.

Monday, March 11, 2019

Employee Handbook Privacy Section Essay

tally to Connelly, Roberts, and McGivney, LLC (1998), in todays workplace computers and electronic communications are the average rather than the excerption (p. 1). With technology, rapidly advancing electronic communication is decorous essential. This creates a challenge for organisations on how and what to monitor when it comes to its employees. This idea bequeath phone the issue of secrecy in the global workplace and give suggestions on what solitude rights issues should be addressed, as well as what the comp eachs position should be in response to its covert rights. Lastly, it will position how organizations privacy nourishions whitethorn limit the comp eachs financial obligation and how privacy protections raise employee motivation and productivity.privateness Rights to be Addressed The majority of employees look to hold in a certain amount of privacy in the workplace. Nevertheless, in that location are times where the employer whitethorn have a justifiable cau se to monitor or investigate the employees within its organization. The following declare oneselfs well-nigh business pr coiffeices that may be imposed to insure the honesty of the organization and the employees within the organization. One privacy right that should be addressed is medicine testing. Drug testing helps to run into the safety of the workplace. According to Jankanish and Husbands (1993), drug and intoxi peckt testing programs should fit within existing arrangements for ensuring the quality of work life, employee rights, the safety, and certificate of the worksite, and employer rights and responsibilities (e.g. protection of the public interest) (p. 105).The testing should verify the workers rights and confidentiality of the results. opposite issue to be addressed is background checks on potential invigorated hires. The Fair Credit Reporting execution (FCRA) has set guidelines and standards for organizations to follow when implementing a background check. Ac cording to Alison Doyle (nd), the FCRA defines a background check as a consumer report. Before an employer can get a consumer report for employment purposes, they must notify you in writing and get your written authorization (p. 1). pull down if an employer is just running a basic check for inquiry purposes they must still get permission from the employee. The purpose of the background check is to ensure that randomness that was provided from the applicant is truthful, and some organizations require certain protective covering clearances, or the psyche may be applying for a position that works about with children. The employer still pauperizations to have permission from the applicant in grade to run these background checks. Lastly, the employer needs to protect the privacy of employee personal selective selective development.According to Brian Koerner (nd), twenty five percent of all identity thieves are cognise by the victim whether it be a friend, relative, or co-w orker (p. 1). Employers need to take steps to keep personal information such as social protection numbers, home addresses, and phone numbers safe. This information if obtained by the wrong person could lead to identity theft. Employers need to ensure that the curb steps are taken to keep employee information confidential. This can be done by utilizing an employee number rather than the employees social security number, run into sure that personal information is not posted where it is advantageously accessible, only allowing acceptable personnel to handle confidential information, and dispose of information and documentation appropriately (about.com). Limiting Liability It is important that companies at a lower placestand the divergent potential corporate and personal financial obligation when preparing, planning, implementing or maintaining an employee privacy vade mecum section. Companies must remain aware of potential issues that may need to be addressed in put together t o remain proactive and avoid liability pitfalls.There are many areas of potential liability an organization that includes negligence, liability under the privacy act, loss, or utilise of personal records, and criminal liability. In order to provide an organization with the most liability protection, they must be aware of what these liabilities are. Negligence is the failure to provide honest care, which result in damages to another person or company. If a company or organization does not take reasonable care to provide decent protection for their employees or customers information and the employee or customer suffers damages, the organization may be legally responsible for the amount of loss suffered. In order to avoid negligence, organizations must be proactive and provide adequate security. The covert Act was created to ensure that companies are obligated to provide protection in ways that they retain, collect, use, and disclose personal information (Bushkin, p. 1). Companies covered by the cover Act are required to protect private and personal information they hold. Companies must avoid misuse and loss as well as unauthorized access. Whether it is physical protection or electronic protection, companies must provide a reasonable level of security.Companies who act negligent and cause immoderate damages to singles or customers may face criminal liability. Companies must act appropriately when dealing with private or personal information. Intentional misuse of personal or private information may result in criminal proceedings. Companies must take reasonable measure to ensure that the security systems in place adequately protect their employees and customers information. It is supposed(prenominal) that an organization will be held responsible for information lost delinquent to security attacks provided that they have acted reasonably in their attempts to protect the information (Givens, p. 1). Companies can face significant damages and a direct loss in business as well as liability to third parties if they do not proved the necessary security measures. By designing, developing and implementing a strong security policy as well as educating employees on how to handle private and personal information, companies can protect themselves and their employees from potential liabilities. It may be necessary for companies to audit their employees to ensure that information is not cosmos misused.Addressing the laws required in the employee vade mecum regarding privacy will consist of the concealing Impact Assessment (PIA). A PIA is an analysis of how information is handled (1) to ensure handling conforms to applicable legal, regulatory, in addition, policy requirements regarding privacy, (2) to ensconce the risks and effects of collecting, maintaining, and disseminating information in identifiable form in an electronic information system, and (3) to try on and evaluate protections and alternative processes for handling information to mi tigate potential privacy risks (September 26, 2003). When addressing the laws regarding privacy in the employee handbook the following processes will occur.Whenever any office makes a determination under this section not to amend an undivideds record in accordance with his or her collect, or fails to make such review in conformity or fails to maintain any record concerning any individual with such accuracy, relevance, timeliness, and completeness as is necessary to assure fairness in any determination relating to the qualifications, character, rights, or opportunities of or benefits to the individual that may be made on the basis of such record, and because a determination is made which is adverse to the individual or fails to stick with with any other provision of this section, or any rule published there under, in such a way as to have an adverse effect on an individual, the individual may bring a civil consummation against the place, and the district tourist coquettes o f the United States shall have jurisdiction in the matters under the provisions of this section (September 26, 2003).The court may order the deputation to amend the individuals record in accordance with his request or in such other way as the court may direct. In such a event the court shall determine the matter de novo. The court may assess against the United States reasonable attorney fees and other litigation costs reasonably incurred in any case under this paragraph in which the complainant has substantially prevailed (September 26, 2003). The court may enjoin the authority from withholding the records and order the production to the complainant of any agency records improperly withheld from him (September 26, 2003.) In such a case the court shall determine the matter de novo, and may examine the contents of any agency records in camera to determine whether the records or any portion thence may be withheld under any of the exemptions set forth in this section and the burden are on the agency to sustain its action (September 26, 2003). The court may assess against the United States reasonable attorney fees and other litigation costs reasonably incurred in any case under this paragraph in which the complainant has substantially prevailed (September 26, 2003).In any grounds brought under the provisions of this section in which the court determines that the agency acted in a manner, which was intentional or willful, the United States shall be liable to the individual in an amount equal to the sum of actual damages sustained by the individual as a result of the refusal or failure, nevertheless in no case shall a person entitled to recuperation receive less than the sum of $1,000 and the costs of the action together with reasonable attorney fees as determined by the court (September 26, 2003). An individuals name and address may not be sold or rented by an agency unless such action is specifically authorized by law (September 26, 203). This provision sha ll not be construed to require the withholding of name and addresses otherwise permitted to be made public.Matching agreements, no record, which is contained in a system of records, may be disclosed to a recipient agency or non-Federal agency for use in a computer-matching program except pursuant to a written agreement between the sources agency and the recipient agency or non-Federal agency specifying (September 26, 2003). Having this section in the privacy handbook takes some ethical considerations because providing key rules and regulations in protecting someones personal information is extremely important. Due to the amount of technology in this day of age moreover, the amount of identity theft it is crucial to protect personal information. Having trust and security is an ethical consideration for the fact that someone will feel protected by the laws and the company.Corporations are faced with challenges day-by-day on how to protect their employees. By implementing and using the employee handbook privacy, section this will help to keep these companies records safe and secure for the employees. Technology has made it too easy for hackers to access information so by regulating how the information is kept will help to ensure the safety of the employees information. What this paper covered is the issue of privacy in the global workplace and gave suggestions on what privacy rights issues should be addressed, as well as what the companys position should be in response to its privacy rights. Lastly, it defined how organizations privacy protections may limit the companys liability and how privacy protections enhance employee motivation and productivity. With all of these guidelines in place the employees will have a better sense of security in the workplace.ReferencesBushkin, Aruthur A. The Privacy Act of 1974 A Reference Manual for Compliance. Retrieved October 30, 2006 from http//www.cavebear.com/nsf-dns/pa_history.htm Connelly, Roberts, and McGivney, LLC. ( 1998). Privacy Issues in a High-Tech Workplace. Retrieved October 29, 2006 from http//library.findlaw.com/1998/ flub/1/130358.html Doyle, A. (nd). Background Check Employment. Retrieved October 29, 2006 from http//jobsearch.about.com/cs/backgroundcheck/a/background.htm Givens, Beth. Legislative Hearing, Privacy Rights. Retrieved October 30, 2006 from http//www.privacyrights.org/ar/outsourcing-privacy.htm Jankanish, M. & Husbands, R. (1993). Workers Privacy. Retrieved October 29, 2006 from http//books.google.com/books?vid=ISBN9221087468&id=eisbpZMK4qkC &pg=PA105&lpg=PA105&dq=what+privacy+rights+issues+should+be+addressed&sig=zL07cCOHNB7lOgu2Z9RwX8sBASg Koerner, B. (nd). Is Your Employer protect Your Personally Identifiable Information? Retrieved October 29, 2006 from http//idtheft.about.com/od/workplaceidentitytheft/p/workplacePII.htm The Privacy Act of 1974. 5 U.S.C. 552a 552a. Records maintained on individuals as Amended, Updated page September 26, 2003. Retrieved on October 30, 2006 from http//www.usdoj.gov/oip/privstat.htm

No comments:

Post a Comment