As
technology usage grows, so does the ethical concerns related to email usage and
privacy. In my workplace, employees are asked to acknowledge a policy related
to email usage in the workplace. It is
part of a bigger policy addressing internet, email, electronic communications,
and information security. The purpose of this policy is to ensure that
employees use company computer systems and applications in a legal, ethical,
and appropriate manner. The policy also aims to safeguard employees, company
assets, and company information.
As a company
with over 750 locations across the US and Canada, we rely heavily on email
communication. The policy helps to inform employees about email usage and how
to utilize sound judgment pertaining to this form of communication.
The policy
also specifies what is considered a harassing or harmful email, what would be
considered offensive or inappropriate, and what could be portrayed as harmful.
Through these standards, employees are able to understand and recognize what would
be considered inappropriate in nature. Also addressed is the concern related to malicious
emails. Email is often a target of attack for a company. Spam, spoofing,
hyperlinks, and phishing all pose threats to the company, the employees, and
its data. Through policies and standards, employees are made aware of these
potential threats.
Limited
personal use of email is expected and allowed at my company, as long as it is
not abused. With this privilege comes the understanding and the expectations
related to privacy. Employees understand
that no expectation of privacy exists in any information they send or receive
with a company computer or email. The
company has the right to gain access to employee email at any time with or
without consent. It is this understanding that helps to protect the company and
employees from the misuse of email.
The
study E-MAIL PRIVACY IN THE WORKPLACE - A
Boundary Regulation Perspective by Jason L. Snyder, examined employee perception
and response related to email monitoring in the workplace. Although companies
need to, and are allowed to, monitor employee email usage to protect
themselves, the study shares a common perception of a typical employee.
According to the study, email monitoring can lead “to a lack of trust in one’s
supervisor and organization’s top
management. Thus, when employees feel a reduced sense of e-mail privacy as a
result of a perceived increase in e-mail monitoring, they are likely to
conclude that they are not trusted and are likely not to trust others in the
workplace. This can create an unhealthy work environment characterized by a
lack of trust”(Snyder, page 276). The author
further states that “it is important to keep in mind that organizations often
have good intentions for e-mail monitoring, such safeguarding their own legal
interests and protecting employees from harassment”(page 276). This is a
balance that the company needs to manage.
I believe that through proper communication setting the expectations
related to privacy, employees should understand why a company needs to protect
themselves.
Much like my
company’s policy related to email usage, the author states that “while this
study focused on e-mail monitoring and feelings of privacy, there are many
technologies that people use for workplace communication. As the use of new
communication technologies such as instant messaging, social networking sites,
and corporate blogs becomes more prevalent in the American workplace, they
present interesting paths for inquiry for business communication researchers” (Snyder,
page 289).
Some
interesting cases related to this topic include: Smyth v. Pillsbury, Falmouth Firefighters Union v.
Town of Falmouth, and Holmes v. Petrovich
Development Company, LLC.
Based on an
article from the Monthly Labor Review from back in 2003, employees’ perceptions
at that time were very interesting.
According to the study, “almost
55 percent of employees thought that their employers were not monitoring either
their Internet usage or the e-mails they sent and received. Further-more, only
57 percent thought that employers should have the right to monitor their
employees’ Internet and e-mail usage” (Muhl, page 2). Below are results from a
survey conducted then:
A link to the article
this came from is below – it offers interesting viewpoints as well as a good
look at the change in viewpoint from then until now.
http://www.bls.gov/opub/mlr/2003/02/art3full.pdf
References:
Muhl,
Charles J. Workplace e-mail
and Internet use: employees and employers beware. Monthly Labor Review February 2003. Retrieved June
19, 2015. http://www.bls.gov/opub/mlr/2003/02/art3full.pdf
Snyder,
Jason L. 2010. E-MAIL PRIVACY IN THE WORKPLACE A Boundary Regulation
Perspective. Central Connecticut State University. Journal of Business
Communication, Volume 47, Number 3, July 2010 266-294. Retrieved June 19, 2015.
http://content.ebscohost.com.library.esc.edu/ContentServer.asp?T=P&P=AN&K=54903037&S=R&D=bth&EbscoContent=dGJyMMTo50Sep7c4yOvsOLCmr02eprdSr6e4SLOWxWXS&ContentCustomer=dGJyMPGttEqvqrVKuePfgeyx43zx.


Hi Cathy,
ReplyDeleteSince we will be exploring this topic in more depth for our white paper I wanted to respond to your post with some of my initial thoughts and questions about this topic. I think this subject presents an interesting ethical question because of the reasonableness of anxiety related to the issue on the part of both the employer and the employee. On the part of the employer it seems perfectly reasonable for them to want to know, via monitoring email, how an employee is representing the company in company matters using company equipment and information. On the part of the employee it seems reasonable that an over-emphasis on this route of access and a perception of the existence of aggressive monitoring on the part of the employer would seem like mistrust. Balancing and clarifying these roles seems like a critical part of resolving this issue. An employee's perception of being mistrusted could be aggravated by lack of clarity in access policies and give rise to questions like, "If they look at my email, do they look at my whole computer? Can they see my browsing history, my personal email, etc." Would applications that allowed employees to see when and how their computers were accessed help resolve these uncertainties? Would it help, for instance, if an employee could login to some area of the intranet that would quantify the access, "Your supervisor looked at your email history twice last week and read one email."
I also wonder if internet connected phones are changing employee perceptions of email privacy since many more employees now have access to private emails during the day in a way that is unconnected to their work computer.
Anne
Hi Anne - great points and great questions. I think we made a good choice for our white paper - I think there is a lot we can consider for sure. It is a good topic for evaluating both pros and cons and there is opportunity to look at actual cases in relation to this topic to help determine best practices, etc.
DeleteThanks!
Cathy