SEARCH RESULTS

YOU WERE LOOKING FOR :Workplace Technology and Privacy Laws

Essays 1 - 30

Workplace, Technology, and Privacy Laws

In twenty pages this paper discusses the U.S. workplace and how technology has impacted upon employee rights and generated many le...

Employers Monitoring Computer Use

There is no single comprehensive law that covers employee privacy rights or what types of privacy an employee should expect. Due t...

The Application of Privacy and Copyright Laws in Australia

sold articles to different publication, they are not under salary or retainer and they carry the risk and the cost of undertaking ...

Computer Age and Information Ethics

technology in general. The ease with which personal information can be unscrupulously gleaned from the multitude of computerized ...

E-mail Privacy, Business Ethics, Perceptions, and Standards

This paper addresses various issues relating to e-mail in the workplace and perceptions of privacy by employees. The author prese...

Technology is Not Neutral

think we "fit" the services they offer. While this may be merely annoying when it comes to dealing with the junk mail, both snail ...

Computer Age and Privacy Issues

modern technology in general. The ease with which personal information can be unscrupulously gleaned from the multitude of comput...

Legal Challenges Brought About by E-Commerce

hours a day regardless of weather conditions or customers state of dress (i.e., the customer can shop at midnight in his pajamas)....

Workplace Privacy and Skinner v. Railway Labor Executives Association, 489 U. S. 602, 1989

In five pages this paper examines privacy in the workplace with regards to this case that considered whether or not mandatory work...

Internet vs. Privacy up to Individual Tastes

individuals cannot act for everyone. For this reason, Internet child pornography laws were passed because children are more vulner...

Retail Stores Seek Too Much Information

their power to not only attract new customers but retain the ones they get. It is their intentions to build a relationship with th...

Inspectors General Limited to Investigating

The Electronic Communications Privacy Act of 1986 addressed privacy and electronic communication. It limits what law enforcement c...

"Internet and Computer Law: Cases-Comments-Questions": A Discussion of the Principles Illuminated by Authors Peter B. Maggs, John T. Soma, and James A. Sprowl

and Computer Law: Cases-Comments-Questions", a casebook compiled by authors Peter B. Maggs, John T. Soma, and James A. Sprowl, out...

The Non-Neutrality of Technology

comes to dealing with the junk mail, both snail mail and email, that comes pouring into our homes, it is something else when the i...

Law Enforcement Technology in the 21st Century

- protection from injustice - focuses on protecting the individuals rights and is usually called the Due Process Model (Perron). T...

The Need for Privacy

which existed, including the barriers created by geography, physical disabilities and stereotyping associated with appearance. The...

A Consideration of Ann Wells' 'Who Owns Information?: From Privacy to Public Access'

risks which currently exist in regard to information privacy and eloquently addresses the evolutionary trend toward information ma...

Convicted Sex Offenders, Privacy Issues, and New Jersey's Megan's Law

In fourteen pages this paper examines Megan's Law in a case law assessment as well as its impact upon the privacy of convicted sex...

Cyer Law Privacy v. Security

Businesses have an interest in free information flows. Businesses are also under a threat from cyber criminals and terrorists. Whi...

The Naked Society by Vance Packard

in many different ways, invading privacy and pushing their way into our lives. While many people accept it today, the pressures in...

Cyberspace Crimes and the Law

offences and the law has not been able to keep pace with new technology. With law enforcement lagging behind, cyber criminals some...

Workplace and IT

In fifteen pages 3 sections designed to answer student posed questions regarding information technology and the workplace includes...

Individual, Organizational and Technological Influences on the Adoption Rate of Technology in the Workplace

type and a personal cost benefit assessment. In all the categories many of the influences may be complex, often there are ...

Employers Right of Surveillance over Employees

has been found to incorporate communication that may not yet have been opened or received, or those that have been deleted. The ...

Office Equipment and Computer Misuses and Abuses by Employees

In six pages this research paper examines email and Internet misuses and abuses by employees in the workplace, discussing issues o...

Workplace and Individual Privacy Right

In three pages this paper examines the workplace in a consideration of an individual's right to privacy. Three sources are cited ...

Workplace Privacy Rights

In nine pages this paper examines privacy rights as they pertain to the contemporary workplace. Six sources are cited in the bibl...

Privacy and the Workplace

In three pages this paper discusses the American right to privacy which the workplace should honor. Three sources are cited in th...

Reasons for Preemployment Testing in the Workplace

success in the marketplace. One employer put it this way: "Even if the candidate has all the skills and is uniquely compatible wit...

NJ State Troopers and Privacy Rights

a person in a position that cannot be held by someone with AIDS submits a receipt for AZT; in the third, a claims administrator se...