Key loggers are malicious code, however, there are legitimate uses for them. For
ID: 3775602 • Letter: K
Question
Key loggers are malicious code, however, there are legitimate uses for them. For example, it is legal for an employer to monitor the activities of employees who are using company equipment. Read though the following article and answer the following discussion in the discussion board: http://jolt.law.harvard.edu/digest/software/federal-and-state-wiretap-act-regulation-of-keyloggers-in-the-workplace
Do you feel that the employee’s rights were violated? Explain your position and use examples from the article to support your position.
Explanation / Answer
Yes, the employee's rights get violated by the usge of a keylogger. As stated in the article, in the case of Rene v. G.F. Fishers, Inc , the employee, Rene's private email accounts were opened and viewed by her higher management personals. This is indeed a violation of privacy of the employee by the employer.
The law stated by FWA looks into matters that are, quoting from the article, “transmitted…by a…system that affects interstate or foreign commerce.” but this fails to protect the rights of the employee from within the office. The Federal Wiretap Act must be extended to include restrictions on corporate or private offices from logging the keystrokes of the employees. As stated in the article that the effective working time of the employee is already determined through the usage of remote systems and time clocking on the computers, there is no need to log the keystrokes of the employees to determine the efficient working time. Such monitoring service can lead to other mis-behavioural acts by the employer towards a particular employee. An office working environment must not be prone to options like this which would affect the work culture.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.