This preview shows page 1. Sign up to view the full content.
Unformatted text preview: ing them into a corporation. These steps are necessary to help the company protect itself and to ensure it is getting the type of employee required for the job. This
chapter looks at some of the issues from the other side of the table, which deals
with that individual’s privacy rights.
Limitations exist regarding the type and amount of information that an organization can obtain on a potential employee. The limitations and regulations for
background checks vary from jurisdiction to jurisdiction, so the hiring manager
needs to consult the legal department. Usually human resources has an outline for
hiring managers to follow when it comes to interviews and background checks.
If a company feels it may be necessary to monitor e-mail messages and usage, this
must be explained to the employees, first through a security policy and then through a
constant reminder such as a computer banner or regular training. It is best to have an
employee read a document describing what type of monitoring they could be subjected
to, what is considered acceptable behavior, and what the consequences of not meeting
those expectations are. The employees should sign this document, which can later be
treated as a legally admissible document if necessary. This document is referred to as a
waiver of reasonable expectation of privacy (REP). By signing the waiver, employees
waive their expectation to privacy.
A company that wants to be able to monitor e-mail should address this point in its
security policy and standards. The company should outline who can and cannot read
employee messages, describe the circumstances under which e-mail monitoring may be
acceptable, and specify where the e-mail can be accessed. Some companies indicate that
they will only monitor e-mail that resides on the mail server, whereas other companies
declare the right to read employee messages if they reside on the mail server or the
employee’s computer. A company must not promise privacy to employees that it does
not then provide, because that could result in a lawsuit. Although IT and security professionals have acc...
View Full Document
This note was uploaded on 06/01/2013 for the course NET 125 taught by Professor Hurst during the Fall '12 term at Wake Tech.
- Fall '12