How might you separate your monitoring

Assignment Help Business Law and Ethics
Reference no: EM133194710

Question: Discussion boards are an important element in learning. It gives us chance to interact with our community of learners. It can provide a fresh perspective and another point of view. It can validate our conclusions or awaken us to new thinking. Please read the material that I have posted. Think about the topic and questions it poses. Prepare a response to the topic. "I agree" or "That's great" is insufficient. Your posting should be a paragraph or more in length Your reaction should include support or explanation. After reading and contemplating your classmates' response. Post a response to a classmates' post. Be creative and thoughtful! I would encourage you to "get in to" the discussion. You will find it rewarding! Grading will be based upon were you responsive and complete, did you use proper grammar, syntax, and word choice, did you include references to readings.etc. Points will be earned in the following manner. Up to 20 Points for your original post.

Karen is a marketing executive working at home using her own computer accessing the company network through her internet provider. When she accesses the network, there is an authentication interface where she enters her work email and password.

Karen received what appears to be at legitimate email asking her to click on an embedded link to learn more about a new solar technology. Though she did not recognize the name of the sender, she clicks on the link because she works at a solar panel installation company and is always excited to learn about the latest technology. She also is on several list servers, so it is not uncommon for her to receive emails such as this one.

Karen finds herself looking at a website with photos of Leonardo DiCaprio that are not safe or suitable for work (NSFW) She is so annoyed by the email and this website, that she spends a few minutes on trying to figure out how to unsubscribe from its list. After searching for several minutes with no luck she leaves the website and returns to reading her email she responds quickly to a question from her intern and then sends an email to her teenage daughter reminding her to pick up the dog from the puppy daycare on her way home from school. She then returns to preparing for her upcoming presentation.

A few days later she receives a written warning from her manager reprimanding her for using employer owned computer network for personal use, including looking at NSFW material online and also for emailing her daughter. She learns that her manager was using a program that alerted him anytime an employee viewed certain inappropriate websites. He also was monitoring her work email account for keywords and her puppy daycare was flagged. Karen is furious at the invasion of her privacy posed by this computer monitoring. Does her employer have a right to monitor in this way, and how might you suggest that she respond? If you were her manager, how might you separate your monitoring between appropriate technology use and inappropriate use? How would you characterize Karen use?

Reference no: EM133194710

Questions Cloud

Do you know any of the party-the plaintiff : Florida International University - Do you know any of the party-the Plaintiff or the Defendant? If so, can you elaborate your relationship with them?
Exploring the known history of climate change : ENV 305-Southern New Hampshire University-You will now submit a paper exploring the known history of climate change and the potential for future climate change.
How often follow-up measures will be administered : The purpose for conducting a single-system research evaluation. How baseline measures will be obtained? How often follow-up measures will be administered?
Prepare a non-disclosure agreement for him : Sheridan College - Prepare a non-disclosure agreement for him to give to the prospective investors to sign. You will want to keep the NDA fairly easy
How might you separate your monitoring : university of toledo - How might you separate your monitoring between appropriate technology use and inappropriate use? How would you characterize Karen use
Provide recommendations for improvements should chris submit : Provide recommendations for improvements should Chris and her colleagues wish to submit the study to the evidence-based practice registry.
Research one of the popular environmental/hazard issues : ESCI 1140 - Research one of the popular environmental/hazard issues to which humans may have some level of influence and address the following topics
How would she decide what is right to do : DeVry University - David Hume criticizes the approach and foundation upon which a number of ethical theories are based. What do you understand is his criticism
How has cvs handled its ethical challenges : Rutgers university - Discuss the justifications Louis uses to argue for the truthfulness of the company's marketing claims

Reviews

Write a Review

Business Law and Ethics Questions & Answers

  Review the state laws and regulations relating to practice

Review the state laws and regulations relating to the practice of counseling for your specialization. Within these regulations, locate the specific areas relating to.

  Advise tommy as to the application of the exclusion clauses

Advise Tommy as to the application of the exclusion clauses? Would clause be effective to exclude the application of the consumer guarantees under Competition and Consumer Act 2010?

  What are the four types of culpability in model penal code

What are the four types of culpability in the "Model Penal Code?" Be sure to provide examples. Provide general information as necessary. 1. Purposely 2.Knowingly 3.Recklessly 4.Negligently

  Describing the laws governing legal authority and licensing

describing the laws governing legal authority and licensing requirements for private security companies and officers in your state. If you determine your state has no such statutes, select a neighboring state.

  Advantages of leasing assets instead of owning them

What would be the advantages and disadvantages of leasing assets instead of owning them? How would the financial statements be different in a leasing situation (for both operating leases and capital leases) for the lessee? Please let me know if y..

  Explain the crime of false imprisonment

Discuss the crime of false imprisonment. Next, debate whether or not the suggested change in Question 3 would allow the court to convict the attacker in order to punish him. Provide a rationale to support your response

  What is active listening and why is it necessary

What type of training can be undertaken by electronic training (ET)? Discuss the effectiveness of ET in terms of the learning processes related to Social.

  Ten commandments in a classroom

Under the U.S. Constitution, can a student post the Ten Commandments in a classroom? Can a student pray with another student on the lawn during lunch time?

  Define use of technology by law enforcement

Should there be limits on the use of this technology by law enforcement

  Describe the requirements of consideration

Define consideration and describe the requirements of consideration. Define gift promise and identify whether gift promises are enforceable

  How does the mixture of histories and cultures combine

Write an essay discussing the MIXTURE of the two periods mentioned above. How does the mixture of two different histories and cultures combine.

  Harassment and bona fide occupational qualification

Can churches promoting a certain religion refuse to hire those who have a different religion? If so or if not, why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd