Electronic Mail, Employee Privacy and the Workplace

Electronic Mail, Employee Privacy and the Workplace

Charles Prysby (University of North Carolina, USA) and Nicole Prysby (Attorney at Law, Virginia, USA)
Copyright: © 2000 |Pages: 20
DOI: 10.4018/978-1-878289-71-1.ch009
OnDemand PDF Download:


Electronic mail (e-mail) has become increasingly important in the workplace. The growth of this new medium of communication has generated important legal questions about the privacy and monitoring of e-mail messages, so much so that most experts strongly recommend that organizations adopt explicit policies about e-mail for their own legal protection. The legal questions concerning e-mail in the workplace include both: (a) employee rights to privacy regarding e-mail messages; and (b) employee obligations to monitor e-mail to ensure a suitable workplace or to prevent illegal behavior. We discuss both of these topics in this chapter, attempting not only to outline current legal thinking in the area, but also to raise questions that managers and policy makers should consider. It is worth noting at the start that many of the legal issues surrounding the use of e-mail are direct extensions of principles that apply to other forms of communications. Indeed, much of the law that governs e-mail is not legislation that was written explicitly to cover this particular form of communication. Issues of the privacy of employee e-mail messages, for example, are directly analogous to issues of the privacy of employee phone calls or written correspondence. To be sure, there are questions about exactly how legal principles that were established for older communication technologies should be applied to a new one, and perhaps not all of these questions are fully settled at this point in time, but our understanding of this topic is broadened if we appreciate the application of legal principles across communication media.

Complete Chapter List

Search this Book:
Table of Contents
Lech Janczewski
Chapter 1
Jonathan W. Palmer, Jamie Kliewer, Mark Sweat
The security issue has been a compelling one for many organizations. In two separate studies completed in April 1998, Fortune 1000 companies... Sample PDF
Security Risk Assessment and Electronic Commerce: A Cross-Industry Analysis
Chapter 2
Jairo A. Gutierrez
The growing popularity of the Internet has taken many organisations by surprise. Established mechanisms such as fax technology, electronic data... Sample PDF
Securing the Internet in New Zealand: Threats and Solutions
Chapter 3
Dieter Fink
While much attention is currently being devoted to solving technological challenges of the Internet, for example increasing the bandwidth on... Sample PDF
Developing Trust for Electronic Commerce
Chapter 4
Lech Janczewski
In this chapter we will discuss the issue of managing security processing in business organization with special emphasis on computer systems. Our... Sample PDF
Managing Security Functions Using Security Standards
Chapter 5
Fredj Dridi, Gustaf Neumann
Advances in the World Wide Web technology have resulted in the proliferation of significant collaborative applications in commercial environments.... Sample PDF
Managing Security in the World Wide Web: Architecture, Services and Techniques
Chapter 6
Henry B. Wolfe
The protection of information for business or private purposes can be achieved through the careful selection and use of cryptographic tools.... Sample PDF
Cryptography: Protecting Confidentiality, Integrity and Availability of Data
Chapter 7
Dieter Gollmann
Products promising to secure electronic commerce and other Internet applications tend to rely heavily on cryptography. On occasion, it seems that... Sample PDF
Foundations for Cryptography
Chapter 8
Chris Mitchell
However, despite this wide range of standardisation activity, the ISO/IEC JTC1/SC27 work is unique in being both truly international and also aimed... Sample PDF
Developments in Security Mechanism Standards
Chapter 9
Charles Prysby, Nicole Prysby
Electronic mail (e-mail) has become increasingly important in the workplace. The growth of this new medium of communication has generated important... Sample PDF
Electronic Mail, Employee Privacy and the Workplace
Chapter 10
Gehan Gunasekara
This chapter canvasses the impact of the Privacy Act 1993 on those who transact their business in cyberspace who fall within the Act’s definition of... Sample PDF
Protecting Personal Privacy in Cyberspace: The Limitations of Third Generation Data Protection Laws such as the New Zealand Privacy Act 1993
About the Authors