• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

More and more businesses rely heavily on electronic technology such as telephone, fax, and e-mail.

Extracts from this document...

Introduction

More and more businesses rely heavily on electronic technology such as telephone, fax, and e-mail. All of these new technologies have brought in a new era to the present world. The use of computers and Internet for electronic commerce and information exchange has increased quite dramatically, Martina Schollmeyer (Texas A&M University-Corpus Christi, USA), and Helen Kelly (University of Western Ontario, Canada) showed that approximately 90% of the companies have an e-mail system at work. An employee sends and receives an average of 50 e-mail messages per week. Each employee spends about 200 minutes each week on e-mail. Among those 200 an average of 30 minutes are spent on personal e-mail. It means that every week an employee will have to spend 3 hours just reading e-mails at work. Concern regarding workplace privacy has become a huge issue along with the successfulness and cheerfulness profits that electronic mails have brought to the company. Conflicts between the employer and employee's perspectives toward the use of electronic mail system have started an invisible war in the workplace. These conflicting assertions have the potential to, create an atmosphere of mutual mistrust in the workplace and lowering company morale and production. Advantages of Electronic Mail System The lists below are few major advantages that encourage people to use electronic mail over other similar communication tools. ...read more.

Middle

Most of the companies have set up some level of surveillance system to monitoring their employees' e-mail activities. Employee's Perspective Employers believe they have the right, as an employer and as an e-mail system provider, to monitor the communications of their employees in the workplace. However, for employees, this electronic monitoring is an unacceptable intrusion of privacy. In employees respective that e-mail is more like a telephone since the rapidly growth of e-mail usage in the workplace, its natural interactive style, and the probability of instantaneous communication. Because most of the companies allow employees use telephones for private calls. As a result, employees feel that they can be as informal and natural in drafting e-mail messages as they are talking over their phone. Employees are expecting that their e-mail accounts are private in the fact of accessing their accounts is restricted by the use of personal passwords. As such, employees believe that they should have an absolute right to privacy for their e-mail communication. Also, most of the companies' electronic mail system has the connection to the Internet. The ability to communicate with the outside world makes the employees believe that the e-mail system is not restricted to business related use. Employees tend to use the system to send e-mail to friends and colleagues. ...read more.

Conclusion

The policy should clearly state what messages an employee can put in the e-mail. When and under what circumstance that employer has the right to access to their employees' accounts. Some of the following major elements should include in the policy: * The policy should address whether the company's e-mail system can be used for personal messages and/or business related only. * The policy should address whether if the company information will be allowed in any e-mail that is send outside the company (if personal e-mail is allowed). * The policy should address the company will monitor the contents of e-mail to what extent. This includes the explanation of the company owns the e-mail system and the owner has the legal right to access the system. * The policy should address whether the employees are allowed to use encryption on their e-mail. This includes the explanation on the security level that the company has provided to its employees. * The policy should address a prohibition against the post of e-mail that contains sexually explicit images or language to avoid sexual harassment. * The Policy should address any specific opinion based on others' race, national origin, sex, sexual orientation, age, religious beliefs or political beliefs contain in e-mail will not be allowed to avoid discrimination. * The policy should explicitly address the procedures for disciplining employees who violate or abuse the company's e-mail policy. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Peer reviewed

    Email and Email Security.

    4 star(s)

    Mail-VPN capabilities include: The Only Comprehensive Security Solution For Email Systems IronMail, an all-inclusive email security appliance, sits at the mail gateway between your network firewall and mail servers. Every connection to your mail server(s) passes through IronMail. IronMail is the first product designed to provide application-level security for email.

  2. ICT Systems in Everyday Life: Your Local Community

    This includes the cost of the film in addition to processing. This figure is widely used as what studios and distributors will save under digital cinema. As we will later show, there is not likely to be any savings after the cost of capital is taken into account based on the current cost of projection systems.

  1. OCR GCSE Business & Communication Task 7 Report

    However, this report can help to establish a connection between viewers and the companies image. By including my corporate into my report I am able to promote my companies image and logo which can then ensure the viewer/client will remember and possibly reuse the company as they can easily relate the colours to the company.

  2. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    purchase history * Buying motives and decision criteria * Click-through data from newsletters After building all components, we can make use of data mining technique on customer personalization. And Personalization can divide into Customization, Simple personalization and Rules-based personalization Customization.

  1. Information Security.

    Introduction to Email Security Today email is so widely used that it has become the default means of communication where the correspondents feel that they can discuss matters that can be kept between them. We analyze below how this might be a dangerous illusion, especially when discussing matters with legal,

  2. Strategic Management of Innovation.

    Tim Donahue who was formally the President and COO of the Nextel was recently promoted to President and CEO. Mr. Donahue was also identified as one of the key senior managers who provides direction, vision, and recognizes areas of potential growth for the company.

  1. Two major drivers of greater globalization have been the decline in trade barriers and ...

    The last and third part is linked to the company having a rapid and accelerated pace of internationalization and is related to the phenomena of Born Global companies. More specifically, this research will investigate how these firms internationalize, how they utilize the Internet in their accelerated internationalization and how successful performance can be explained.

  2. Development of a set of marketing recommendations, marketing mix campaign and customer care initiatives.

    According to Simkin and Ferrell (2001) In order to satisfy the customers, products need to vacant for the customers at the appropriate time and at suitable location. The important thing for many businesses is to decide on distribution channels that give control at a reasonable cost.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work