications do not
violate the policies of your employer.
Summary of Risks


Be aware that anything that passes
through your fingertips into
cyberspace may be discovered.
Summary of Risks


Your employer owns your e-mail and
Internet resources and can legally use
them to find out information about
you.
Summary of Risks


Your employer’s resources are to be
used productively.
Summary of Risks


Redirecting those resources excessively
towards personal use not aligned with
the company’s goal may result in
termination.
Staying Out of Trouble
Staying Out of Trouble


Read your company’s e-mail and
Internet policy.
Staying Out of Trouble


Assume your boss is reading your
e-mail or looking over your Web usage.
Staying Out of Trouble


Do not send jokes or subscribe to a joke
list at work.
Staying Out of Trouble


Start limiting your time spent on
personal usage of the Web, including
e-mail.
Staying Out of Trouble


Avoid emotional comments and
sarcasm. Focus on objective, verifiable
facts.
Staying Out of Trouble


Do not e-mail employee problems to
human resources or management. Call
instead.
The Family Test


Ask yourself whether you’d be saying
or doing the same thing in front of
your family.
The Newspaper Test


Would you say or do the same thing
even if it was published on the front
page of the newspaper?
Staying Out of Trouble


Nearly one-third of companies in a poll
have fired workers for improper
Internet use, and two-thirds have had to
do some disciplining.
E-Mail and Internet
 Privacy at Work

Mais conteúdo relacionado

Mais procurados

USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities Presentation
Armstrong Teasdale
 
Social media
Social mediaSocial media
Social media
Sheila A
 
Case study presentation
Case study presentationCase study presentation
Case study presentation
englettk
 
Email And Social Networking
Email And Social NetworkingEmail And Social Networking
Email And Social Networking
Heather Grimes
 
A lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issuesA lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issues
Andres Baytelman
 
A lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesA lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issues
Errol A. Adams, J.D., M.L.S.
 
Lack of Reasonable Privacy Expectation in Corporate Email
Lack of Reasonable Privacy Expectation in Corporate EmailLack of Reasonable Privacy Expectation in Corporate Email
Lack of Reasonable Privacy Expectation in Corporate Email
Andres Baytelman
 

Mais procurados (20)

USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities Presentation
 
Workplace Privacy
Workplace PrivacyWorkplace Privacy
Workplace Privacy
 
Final powerpoint for social media club program
Final  powerpoint for social media club programFinal  powerpoint for social media club program
Final powerpoint for social media club program
 
My E-mail appears as spam | The 7 major reasons | Part 5#17
My E-mail appears as spam | The 7 major reasons | Part 5#17My E-mail appears as spam | The 7 major reasons | Part 5#17
My E-mail appears as spam | The 7 major reasons | Part 5#17
 
Social media
Social mediaSocial media
Social media
 
Case study presentation
Case study presentationCase study presentation
Case study presentation
 
Email And Social Networking
Email And Social NetworkingEmail And Social Networking
Email And Social Networking
 
A lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issuesA lawyer’s guide to the top 13 social media issues
A lawyer’s guide to the top 13 social media issues
 
A lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesA lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issues
 
Workplace Privacy Presentation
Workplace Privacy PresentationWorkplace Privacy Presentation
Workplace Privacy Presentation
 
Gdpr compliance critical changes
Gdpr compliance critical changesGdpr compliance critical changes
Gdpr compliance critical changes
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?
 
Lack of Reasonable Privacy Expectation in Corporate Email
Lack of Reasonable Privacy Expectation in Corporate EmailLack of Reasonable Privacy Expectation in Corporate Email
Lack of Reasonable Privacy Expectation in Corporate Email
 
Smarsh Archiving for Financial Services: Retaining and supervising electronic...
Smarsh Archiving for Financial Services: Retaining and supervising electronic...Smarsh Archiving for Financial Services: Retaining and supervising electronic...
Smarsh Archiving for Financial Services: Retaining and supervising electronic...
 
Social Media: Critical Issues for Employers
Social Media: Critical Issues for EmployersSocial Media: Critical Issues for Employers
Social Media: Critical Issues for Employers
 
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawPrivacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
 
Employee use of social media - chapter 3. Protecting Confidential Information.
Employee use of social media - chapter 3. Protecting Confidential Information.Employee use of social media - chapter 3. Protecting Confidential Information.
Employee use of social media - chapter 3. Protecting Confidential Information.
 
spy after employees
spy after employeesspy after employees
spy after employees
 
Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017Internet Fraud #scichallenge2017
Internet Fraud #scichallenge2017
 
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...
Grow Revenue: Get Online and Boost Sales Oct. 28, 2013 - Social Media in the ...
 

Semelhante a Workplace environment e-mail_and_internet_privacy_at_work

Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and Beyond
AlexNemiroff
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
healdkathaleen
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
UMaine
 
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010
Employers Association of New Jersey
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
susanschei
 
Read Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxRead Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docx
leonorepour284
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
UMaine
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Vijay Dalmia
 

Semelhante a Workplace environment e-mail_and_internet_privacy_at_work (20)

Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
 
Liabilty
LiabiltyLiabilty
Liabilty
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and Beyond
 
Social media policy
Social media policySocial media policy
Social media policy
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
Sustainable Work Practices: Keeping the Staff Afloat
Sustainable Work Practices: Keeping the Staff AfloatSustainable Work Practices: Keeping the Staff Afloat
Sustainable Work Practices: Keeping the Staff Afloat
 
Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Company code of conduct (IT related)
Company code of conduct (IT related)Company code of conduct (IT related)
Company code of conduct (IT related)
 
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010
Workplace Monitoring After Stengart v. Loving Care Agency, April 14, 2010
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
 
Read Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxRead Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docx
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Staff newsletter
Staff newsletterStaff newsletter
Staff newsletter
 
Stacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the LawStacy Robin - The Degania Group - Technology and the Law
Stacy Robin - The Degania Group - Technology and the Law
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 
Managing Social Media in the Workplace
Managing Social Media in the WorkplaceManaging Social Media in the Workplace
Managing Social Media in the Workplace
 

Mais de Shankar Myadharaveni

Self management working-wounded_performance_appraisals
Self management working-wounded_performance_appraisalsSelf management working-wounded_performance_appraisals
Self management working-wounded_performance_appraisals
Shankar Myadharaveni
 
Self management working-wounded_office_politics
Self management working-wounded_office_politicsSelf management working-wounded_office_politics
Self management working-wounded_office_politics
Shankar Myadharaveni
 
Self management working-wounded_getting_more_work_done
Self management working-wounded_getting_more_work_doneSelf management working-wounded_getting_more_work_done
Self management working-wounded_getting_more_work_done
Shankar Myadharaveni
 
Self management the-influence_edge_model
Self management the-influence_edge_modelSelf management the-influence_edge_model
Self management the-influence_edge_model
Shankar Myadharaveni
 
Self management the-influence_edge_and_change
Self management the-influence_edge_and_changeSelf management the-influence_edge_and_change
Self management the-influence_edge_and_change
Shankar Myadharaveni
 
Self management the-dynamics_of_self-talk_(interview)
Self management the-dynamics_of_self-talk_(interview)Self management the-dynamics_of_self-talk_(interview)
Self management the-dynamics_of_self-talk_(interview)
Shankar Myadharaveni
 
Self management self-talk-first_aid_kit
Self management self-talk-first_aid_kitSelf management self-talk-first_aid_kit
Self management self-talk-first_aid_kit
Shankar Myadharaveni
 
Self management self-motivation-through_self-talk
Self management self-motivation-through_self-talkSelf management self-motivation-through_self-talk
Self management self-motivation-through_self-talk
Shankar Myadharaveni
 
Self management goal-setting_and_action_planning
Self management goal-setting_and_action_planningSelf management goal-setting_and_action_planning
Self management goal-setting_and_action_planning
Shankar Myadharaveni
 
Self management dealing-with_non-stop_change
Self management dealing-with_non-stop_changeSelf management dealing-with_non-stop_change
Self management dealing-with_non-stop_change
Shankar Myadharaveni
 
Self management creative-time_management_for_the_new_millennium
Self management creative-time_management_for_the_new_millenniumSelf management creative-time_management_for_the_new_millennium
Self management creative-time_management_for_the_new_millennium
Shankar Myadharaveni
 
Self management becoming-more_assertive
Self management becoming-more_assertiveSelf management becoming-more_assertive
Self management becoming-more_assertive
Shankar Myadharaveni
 
Communication curing common_meeting_ailments_(interview)
Communication curing common_meeting_ailments_(interview)Communication curing common_meeting_ailments_(interview)
Communication curing common_meeting_ailments_(interview)
Shankar Myadharaveni
 
Coaching performance coaching_training
Coaching performance coaching_trainingCoaching performance coaching_training
Coaching performance coaching_training
Shankar Myadharaveni
 

Mais de Shankar Myadharaveni (20)

Who moved-my-cheese131
Who moved-my-cheese131Who moved-my-cheese131
Who moved-my-cheese131
 
Telephone handling -anil
Telephone handling -anilTelephone handling -anil
Telephone handling -anil
 
Solve a problem
Solve a problemSolve a problem
Solve a problem
 
Self management working-wounded_performance_appraisals
Self management working-wounded_performance_appraisalsSelf management working-wounded_performance_appraisals
Self management working-wounded_performance_appraisals
 
Self management working-wounded_office_politics
Self management working-wounded_office_politicsSelf management working-wounded_office_politics
Self management working-wounded_office_politics
 
Self management working-wounded_getting_more_work_done
Self management working-wounded_getting_more_work_doneSelf management working-wounded_getting_more_work_done
Self management working-wounded_getting_more_work_done
 
Self management the-influence_edge_model
Self management the-influence_edge_modelSelf management the-influence_edge_model
Self management the-influence_edge_model
 
Self management the-influence_edge_and_change
Self management the-influence_edge_and_changeSelf management the-influence_edge_and_change
Self management the-influence_edge_and_change
 
Self management the-dynamics_of_self-talk_(interview)
Self management the-dynamics_of_self-talk_(interview)Self management the-dynamics_of_self-talk_(interview)
Self management the-dynamics_of_self-talk_(interview)
 
Self management self-talk-first_aid_kit
Self management self-talk-first_aid_kitSelf management self-talk-first_aid_kit
Self management self-talk-first_aid_kit
 
Self management self-motivation-through_self-talk
Self management self-motivation-through_self-talkSelf management self-motivation-through_self-talk
Self management self-motivation-through_self-talk
 
Self management leap-of_faith
Self management leap-of_faithSelf management leap-of_faith
Self management leap-of_faith
 
Self management goal-setting_and_action_planning
Self management goal-setting_and_action_planningSelf management goal-setting_and_action_planning
Self management goal-setting_and_action_planning
 
Self management dealing-with_non-stop_change
Self management dealing-with_non-stop_changeSelf management dealing-with_non-stop_change
Self management dealing-with_non-stop_change
 
Self management creative-time_management_for_the_new_millennium
Self management creative-time_management_for_the_new_millenniumSelf management creative-time_management_for_the_new_millennium
Self management creative-time_management_for_the_new_millennium
 
Self management business-protocol
Self management business-protocolSelf management business-protocol
Self management business-protocol
 
Self management becoming-more_assertive
Self management becoming-more_assertiveSelf management becoming-more_assertive
Self management becoming-more_assertive
 
Telephone handling
Telephone handlingTelephone handling
Telephone handling
 
Communication curing common_meeting_ailments_(interview)
Communication curing common_meeting_ailments_(interview)Communication curing common_meeting_ailments_(interview)
Communication curing common_meeting_ailments_(interview)
 
Coaching performance coaching_training
Coaching performance coaching_trainingCoaching performance coaching_training
Coaching performance coaching_training
 

Workplace environment e-mail_and_internet_privacy_at_work