Advice of attorney mark grossman

Assignment Help Management Information Sys
Reference no: EM13757314

Your Internet Job Rights Three Ethical Scenarios Whether you're an employer or an employee, you should know what your rights are when it comes to Internet use in the workplace. Recently federal and state courts have ruled that e-mail has little or no expectation of privacy in many circumstances. A number of employees have been terminated or warned for misuse, improper use, or inappropriate use of organizational resources by sending/reading personal e-mail on the firm's computers and net- works while on their own time (during lunch, or before/after work hours). The type of Internet use also comes into question, particularly when surfing Web sites the firm may consider "questionable" or "adult" (i.e., pornography).

Generally, these types of materials fall into three groups: pornographic, obscene, or indecent, and definitions and penalties vary from state to state, and even from town to town. A firm should have written policies for computer and network use, and employees should be schooled in these requirements. Many firms today require employees to sign a statement that they have been advised of these policies.

Mark Grossman, a Florida attorney who specializes in computer and Internet law, gives answers to some basic questions. Scenario 1 Nobody told you that your Internet use in the office was being monitored. Now you've been warned you'll be fired if you use the Internet for recreational surfing again. What are your rights?

Bottom Line. When you're using your office computer, you have virtually no rights. You'd have a tough time convincing a court that the boss invaded your privacy by monitoring your use of the company PC on company time. You should probably be grateful you got a warning. Scenario 2 Your employees are abusing their Internet privileges, but you don't have an Internet usage policy.

What do you do? Bottom line. Although the law isn't fully developed in this area, courts are taking a straight- forward approach: If it's a company computer, the company can control the way it's used. You don't need an Internet usage policy to prevent inappropriate use of your company computers.

To protect yourself in the future, distribute an Internet policy to your employees as soon as possible. Scenario 3 Employee John Doe downloads adult material to his PC at work, and employee Jane Smith sees it. Smith then proceeds to sue the company for sexual harassment. As the employer, are you liable? Bottom line. Whether it comes from the Internet or from a magazine, adult material simply has no place in the office. So Smith could certainly sue the company for allowing a sexually hostile environment. The best defense is for the company to have an Internet usage policy that prohibits visits to adult sites.

Of course, you have to follow through. If someone is looking at adult material in the office, you must at least send the offending employee a written reprimand. If the company lacks a strict Internet policy, though, Smith could prevail in court.

a. Do you agree with the advice of attorney Mark Grossman in each of the scenarios? Why or why not?

b. What would your advice be? Explain your positions.

c. Identify any ethical principles you may be using in explaining your position in each of the scenarios.

Verified Expert

Reference no: EM13757314

Questions Cloud

Specific examples of purchasing behavior : Consider the elements of the code of conduct developed by Caterpillar in Sourcing Snapshot: Caterpillar’s Code of Conduct. What are some specific examples of purchasing behavior that would violate elements of this code of conduct?
Describe larger historical context and cultural creations : The period of the Sui and Tang dynasties has been called China's Golden Age. Describe the larger historical context and the cultural creations that made this a Golden Age.
Organization displays consumer orientation : During the 19th and 20th centuries, the focus of the economy in the U.S. evolved from the manufacturing of goods and services to the selling of products and services, and then finally to the marketing of goods and services. Describe at least two ways..
Calculate the flexed budget : Calculate the flexed budget and the key variances between budgeted and actual results. Reconcile the original budget and present the relationship between the budgeted and the actual profit for the month November
Advice of attorney mark grossman : Do you agree with the advice of attorney Mark Grossman in each of the scenarios - what would your advice be? Explain your positions.
Change equipment between styles of hammers : Amy Xia's plant was designed to produce 7,000 hammers per day but is limited to making 6,000 hammers per day because of the time needed to change equipment between styles of hammers. What is the utilization? For the past month, the plant in problem S..
Create the application and web site for a business : Create the application and/or a web site for a business (choice is yours). You must use five (5) programming techniques discussed in this class.
What real-life aspects can you glean from this video : View this video First IT Professional Services Call (under three minutes) and comment. While it's intended to be humorous, what real-life aspects can you glean from this video
Discuss important financial and other facts : Identify the company and its industry. Discuss important financial and other facts about the company from its SEC filings.

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  1 describe some of the reasons that early dot-com companies

1. describe some of the reasons that early dot-com companies had an initial advantage over traditional companies in

  Creation of a supply chainwhat effect does materials

creation of a supply chain?what effect does materials management have on the creation of a supply chain? what role

  Description of business logisticssupply chain

description of business logisticssupply chain managementneed help with this questionfor the following situations

  How is a push technology environment different

How is a push technology environment different from mass mailings and spam

  A new economy of sharing has fuelled an old approach to

internet impacts and support for new business modelssocial networking has provided new models of business. companies

  Explain about streaming

A technique in which video files downloaded for Internet are buffered, so that the first part of the file will be viewed while the remaining parts

  Step-wise answer to change managementwhat would you

step-wise answer to change managementwhat would you recommend to the management of a firm going global on the issue of

  Advances in information technologywhat were the advances in

advances in information technologywhat were the advances in information technology that resulted in new ethical issues

  Electronic system for time coding

Information Systems Life Cycle-Time Coding - process to an electronic system for time coding.

  Responding to information system security treatsthe

responding to information system security treatsthe original posting question how should organizations respond to

  Learning technology relationshipscompare the three 3

learning technology relationshipscompare the three 3 learning technologies verbal information intellectual skill and

  Maximize supply chain efficiency through the use of location

Examine how Home Depot uses location in its supply chain then answer the following question - How does Home Depot maximize supply chain efficiency through the use of location?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd