Workers of the world are exposed to many types of privacy-invasive monitoring while earning a living. These include drug testing, closed-circuit video monitoring, Internet monitoring and filtering, E-mail monitoring, instant message monitoring, phone monitoring, location monitoring, personality and psychological testing, and keystroke logging. Employers do have an interest in monitoring in order to address security risks, sexual harassment, and to ensure the acceptable performance of employees.
The increased use of technology in the workplace has created new concerns for both employers and employees in the area of privacy. Use of email and the Internet can immensely reduce operating costs through automation of human tasks, facilitate communication on innumerable levels, clearly increase efficiency in almost all tasks, allow for geographic and other business expansion, and less obviously, it can even reduce the amount of real estate and inventory that companies require. While this technology can be lauded for the ways in which it has helped business, it also raises concerns that previously did not exist (chron).
Email communications have a long life. Before an email even arrives in ones inbox, the capacity for it to be intercepted is vast. And even after an email appears to have been deleted by the recipient, it can usually be retrieved from a number of locations, including the network, local hard drives, and backups. Telephone and Internet or Intranet communications have an equally long life. All of these communications are capable of being intercepted via software programs that automate the monitoring of click stream data or keystrokes, thus capturing the data for storage and potential retrieval from the network, local hard drives or backup drives. For this reason, it is usually quite easy for a boss to gain access to the private communications of his or her employees.
There are several software and hardware tools available to...