E-Mail Privacy. Fact: One of the least secure methods of communication you can use. E-mails are...
-
Upload
daniela-franklin -
Category
Documents
-
view
221 -
download
0
description
Transcript of E-Mail Privacy. Fact: One of the least secure methods of communication you can use. E-mails are...
![Page 1: E-Mail Privacy. Fact: One of the least secure methods of communication you can use. E-mails are stored at multiple locations such as senders computer,](https://reader035.fdocuments.net/reader035/viewer/2022081805/5a4d1b707f8b9ab0599b5006/html5/thumbnails/1.jpg)
BY: DEBRA LAVON NATASHA
E-Mail Privacy
![Page 2: E-Mail Privacy. Fact: One of the least secure methods of communication you can use. E-mails are stored at multiple locations such as senders computer,](https://reader035.fdocuments.net/reader035/viewer/2022081805/5a4d1b707f8b9ab0599b5006/html5/thumbnails/2.jpg)
THERE IS NO SURPRISE ANYMORE ! E-MAIL ISN’T PRIVATE
Fact: One of the least secure methods of communication you can use.
E-mails are stored at multiple locations such as sender’s computer, your internet service server, and the receiver’s computer.
If you think just because you delete an e-mail from your inbox doesn’t mean there aren’t multiple copies out there.
![Page 3: E-Mail Privacy. Fact: One of the least secure methods of communication you can use. E-mails are stored at multiple locations such as senders computer,](https://reader035.fdocuments.net/reader035/viewer/2022081805/5a4d1b707f8b9ab0599b5006/html5/thumbnails/3.jpg)
THE FOURTH AMENDMENT
E-mail privacy is derived from the Fourth Amendment to the U.S. Constitution and is governed by the reasonable expectation of privacy standard.
E-mails are also governed by the Electronic Communications Privacy Act (ECPA0 and the Patriot Act
![Page 4: E-Mail Privacy. Fact: One of the least secure methods of communication you can use. E-mails are stored at multiple locations such as senders computer,](https://reader035.fdocuments.net/reader035/viewer/2022081805/5a4d1b707f8b9ab0599b5006/html5/thumbnails/4.jpg)
WORK EMPLOYEES
Most employees have their employees sign a computer and network usage policy, which typically will set forth that your e-mail is to be used only for business purposes and grants the employer the right to monitor e-mail and computer usage.
You may send communication from their equipment that could effect their business which usually provides them with the justification to search through your emails.
![Page 5: E-Mail Privacy. Fact: One of the least secure methods of communication you can use. E-mails are stored at multiple locations such as senders computer,](https://reader035.fdocuments.net/reader035/viewer/2022081805/5a4d1b707f8b9ab0599b5006/html5/thumbnails/5.jpg)
WORK EMPLOYEES
Liability is the issue of most employers. Workplace harassment lawsuits are prevalent, and
one way to protect a business from being sued is to monitor and prevent any harassment in the first place.
Old emails will be used years down the road in a lawsuit. If you can purge a person emails they can be a gold mine for anyone suing the company.