TITLE

Lawsuit Threat Fuels E-Mail Monitoring

AUTHOR(S)
Dickinson, Casey J.
PUB. DATE
June 2000
SOURCE
Business Journal (Central New York);06/09/2000, Vol. 14 Issue 23, p16
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Reports that the potential for lawsuits arising from corporate electronic mail is fueling a trend toward monitoring employee messages. Employers' increased sensitivity over e-mail systems; Legal protection for employers' practice of monitoring company e-mail; Limits of the right to monitor company e-mail; Other legal remedies for employers.
ACCESSION #
3233514

 

Related Articles

  • PRIVACY.  // International Law Update;Sep2000, Vol. 6, p141 

    Focuses on the European Commission's decision on the adequacy of protection of personal data transferred from the European Union to the United States.

  • If All the World's a Computer... McGrath, Peter // Newsweek;12/27/1999, Vol. 134/135 Issue 26/1, p72 

    Focuses on the concept of ubiquitous computing in which items such as clothing are computerized devices. Eyeglasses as the medium of choice for BodyNet and the Personal Area Network, or PAN; Effect on privacy.

  • No Excuses: Make Networking a Priority. Lee, Katherine Spencer // Certification Magazine;Aug2005, Vol. 7 Issue 8, p33 

    The article cites some common networking barriers and ways of overcoming them. First is lack of time. To work around a busy schedule, try meeting with people over breakfast or lunch. Many professional organizations also plan their networking events during these hours to make it easier for people...

  • OFF THE RECORD. A. C. K. // Entrepreneur;Jan2007, Vol. 35 Issue 1, p54 

    The article introduces the VaporSteam, a new web-based recorded electronic mail service which could send electronic messages without leaving any record of its existence in the U.S. According to the author, messages in the said e-mail could be viewed but could not be forwarded and keep...

  • CASTLE: Continuously Anonymizing Data Streams. Jianneng Cao; Carminati, Barbara; Ferrari, Elena; Kian-Lee Tan // IEEE Transactions on Dependable & Secure Computing;May/Jun2011, Vol. 8 Issue 3, p337 

    Most of the existing privacy-preserving techniques, such as k-anonymity methods, are designed for static data sets. As such, they cannot be applied to streaming data which are continuous, transient, and usually unbounded. Moreover, in streaming applications, there is a need to offer strong...

  • Electronic mail and privacy. Veeder, Stacy B.; Hernon, Peter // Journal of Academic Librarianship;Mar1995, Vol. 21 Issue 2, p123 

    Discusses issues on privacy arising from the use of electronic mail (e-mail). Limitations in the protection of privacy through the e-mail; Passage of the Electronic Communications Privacy Act (ECPA) in 1986; Interception and disclosure of communications during transmission; Lawsuits filed under...

  • Should e-mail messages be considered public documents? Shanoff, Barry // Waste Age;Jun99, Vol. 30 Issue 6, p10 

    Discusses the provisions of the Freedom of Information Act of 1996 in the United States concerning the legality of treating electronic mail (e-mail) correspondence between government officials as public documents. Inclusion of e-mail among matters which the public has the right to know about;...

  • E-Mail in the Workplace: Limitations on Privacy. Pivec, Mary E.; Brinkerhoff, Susan // Human Rights;Winter99, Vol. 26 Issue 1, p22 

    A variety of now common electronic devices such as e-mail have made workplace communications much faster and more efficient than even ten years ago. Unfortunately, however, the law has not kept pace with this technology, and as a result, a myriad of legal questions have arisen, not the least of...

  • Reveiw e-mail policies with employees before problems occur. Leeds; Morrow, Hal // Business Press;08/13/99, Vol. 12 Issue 16, p3A 

    Expounds on privacy issues stemming from the use of computers in offices in the United States. Prevalence of use of electronic mail, voice mail and databases; Abuse of e-mail privilege; Factors to include in company's e-mail policy.

Share

Read the Article

Courtesy of NEW JERSEY STATE LIBRARY

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics