Advice of attorney mark grossman

Assignment Help Management Information Sys
Reference no: EM13757314

Your Internet Job Rights Three Ethical Scenarios Whether you're an employer or an employee, you should know what your rights are when it comes to Internet use in the workplace. Recently federal and state courts have ruled that e-mail has little or no expectation of privacy in many circumstances. A number of employees have been terminated or warned for misuse, improper use, or inappropriate use of organizational resources by sending/reading personal e-mail on the firm's computers and net- works while on their own time (during lunch, or before/after work hours). The type of Internet use also comes into question, particularly when surfing Web sites the firm may consider "questionable" or "adult" (i.e., pornography).

Generally, these types of materials fall into three groups: pornographic, obscene, or indecent, and definitions and penalties vary from state to state, and even from town to town. A firm should have written policies for computer and network use, and employees should be schooled in these requirements. Many firms today require employees to sign a statement that they have been advised of these policies.

Mark Grossman, a Florida attorney who specializes in computer and Internet law, gives answers to some basic questions. Scenario 1 Nobody told you that your Internet use in the office was being monitored. Now you've been warned you'll be fired if you use the Internet for recreational surfing again. What are your rights?

Bottom Line. When you're using your office computer, you have virtually no rights. You'd have a tough time convincing a court that the boss invaded your privacy by monitoring your use of the company PC on company time. You should probably be grateful you got a warning. Scenario 2 Your employees are abusing their Internet privileges, but you don't have an Internet usage policy.

What do you do? Bottom line. Although the law isn't fully developed in this area, courts are taking a straight- forward approach: If it's a company computer, the company can control the way it's used. You don't need an Internet usage policy to prevent inappropriate use of your company computers.

To protect yourself in the future, distribute an Internet policy to your employees as soon as possible. Scenario 3 Employee John Doe downloads adult material to his PC at work, and employee Jane Smith sees it. Smith then proceeds to sue the company for sexual harassment. As the employer, are you liable? Bottom line. Whether it comes from the Internet or from a magazine, adult material simply has no place in the office. So Smith could certainly sue the company for allowing a sexually hostile environment. The best defense is for the company to have an Internet usage policy that prohibits visits to adult sites.

Of course, you have to follow through. If someone is looking at adult material in the office, you must at least send the offending employee a written reprimand. If the company lacks a strict Internet policy, though, Smith could prevail in court.

a. Do you agree with the advice of attorney Mark Grossman in each of the scenarios? Why or why not?

b. What would your advice be? Explain your positions.

c. Identify any ethical principles you may be using in explaining your position in each of the scenarios.

Verified Expert

Reference no: EM13757314

Questions Cloud

Specific examples of purchasing behavior : Consider the elements of the code of conduct developed by Caterpillar in Sourcing Snapshot: Caterpillar’s Code of Conduct. What are some specific examples of purchasing behavior that would violate elements of this code of conduct?
Describe larger historical context and cultural creations : The period of the Sui and Tang dynasties has been called China's Golden Age. Describe the larger historical context and the cultural creations that made this a Golden Age.
Organization displays consumer orientation : During the 19th and 20th centuries, the focus of the economy in the U.S. evolved from the manufacturing of goods and services to the selling of products and services, and then finally to the marketing of goods and services. Describe at least two ways..
Calculate the flexed budget : Calculate the flexed budget and the key variances between budgeted and actual results. Reconcile the original budget and present the relationship between the budgeted and the actual profit for the month November
Advice of attorney mark grossman : Do you agree with the advice of attorney Mark Grossman in each of the scenarios - what would your advice be? Explain your positions.
Change equipment between styles of hammers : Amy Xia's plant was designed to produce 7,000 hammers per day but is limited to making 6,000 hammers per day because of the time needed to change equipment between styles of hammers. What is the utilization? For the past month, the plant in problem S..
Create the application and web site for a business : Create the application and/or a web site for a business (choice is yours). You must use five (5) programming techniques discussed in this class.
What real-life aspects can you glean from this video : View this video First IT Professional Services Call (under three minutes) and comment. While it's intended to be humorous, what real-life aspects can you glean from this video
Discuss important financial and other facts : Identify the company and its industry. Discuss important financial and other facts about the company from its SEC filings.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Best practices for business e-mail effect of web on why

best practices for business e-mail effect of web on why business is conducted.when it comes to the internet nothing is

  Part 1- social media strategy designfor this phase of the

part 1- social media strategy designfor this phase of the project you are required to formulate a social media strategy

  What practices or procedures does it include

Go online and conduct research on business continuity planning (BCD). What does this term mean? What practices or procedures does it include

  Explain why openid offers users greater convenience

Explain why OpenID offers users greater convenience and security than the current system. Would you consider using an identity provider to access content on the Web? Why or why not

  Technology advancements and written business

technology advancements and written business correspondencetechnology has made the process of communication both easier

  Show the performance chain

The performance chain and key components are discussed - Show the performance chain as it applies to your organization or one with which you are familiar.

  Issues that a company may face as it experiences growth

Write a paper of 500-1,000 words (double-spaced) Briefly explain some of the issues that a company may face as it experiences growth and begins to address the proper use of its information systems

  Important function of an enterprise application

How does the implemented Information System can improve the value chain of Kmart and what is the most important function of an enterprise application?

  Groupware systemsreview three articles all of which play

groupware systemsreview three articles all of which play this theme in varying degrees. as you read them think about

  Database customization vs non-customized

Database Customization vs Non-Customized - What would happen if you didn't customize your database at all?

  Describe the decision-making and problem-solving processes

Describe the decision-making and problem-solving processes and Provide at least two examples of the types of decisions that are made by DSS

  Determine the expected profit for the manufacturer

Find an option contract such that both the manufacturer and distributor enjoy a higher expected profit than and What is the expected profit for the manufacturer and the distributor?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd