Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Labor and Employment Law

PDF

Selected Works

Technology

Articles 1 - 4 of 4

Full-Text Articles in Law

To Read Or Not To Read: Privacy Within Social Networks, The Entitlement Of Employees To A Virtual “Private Zone” And The Balloon Theory, Shlomit Yanisky-Ravid Apr 2014

To Read Or Not To Read: Privacy Within Social Networks, The Entitlement Of Employees To A Virtual “Private Zone” And The Balloon Theory, Shlomit Yanisky-Ravid

Shlomit Yanisky-Ravid Professor of Law

Social networking has increasingly become the most common venue of self-expression in the digital era. Although social networks started as a social vehicle, they have recently become a major source for employers to track personal data ("screening") of applicants, employees or former employees.

This article addresses the questions of whether this casual business routine harms employees' rights to privacy with regard to data users post in social networks, what the drawbacks of this routine may be, and why and how privacy rights should be protected to secure private zones within the virtual sphere. The article suggests that a privacy right …


Telecommunications 2004: Business Strategy, Hr Practices, And Performance, Rosemary Batt, Alexander J.S. Colvin, Harry C. Katz, Jeffrey Keefe May 2012

Telecommunications 2004: Business Strategy, Hr Practices, And Performance, Rosemary Batt, Alexander J.S. Colvin, Harry C. Katz, Jeffrey Keefe

Alexander Colvin

This national benchmarking report of the U.S. telecommunications services industry traces the tumultuous changes in management and workforce practices and performance in the sector over the last 5 years. This is a follow-up report to our 1998 study. At that time, when the industry was booming, we conducted a national survey of establishments in the industry. In 2003, we returned to do a second national survey of the industry, this time in a sector that was recovering from one of the worst recessions in its history.


The Privacy Bailout: State Government Involvement In The Privacy Arena, Corey A. Ciocchetti Jan 2011

The Privacy Bailout: State Government Involvement In The Privacy Arena, Corey A. Ciocchetti

Corey A Ciocchetti

In the midst of massive government involvement in the financial, real estate and automotive sectors, other important problems linger without sufficient governmental attention. This article focuses on one area where federal intervention has been particularly absent - the realm of individual privacy in the Information Age. The problem is that monitoring in the United States is increasingly powerful and takes many forms. Online, prominent Web sites collect, store and disseminate a great deal of personally identifying information (PII) without clearly and simply informing users. This is the case even though such notice is cheap and can be effective. Offline, technology …


The Eavesdropping Employer: A Twenty-First Century Framework For Employee Monitoring, Corey A. Ciocchetti Dec 2010

The Eavesdropping Employer: A Twenty-First Century Framework For Employee Monitoring, Corey A. Ciocchetti

Corey A Ciocchetti

The twenty-first century continues to usher in new and increasingly-powerful technology. This technology is both a blessing and a curse in the employment arena. Sophisticated monitoring software and hardware allow businesses to conduct basic business transactions, avoid liability, conduct investigations and, ultimately, achieve success in a competitive global environment. Employees can also benefit when monitoring provides immediate feedback, keeps the workforce efficient and focused and discourages unethical/illegal behavior. The same technology, however, allows employers to monitor every detail of their employees’ actions, communications and whereabouts both inside and outside the workplace. As more and more employers conduct some form of …