• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

More and more businesses rely heavily on electronic technology such as telephone, fax, and e-mail.

Extracts from this document...

Introduction

More and more businesses rely heavily on electronic technology such as telephone, fax, and e-mail. All of these new technologies have brought in a new era to the present world. The use of computers and Internet for electronic commerce and information exchange has increased quite dramatically, Martina Schollmeyer (Texas A&M University-Corpus Christi, USA), and Helen Kelly (University of Western Ontario, Canada) showed that approximately 90% of the companies have an e-mail system at work. An employee sends and receives an average of 50 e-mail messages per week. Each employee spends about 200 minutes each week on e-mail. Among those 200 an average of 30 minutes are spent on personal e-mail. It means that every week an employee will have to spend 3 hours just reading e-mails at work. Concern regarding workplace privacy has become a huge issue along with the successfulness and cheerfulness profits that electronic mails have brought to the company. Conflicts between the employer and employee's perspectives toward the use of electronic mail system have started an invisible war in the workplace. These conflicting assertions have the potential to, create an atmosphere of mutual mistrust in the workplace and lowering company morale and production. Advantages of Electronic Mail System The lists below are few major advantages that encourage people to use electronic mail over other similar communication tools. ...read more.

Middle

Most of the companies have set up some level of surveillance system to monitoring their employees' e-mail activities. Employee's Perspective Employers believe they have the right, as an employer and as an e-mail system provider, to monitor the communications of their employees in the workplace. However, for employees, this electronic monitoring is an unacceptable intrusion of privacy. In employees respective that e-mail is more like a telephone since the rapidly growth of e-mail usage in the workplace, its natural interactive style, and the probability of instantaneous communication. Because most of the companies allow employees use telephones for private calls. As a result, employees feel that they can be as informal and natural in drafting e-mail messages as they are talking over their phone. Employees are expecting that their e-mail accounts are private in the fact of accessing their accounts is restricted by the use of personal passwords. As such, employees believe that they should have an absolute right to privacy for their e-mail communication. Also, most of the companies' electronic mail system has the connection to the Internet. The ability to communicate with the outside world makes the employees believe that the e-mail system is not restricted to business related use. Employees tend to use the system to send e-mail to friends and colleagues. ...read more.

Conclusion

The policy should clearly state what messages an employee can put in the e-mail. When and under what circumstance that employer has the right to access to their employees' accounts. Some of the following major elements should include in the policy: * The policy should address whether the company's e-mail system can be used for personal messages and/or business related only. * The policy should address whether if the company information will be allowed in any e-mail that is send outside the company (if personal e-mail is allowed). * The policy should address the company will monitor the contents of e-mail to what extent. This includes the explanation of the company owns the e-mail system and the owner has the legal right to access the system. * The policy should address whether the employees are allowed to use encryption on their e-mail. This includes the explanation on the security level that the company has provided to its employees. * The policy should address a prohibition against the post of e-mail that contains sexually explicit images or language to avoid sexual harassment. * The Policy should address any specific opinion based on others' race, national origin, sex, sexual orientation, age, religious beliefs or political beliefs contain in e-mail will not be allowed to avoid discrimination. * The policy should explicitly address the procedures for disciplining employees who violate or abuse the company's e-mail policy. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Peer reviewed

    Email and Email Security.

    4 star(s)

    Mail-VPN capabilities include: The Only Comprehensive Security Solution For Email Systems IronMail, an all-inclusive email security appliance, sits at the mail gateway between your network firewall and mail servers. Every connection to your mail server(s) passes through IronMail. IronMail is the first product designed to provide application-level security for email.

  2. ICT Systems in Everyday Life: Your Local Community

    files using (where possible) existing Material exchange Format (MXF) specifications and extensible Mark up Language (XML). The output of this process is the digital Cinema Package (DCP). This section also defines the requirements for encrypting the essence (sound, picture and subtitles)

  1. Information Security.

    your communications beyond the gateway to include your external users, partners, clients and others. IronMail achieves this with our Mail-VPN feature. Mail-VPN secures messages while they are in transit over the Internet, with no client interaction, using SSL technology. Mail-VPN can create secure tunnels to other mail servers or other

  2. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    When Micron PC offered courses on how to shop on the Web, it saw a rise in buying activity and the average sales prices to customers rose with their rise in confidence. This example shows that when customer's knowledge to your products increase and confidence builds up, you can get more repeated sales and above-average profit margins.

  1. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    The Internet offers many advantages and some disadvantages as an alternative promotional medium. Businesses are also using traditional advertising channel magazines, newspapers and radio etc. (Chaffey and Mayer 2000, pp.41) and (Reuters Business Insight 2000, pp.26) In terms of attractiveness, online advertising offers marketers benefits beyond those offered by traditional media.

  2. Unit 23: Investigating Communications and Networks

    Contributions can be listed either threaded by subject, or ordered by time of posting. URLs typed into the body of a message are seen by readers as links which, when clicked, cause the destination to be viewed in a separate window.

  1. Information Technology Communication.

    others it is free and instant once you have sent your E-Mail it has been delivered to destination you sent it to. In many ways Electronic Mail is the most important part of the Internet as it allows people to communicate almost instantly with others around the world.

  2. ICT IN ORGANIZATION

    Using their technology, they hold all the customers details like name and address on a database if they have signed up to a Clubcard and can then send them vouchers and special offer sheets through the post which maintains their customers interest to shopping with their stores.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work