Advice of attorney mark grossman

Assignment Help Management Information Sys
Reference no: EM13757314

Your Internet Job Rights Three Ethical Scenarios Whether you're an employer or an employee, you should know what your rights are when it comes to Internet use in the workplace. Recently federal and state courts have ruled that e-mail has little or no expectation of privacy in many circumstances. A number of employees have been terminated or warned for misuse, improper use, or inappropriate use of organizational resources by sending/reading personal e-mail on the firm's computers and net- works while on their own time (during lunch, or before/after work hours). The type of Internet use also comes into question, particularly when surfing Web sites the firm may consider "questionable" or "adult" (i.e., pornography).

Generally, these types of materials fall into three groups: pornographic, obscene, or indecent, and definitions and penalties vary from state to state, and even from town to town. A firm should have written policies for computer and network use, and employees should be schooled in these requirements. Many firms today require employees to sign a statement that they have been advised of these policies.

Mark Grossman, a Florida attorney who specializes in computer and Internet law, gives answers to some basic questions. Scenario 1 Nobody told you that your Internet use in the office was being monitored. Now you've been warned you'll be fired if you use the Internet for recreational surfing again. What are your rights?

Bottom Line. When you're using your office computer, you have virtually no rights. You'd have a tough time convincing a court that the boss invaded your privacy by monitoring your use of the company PC on company time. You should probably be grateful you got a warning. Scenario 2 Your employees are abusing their Internet privileges, but you don't have an Internet usage policy.

What do you do? Bottom line. Although the law isn't fully developed in this area, courts are taking a straight- forward approach: If it's a company computer, the company can control the way it's used. You don't need an Internet usage policy to prevent inappropriate use of your company computers.

To protect yourself in the future, distribute an Internet policy to your employees as soon as possible. Scenario 3 Employee John Doe downloads adult material to his PC at work, and employee Jane Smith sees it. Smith then proceeds to sue the company for sexual harassment. As the employer, are you liable? Bottom line. Whether it comes from the Internet or from a magazine, adult material simply has no place in the office. So Smith could certainly sue the company for allowing a sexually hostile environment. The best defense is for the company to have an Internet usage policy that prohibits visits to adult sites.

Of course, you have to follow through. If someone is looking at adult material in the office, you must at least send the offending employee a written reprimand. If the company lacks a strict Internet policy, though, Smith could prevail in court.

a. Do you agree with the advice of attorney Mark Grossman in each of the scenarios? Why or why not?

b. What would your advice be? Explain your positions.

c. Identify any ethical principles you may be using in explaining your position in each of the scenarios.

Verified Expert

Reference no: EM13757314

Questions Cloud

Specific examples of purchasing behavior : Consider the elements of the code of conduct developed by Caterpillar in Sourcing Snapshot: Caterpillar’s Code of Conduct. What are some specific examples of purchasing behavior that would violate elements of this code of conduct?
Describe larger historical context and cultural creations : The period of the Sui and Tang dynasties has been called China's Golden Age. Describe the larger historical context and the cultural creations that made this a Golden Age.
Organization displays consumer orientation : During the 19th and 20th centuries, the focus of the economy in the U.S. evolved from the manufacturing of goods and services to the selling of products and services, and then finally to the marketing of goods and services. Describe at least two ways..
Calculate the flexed budget : Calculate the flexed budget and the key variances between budgeted and actual results. Reconcile the original budget and present the relationship between the budgeted and the actual profit for the month November
Advice of attorney mark grossman : Do you agree with the advice of attorney Mark Grossman in each of the scenarios - what would your advice be? Explain your positions.
Change equipment between styles of hammers : Amy Xia's plant was designed to produce 7,000 hammers per day but is limited to making 6,000 hammers per day because of the time needed to change equipment between styles of hammers. What is the utilization? For the past month, the plant in problem S..
Create the application and web site for a business : Create the application and/or a web site for a business (choice is yours). You must use five (5) programming techniques discussed in this class.
What real-life aspects can you glean from this video : View this video First IT Professional Services Call (under three minutes) and comment. While it's intended to be humorous, what real-life aspects can you glean from this video
Discuss important financial and other facts : Identify the company and its industry. Discuss important financial and other facts about the company from its SEC filings.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe line process vs. batch process

Line Process vs. Batch Process - Effect on Functions - What concerns might the following functions have about this proposed change?

  Does social media have aplace in the business world

How would you use social media to promote your business? If you wouldn't use socialmedia, what online strategies would you employ?

  Description of the information systems type and its benefits

For each information systems type identified in the table, include the following in the appropriate columns: A description of the information systems type and its benefits

  Retention in the nursing home environment

Improvement solutions to employee retention in the nursing home environment?

  Basic steps for designing a logistics network

Logistics Network - What are the basic steps for designing a logistics network?

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Different approches1 what are the differences between the

different approches1. what are the differences between the human-centered and user-centered approaches? do you agree

  Percentage change in productivity from 2007 to 2008

Operations and supply management: Change in productivity - What was the percentage change in productivity from 2007 to 2008?

  Analysis of the inter relationships among key stakeholders

Analysis of the inter relationships among key stakeholders, professional organizations, and health care professionals within the organization

  Explain about current technology assessment

Current technology assessment: Cosmetics Company - Use of spreadsheets, planning conferences using video-conferencing, data archiving, sorting and retrieval for strategic planning, digitized management directives, memorandum or information sent to ..

  Under what circumstances might service times be constant

Do doctors' offices generally have random arrival rates for patients? Are service times random? Under what circumstances might service times be constant?

  Supply chain management powerpointafter the initial report

supply chain management powerpointafter the initial report the owners of stone horse supply company john and michael

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd