際際滷

際際滷Share a Scribd company logo
JEREMY AND JEANNETTE
CASE
 By: Michael Perez
 Instructor: Gina Riestra
 MGT 3610 Human Resource Management
 Polytechnic University of Puerto Rico
Does Jeremy have a right to privacy
in his personal computer at work?


 Jeremy have the right to protect his privacy of his
  personal computer because the machine belong
  to him.
Does it matter that the employer has
policy prohibiting personal Internet
surfing?

Employer has the right to of prohibiting
 personal internet surfing because employer
 lost money, employee lost productivity

Possibility that a user will use enterprise
 property to download viruses, transmit
 sensitive company information, or use
 enterprise property to break the law.
Does the fact that Jeremy works for a
government employer make a difference in terms
of the law to be applied to the analysis? If so,
what difference does it make?

 He is at work he and the policy say electronic
  communications are monitored need.

 In government workplace are something warrantless for
  search and monitory privacy, when you violating the policy
  and break the law not matter if is your personal computer

 As a general rule, a government employee would continue
  to have an expectation of privacy in his or her personal
  belongings that have been brought into the workplace
  environment.
Jeremy and jeannette case
If Jeremy is indeed going to
pornographic sites and a colleague
objects, does Jeremys behavior expose
the employer to liability?

 If Jeremy is indeed going to porno site, employer can take
  a disciplinary action against for his behavior and sexual
  harassment complaint.

 The company need blocked pornographic site for this kind
  of issue dont happen in the future.

 Make the prohibited of the use of personal computer at
 work.
Bibliography

 Maidment, F. (2011). Annual Editions: Human Resources 10/11
  (19th Edition ed.). (F. Maidment, Ed.) McGraw-Hill Higher
  Education.

 Lemons, B. R. (n.d.). Warrantless Workplace Searches of
  Government Employees.       Retrieved 8 26, 2011, from Warrantless
  Workplace Searches of Government Employees:
  www.khodges.com/iacp/GovernmentEmployeeSearches.doc
Ad

Recommended

Managing Social Media Risks for Municpalities
Managing Social Media Risks for Municpalities
Dan Michaluk
Is employer monitoring of employee email justified
Is employer monitoring of employee email justified
Parker Donat
Social Media in the Workplace and Beyond
Social Media in the Workplace and Beyond
AlexNemiroff
Social media, staff policy and law legal
Social media, staff policy and law legal
Adam Lewis
Social Media and Employee Privacy
Social Media and Employee Privacy
Dan Michaluk
Final powerpoint for social media club program
Final powerpoint for social media club program
Social Media Club North Jersey
10 tedesco karia social media - tedesco law group - wscff april 2014
10 tedesco karia social media - tedesco law group - wscff april 2014
shibrah76
Social media risks and rewards amo conference 2011 draft 5
Social media risks and rewards amo conference 2011 draft 5
Dan Michaluk
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
Dan Michaluk
Privacy and social media in the workplace
Privacy and social media in the workplace
Bailey and Wyant PLLC
Cyber ethics
Cyber ethics
fifiamalina
Internet Misuse inside the Company
Internet Misuse inside the Company
Roberto de Paula Lico Junior
Uop hrm 420 week 1 assignment privacy concerns scenario new
Uop hrm 420 week 1 assignment privacy concerns scenario new
eyavagal
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and Blogosphere
Kelly Savage
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Case IQ
Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities Pittfalls
Amy Shriner
Social Media in California: Policing Workers Online
Social Media in California: Policing Workers Online
Allen Matkins
Uop hrm 420 week 1 assignment privacy concerns scenario new
Uop hrm 420 week 1 assignment privacy concerns scenario new
vindaniel123
Fact Pattern Analysis
Fact Pattern Analysis
Christina Leftridge
Employers and Social Media: You Love to Love It & Love to Hate It
Employers and Social Media: You Love to Love It & Love to Hate It
Janine Anthony Bowen, Esq.
Workplace Privacy
Workplace Privacy
Employers Association of New Jersey
Workplace Privacy Presentation
Workplace Privacy Presentation
Sarah Forbes
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
Anirudhya Reevu
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Christina Gagnier
Electronic defamation
Electronic defamation
Apostolos Syropoulos
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Shawn Tuma
Social Media Risk Management Part 2
Social Media Risk Management Part 2
Cross Channel Marketing Consultants
Ethical implications of information technology
Ethical implications of information technology
Wish Mrt'xa
Owensboro
Owensboro
Will Valet
姨娶妍奸
姨娶妍奸
e.agjoyan

More Related Content

What's hot (20)

The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
Dan Michaluk
Privacy and social media in the workplace
Privacy and social media in the workplace
Bailey and Wyant PLLC
Cyber ethics
Cyber ethics
fifiamalina
Internet Misuse inside the Company
Internet Misuse inside the Company
Roberto de Paula Lico Junior
Uop hrm 420 week 1 assignment privacy concerns scenario new
Uop hrm 420 week 1 assignment privacy concerns scenario new
eyavagal
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and Blogosphere
Kelly Savage
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Case IQ
Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities Pittfalls
Amy Shriner
Social Media in California: Policing Workers Online
Social Media in California: Policing Workers Online
Allen Matkins
Uop hrm 420 week 1 assignment privacy concerns scenario new
Uop hrm 420 week 1 assignment privacy concerns scenario new
vindaniel123
Fact Pattern Analysis
Fact Pattern Analysis
Christina Leftridge
Employers and Social Media: You Love to Love It & Love to Hate It
Employers and Social Media: You Love to Love It & Love to Hate It
Janine Anthony Bowen, Esq.
Workplace Privacy
Workplace Privacy
Employers Association of New Jersey
Workplace Privacy Presentation
Workplace Privacy Presentation
Sarah Forbes
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
Anirudhya Reevu
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Christina Gagnier
Electronic defamation
Electronic defamation
Apostolos Syropoulos
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Shawn Tuma
Social Media Risk Management Part 2
Social Media Risk Management Part 2
Cross Channel Marketing Consultants
Ethical implications of information technology
Ethical implications of information technology
Wish Mrt'xa
The ugly, the bad and the good of cloud computing
The ugly, the bad and the good of cloud computing
Dan Michaluk
Privacy and social media in the workplace
Privacy and social media in the workplace
Bailey and Wyant PLLC
Uop hrm 420 week 1 assignment privacy concerns scenario new
Uop hrm 420 week 1 assignment privacy concerns scenario new
eyavagal
Employee Misuse of Internet and Blogosphere
Employee Misuse of Internet and Blogosphere
Kelly Savage
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Case IQ
Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities Pittfalls
Amy Shriner
Social Media in California: Policing Workers Online
Social Media in California: Policing Workers Online
Allen Matkins
Uop hrm 420 week 1 assignment privacy concerns scenario new
Uop hrm 420 week 1 assignment privacy concerns scenario new
vindaniel123
Employers and Social Media: You Love to Love It & Love to Hate It
Employers and Social Media: You Love to Love It & Love to Hate It
Janine Anthony Bowen, Esq.
Workplace Privacy Presentation
Workplace Privacy Presentation
Sarah Forbes
Social Networking (Ethics in Information Technology)
Social Networking (Ethics in Information Technology)
Anirudhya Reevu
Gagnier's Portion of TechWeek Chicago Presentation
Gagnier's Portion of TechWeek Chicago Presentation
Christina Gagnier
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Social Media Law: It is Real, and, Yes, It Really Can Impact Your Business - ...
Shawn Tuma
Ethical implications of information technology
Ethical implications of information technology
Wish Mrt'xa

Viewers also liked (12)

Owensboro
Owensboro
Will Valet
姨娶妍奸
姨娶妍奸
e.agjoyan
Armstrong Resume
Armstrong Resume
Thomas Armstrong
Celostot 1
Paqui15011966
Cuadro de referencia
olvera120
Northrop Grumman
Northrop Grumman
Will Valet
Como saber si es el chico indicado
Guadalupe Urizar
Deere ROI Case Study
Deere ROI Case Study
Will Valet
妍奸婉
妍奸婉
e.agjoyan
Newspaper articles
Newspaper articles
Sara
姨娶妍奸
姨娶妍奸
e.agjoyan
Celostot 1
Paqui15011966
Cuadro de referencia
olvera120
Northrop Grumman
Northrop Grumman
Will Valet
Como saber si es el chico indicado
Guadalupe Urizar
Deere ROI Case Study
Deere ROI Case Study
Will Valet
妍奸婉
妍奸婉
e.agjoyan
Newspaper articles
Newspaper articles
Sara
Ad

Similar to Jeremy and jeannette case (18)

Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
susanschei
Business communication (zayani)
Business communication (zayani)
hassan777898
spy after employees
spy after employees
Juscutum
Read Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docx
leonorepour284
Social Media and the Workplace
Social Media and the Workplace
Allisha Anderson
IS201 facebook
IS201 facebook
Lindsay Stuchinsky
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
bartholomeocoombs
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docx
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docx
jeanettehully
Chapter 14 The Employees Right to Privacy and Management of.docx
Chapter 14 The Employees Right to Privacy and Management of.docx
keturahhazelhurst
Chapter 14 The Employees Right to Privacy and Management of.docx
Chapter 14 The Employees Right to Privacy and Management of.docx
bartholomeocoombs
Privacy 際際滷show
Privacy 際際滷show
katsan11
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
honey690131
Employee extortion
Employee extortion
rhey02
NET 303 Policy Primer
NET 303 Policy Primer
Brett Elphick
Social media
Social media
Sheila A
Employment Law and the Bottom Line
Employment Law and the Bottom Line
CBIZ, Inc.
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
smile790243
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based Technology
Amy Larrimore
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
susanschei
Business communication (zayani)
Business communication (zayani)
hassan777898
spy after employees
spy after employees
Juscutum
Read Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docx
leonorepour284
Social Media and the Workplace
Social Media and the Workplace
Allisha Anderson
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
Chapter 14Ethical Risks and Responsibilities of IT Innovations.docx
bartholomeocoombs
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docx
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docx
jeanettehully
Chapter 14 The Employees Right to Privacy and Management of.docx
Chapter 14 The Employees Right to Privacy and Management of.docx
keturahhazelhurst
Chapter 14 The Employees Right to Privacy and Management of.docx
Chapter 14 The Employees Right to Privacy and Management of.docx
bartholomeocoombs
Privacy 際際滷show
Privacy 際際滷show
katsan11
Article 1 currently, smartphone, web, and social networking techno
Article 1 currently, smartphone, web, and social networking techno
honey690131
Employee extortion
Employee extortion
rhey02
NET 303 Policy Primer
NET 303 Policy Primer
Brett Elphick
Social media
Social media
Sheila A
Employment Law and the Bottom Line
Employment Law and the Bottom Line
CBIZ, Inc.
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
smile790243
Everything Attorneys Need to Know About Web Based Technology
Everything Attorneys Need to Know About Web Based Technology
Amy Larrimore
Ad

Jeremy and jeannette case

  • 1. JEREMY AND JEANNETTE CASE By: Michael Perez Instructor: Gina Riestra MGT 3610 Human Resource Management Polytechnic University of Puerto Rico
  • 2. Does Jeremy have a right to privacy in his personal computer at work? Jeremy have the right to protect his privacy of his personal computer because the machine belong to him.
  • 3. Does it matter that the employer has policy prohibiting personal Internet surfing? Employer has the right to of prohibiting personal internet surfing because employer lost money, employee lost productivity Possibility that a user will use enterprise property to download viruses, transmit sensitive company information, or use enterprise property to break the law.
  • 4. Does the fact that Jeremy works for a government employer make a difference in terms of the law to be applied to the analysis? If so, what difference does it make? He is at work he and the policy say electronic communications are monitored need. In government workplace are something warrantless for search and monitory privacy, when you violating the policy and break the law not matter if is your personal computer As a general rule, a government employee would continue to have an expectation of privacy in his or her personal belongings that have been brought into the workplace environment.
  • 6. If Jeremy is indeed going to pornographic sites and a colleague objects, does Jeremys behavior expose the employer to liability? If Jeremy is indeed going to porno site, employer can take a disciplinary action against for his behavior and sexual harassment complaint. The company need blocked pornographic site for this kind of issue dont happen in the future. Make the prohibited of the use of personal computer at work.
  • 7. Bibliography Maidment, F. (2011). Annual Editions: Human Resources 10/11 (19th Edition ed.). (F. Maidment, Ed.) McGraw-Hill Higher Education. Lemons, B. R. (n.d.). Warrantless Workplace Searches of Government Employees. Retrieved 8 26, 2011, from Warrantless Workplace Searches of Government Employees: www.khodges.com/iacp/GovernmentEmployeeSearches.doc