Monday, May 20, 2019

John’s Case

Case Study rear Stokes May 27, 2012 An overview of Johns face John Stokes is a manager of the Tri-Mart Corporation. He recently received an inappropriate email from an employee that showcased nude hands in a calendar. He also noticed that the email was forwarded to 50 other people in the organization. Key Issues or Problems He recently received an inappropriate email from an employee that showcased nude men in a calendar. He also noticed that the email was forwarded to 50 other people in the organization. sanative that John can considerThere are many companies that are currently marketing e-mail monitoring services. John needs these services range from a blanket(a) e-mail monitoring application to a platform that only records the time at which employees pick up their e-mail. The full e-mail application program go out record all of the following information. The e-mail recipient ?The e-mail sender ?The keep down of words in the e-mail The time the employee spent reading e-mai l ?The time the employee spent composing e-mail ?The number of attachments ?The type of e-mail business-related or non-business related.A potential solution to Johns dilemma Full electronic mail monitoring application to a program that only records the time at which employees pick up their e-mail. The full e-mail application program will record all of the following information. The e-mail recipient ?The e-mail sender ?The number of words in the e-mail The time the employee spent reading e-mail ?The time the employee spent composing e-mail ?The number of attachments ?The type of e-mail business-related or non-business related My conclusion on the case studyEmployees privacy rights in the workplace depend on whether they work in the humans sector or underground sector. Because constitutional rights operate primarily to protect citizens from the government1 state action is demand before a citizen can invoke a constitutional right. Therefore, since most Americans work in the cloak -and-dagger sector, the United States Constitution and its corresponding Fourth Amendment privacy protect provides little guidance in private sector e-mail monitoring situations.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.