Tuesday, December 17, 2019

Use and Abuse of Computers - 5450 Words

USE AND ABUSE OF COMPUTERS IN THE WORKPLACE by Bob Gregg Boardman Clark LLP One South Pinckney Street, 4th Floor P. O. Box 927 Madison, WI 53701-0927 Telephone (608) 283-1751 rgregg@boardmanclark.com Our major form of workplace communication is becoming electronic. People do not have faceto-face, oral conversations. Email is taking over. It is fast, efficient—and dangerous. Employees just rip off an email with far less thought or editing than a letter. The e-system has replaced the break room for office gossip, harassment, betting, romantic advances and a myriad of other forms of indiscretion or illegality. Yet, when the employer imposes rules or monitoring, employees resist, or sue, over invasion of personal use of â€Å"their† computer.†¦show more content†¦The article does illustrate the issue of electronic discovery. Plaintiff attorneys now acquire reams of â€Å"informal† texting and emails and comb through them for anything which might support a case, no matter how â€Å"off the cuff† the message may have been. Once in the email â€Å"record,† the comment has a life, far more significant than oral stray remarks. So, defense attorn eys are now advising a process which protects against that problem, but might also impair the effectiveness of responders. EMPLOYEE USE OR ABUSE Use Whose system is it anyway? The computers were purchased using the employer’s budget. 2 They are labeled as â€Å"property of† the company or public agency. but The computer sits on the desk of an individual, who has a personal email address. The Constitution, U.S. Electronic Communications Privacy Act, and other state and local laws can provide expectations of privacy and restrictions on â€Å"invading† the employees’ usage. and In the public sector, the public owns the system. All government property and systems are for the people and ultimately belong to the people. The public has rights to know what is going on in the government system, with their tax dollars. Anyone can make a â€Å"public records request.† Public Records/Freedom of Information Requests Private romance or public scandal? In the case of In re Petition of the Bd. of Commissions of Arapahoe County 95 P.3d 593, 2003 Col. App. Lexis 1151 (Col. Ct. App., 2004), theShow MoreRelatedThe Computer Fraud And Abuse Act897 Words   |  4 PagesThe Computer Fraud and Abuse Act does h ave is befits when protecting people though. The act itself is completely necessary and has made the United states a safer place. The act protects user information from companies and hackers. In September of 2000 America Online won its case against the National Health Care Discount corporation for violation of the Computer Fraud and Abuse Act. The National Health Care Discount corporation hired emailers to send bulk emails to the internet service provider AmericaRead MoreThe Billing Of Billing Medicare1587 Words   |  7 Pagesoccurred. This can involve forging the signature of those enrolled in Medicare or Medicaid, and the use of bribes or as Healthcare calls it, kickbacks to corrupt healthcare professionals. Upcoding of services is the act of billing Medicare programs for services that are more costly than the actual procedure that was done. Upcoding of items is also very similar to upcoding of services, but it involves the use of medical equipment. For example, billing Medicar e for a highly sophisticated and expensive wheelchairRead MoreInternet Abuse Essay1710 Words   |  7 Pagesto circulate, computers with Internet capabilities became as commonplace as pencils and post-it-notes on employees’ desks. The positive affects the Internet merit, also leave room for the Internet’s negative affects as well. Access to the Internet from an employee’s computer allows that employee to spend time viewing content from non-work related sites. This is in essence what the Internet abuse problem is – spending paid work-time on non-work related activities. Internet abuse problems haveRead MoreThe Invisibility Factor Of Computers1185 Words   |  5 Pages In James Moor’s publication in METAPHILOSOPHY entitled â€Å"What Is Computer Ethics† Moore discusses the fact that the â€Å"invisibility factor of computers presents us with a dilemma.† The invisibility factor relates to the fact that computer operations are o ften invisible; they can’t be viewed by man (Moore, 1985). To explain this concept, Moore gives the example of a computer programmer. Moore explains that the computer programmer may be aware of what was input and output, he/she may not completelyRead MoreThe Pros And Cons Of Internet Privacy1309 Words   |  6 PagesNow, the Internet is not only a way people access information, but also the net that connects them. People use it to communicate with friends and family, keep current events and shop online. The using of Internet sometimes involves personal data, triggers fraud and abuse. These are the reason people have laws to protect themselves. People now much more cherish their privacy, so the government takes the responsibility of establishing the Internet privacy law and develop them. However, the legislativeRead MoreHow Technology Can Do For Us? Essay976 Words   |  4 Pagesexploit or abuse it. Every workplace affected in positive way has the risk of be affected with a misuse of the technology not only for the employees but anyone that seek to work there. How a prospect employee to a company of business can sabotage his or her job interview through technology? Technology creation The technology has been created by people that dream to facilitate, improve and make life easy. In old time television, science fiction programs like â€Å"Lost in Space† picture a large computer coveringRead MoreComputer Fraud And Abuse Act ( Cfaa ) And Cyberbullying Essay1665 Words   |  7 PagesEmily Jessep Intellectual Property Crimes Professors Dreyfuss and First November 15, 2016 INCOMPATIBLE: The Computer Fraud and Abuse Act (CFAA) and Cyberbullying I. Introduction The Computer Fraud and Abuse Act (CFAA) does not cover cyberbullying done via social networking websites and should not be used to prosecute it. Application of the CFAA to cyberbullying prosecutions is inconsistent with the intended scope of the statute and the existing interpretations of its provisions. PracticallyRead MoreMonitoring : Monitoring A Monitoring Program861 Words   |  4 Pagestool such as our ContentProtect on company computers to block or track websites not related to work activities, and if you suspect excessive wasted time, the IT group can install an activity-monitoring software such SpectorSoft to follow all computer activity on a particular PC. (para 10) However, companies need to make employees aware that this monitoring is what is happening. With the knowledge of their activities being tracked, they are less likely to abuse it. Also as demonstrated earlier, invasionRead MoreInternet Crimes And The Internet1719 Words   |  7 Pagesabout cybercrime, how and when it came in existence. The researcher then will categorize cybercrimes into 2 parts, cyber abuse and cyber-attacks. This in turn has a few subtopics to follow. And lastly, the researcher will discuss prevention from these kind of attacks. Technology has been increasing so rapidly in the past fifteen years that it has increased the use of computers in our daily lives and in the business sector. To keep pace with the rapid increase in technology, industries such as bankingRead MoreErik Erikson’s Psychosocial Stages and Middle Childhood Development1596 Words   |  7 PagesDevelopment Boyd, Johnson, Bee (2009) say that, â€Å"between the ages 6 and 12, children grow 5 to 8 centimeters and add about 2.75 kilograms each year.† The child will be able learn how to use their large muscles to learn new skills such as running long distances in track and field and riding their bike without the use of training wheels (Boyd, Johnson, Bee, 2009). There is an improvement in their hand eye coordination which enables the child to catch or kick a ball in field sports (Boyd, Johnson,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.