• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

More and more businesses rely heavily on electronic technology such as telephone, fax, and e-mail.

Extracts from this document...

Introduction

More and more businesses rely heavily on electronic technology such as telephone, fax, and e-mail. All of these new technologies have brought in a new era to the present world. The use of computers and Internet for electronic commerce and information exchange has increased quite dramatically, Martina Schollmeyer (Texas A&M University-Corpus Christi, USA), and Helen Kelly (University of Western Ontario, Canada) showed that approximately 90% of the companies have an e-mail system at work. An employee sends and receives an average of 50 e-mail messages per week. Each employee spends about 200 minutes each week on e-mail. Among those 200 an average of 30 minutes are spent on personal e-mail. It means that every week an employee will have to spend 3 hours just reading e-mails at work. Concern regarding workplace privacy has become a huge issue along with the successfulness and cheerfulness profits that electronic mails have brought to the company. Conflicts between the employer and employee's perspectives toward the use of electronic mail system have started an invisible war in the workplace. These conflicting assertions have the potential to, create an atmosphere of mutual mistrust in the workplace and lowering company morale and production. Advantages of Electronic Mail System The lists below are few major advantages that encourage people to use electronic mail over other similar communication tools. ...read more.

Middle

Most of the companies have set up some level of surveillance system to monitoring their employees' e-mail activities. Employee's Perspective Employers believe they have the right, as an employer and as an e-mail system provider, to monitor the communications of their employees in the workplace. However, for employees, this electronic monitoring is an unacceptable intrusion of privacy. In employees respective that e-mail is more like a telephone since the rapidly growth of e-mail usage in the workplace, its natural interactive style, and the probability of instantaneous communication. Because most of the companies allow employees use telephones for private calls. As a result, employees feel that they can be as informal and natural in drafting e-mail messages as they are talking over their phone. Employees are expecting that their e-mail accounts are private in the fact of accessing their accounts is restricted by the use of personal passwords. As such, employees believe that they should have an absolute right to privacy for their e-mail communication. Also, most of the companies' electronic mail system has the connection to the Internet. The ability to communicate with the outside world makes the employees believe that the e-mail system is not restricted to business related use. Employees tend to use the system to send e-mail to friends and colleagues. ...read more.

Conclusion

The policy should clearly state what messages an employee can put in the e-mail. When and under what circumstance that employer has the right to access to their employees' accounts. Some of the following major elements should include in the policy: * The policy should address whether the company's e-mail system can be used for personal messages and/or business related only. * The policy should address whether if the company information will be allowed in any e-mail that is send outside the company (if personal e-mail is allowed). * The policy should address the company will monitor the contents of e-mail to what extent. This includes the explanation of the company owns the e-mail system and the owner has the legal right to access the system. * The policy should address whether the employees are allowed to use encryption on their e-mail. This includes the explanation on the security level that the company has provided to its employees. * The policy should address a prohibition against the post of e-mail that contains sexually explicit images or language to avoid sexual harassment. * The Policy should address any specific opinion based on others' race, national origin, sex, sexual orientation, age, religious beliefs or political beliefs contain in e-mail will not be allowed to avoid discrimination. * The policy should explicitly address the procedures for disciplining employees who violate or abuse the company's e-mail policy. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Peer reviewed

    Email and Email Security.

    4 star(s)

    What does this mean? It means that IronMail will not allow exploitation of vulnerabilities in your email systems or allow your email system to be used as a delivery vehicle for attacks. Securing Email Using SSL SSL is widely known as the technology that allows companies like E*Trade to conduct

  2. ICT Systems in Everyday Life: Your Local Community

    This includes the cost of the film in addition to processing. This figure is widely used as what studios and distributors will save under digital cinema. As we will later show, there is not likely to be any savings after the cost of capital is taken into account based on the current cost of projection systems.

  1. OCR GCSE Business & Communication Task 7 Report

    However, this report can help to establish a connection between viewers and the companies image. By including my corporate into my report I am able to promote my companies image and logo which can then ensure the viewer/client will remember and possibly reuse the company as they can easily relate the colours to the company.

  2. Information Security.

    another companies .Like SSL ,SET uses encryption to provide secure credit card transaction over the internet it includes features that ensure >> Integrity(the packets being transmitted cannot be modified en route)

  1. Strategic Management of Innovation.

    More importantly, Nextel was "first to market" with their introduction of a wireless Internet access service (Nextel Online) in April 2000. Microsoft's MSN is co-branding with the company to provide this service, while Nextel is using a strategy of third party vendors to develop a host of Internet applications for the mobile phones.

  2. Two major drivers of greater globalization have been the decline in trade barriers and ...

    The last and third part is linked to the company having a rapid and accelerated pace of internationalization and is related to the phenomena of Born Global companies. More specifically, this research will investigate how these firms internationalize, how they utilize the Internet in their accelerated internationalization and how successful performance can be explained.

  1. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    Some customers are moving away from the physical shopping experience and moving towards the Internet shopping, in relation to the supermarkets, Tesco and Sainsbury's reach their customers through the Internet and win their current competitors. Those who have virtual presence are called the E-tailers.

  2. ICT IN ORGANIZATION

    earn lifetime loyalty' is successful because of this policy, they are benefiting and so are the customers, this means customers are going to keep returning to Tesco because they are getting money off their purchases because of the rewards they are getting from having a benefit card so Tesco can

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work