This website uses cookies to ensure you have the best experience. Learn more

The Privacy Of E Mail Essay

1322 words - 5 pages

The Privacy of E-Mail

Today the Internet is being used more and more frequently, and the question of e-mail privacy is becoming more and more of an issue in society. Many people today, both at work and at home, are using e-mail to keep in touch with their friends, family, and their co-workers. Sometimes the information that is contained in these messages is private and confidential, neither the sender nor the receiver wish any one else to be privy to what is contained in these messages. What happens if that very private piece of mail is intercepted and read by those whom it is not meant for? For some people it might only be a slight problem, but for others it could cause some serious problems. It also brings up the issue of who actually has the right to read e-mail. Is it acceptable for someone's boss or employer to be reading e-mail that is not meant for them, and is it acceptable for the police to read the private e-mail of those whom they suspect have been involved a crime? There are dozens questions that arise when a person is discussing the issue of e-mail privacy and just who has the right to read what some one else has sent to a person, something that might contain a message that they do not want read by anyone else.

In 1986 the Electronic Communications Privacy Act was put into effect by Congress, this act was designed to protect the users of e-mail from having to worry about others reading what they consider to be a private message. In basic terms the act states that e-mail is not to be intercepted by an outside third party without the proper authorization. It also states that the police are not able to search and seize a persons e-mail unless they are in the possesion of a warrant authorizing them to do so. While this law has many good intentions it does have a few flaws, for instance, it never says how this will be enforced, or how a person will prove that the privacy of their e-mail has been invaded. It would be very difficult to prove that someone intercepted a message that was not meant for them and read it. Another problem that comes with this act is that it does not protect the person from having their e-mail read by an "inside source". An inside source would include, their boss or another member of the company that they are working for, so someone in that position could reasonably read their e-mail without having to worry about reprimands form the company. Courts have ruled that e-mail sent via an office system is only private if the sender has a "reasonable expectation" of privacy when they send it. Again this can be pretty vague about what a persons "reasonable expectation" of privacy for their e-mail means. What "reasonable expectation" means for one person may be very different for another, creating quite a problem in the company about what "reasonable expectation" is. Many companies now have policies for their employee e-mail that states that it is not a good idea for a person to send private e-mail through the...

Find Another Essay On The Privacy of E-Mail

E-mail, Instant Messaging and Chat Rooms: The New Letter?

2039 words - 8 pages E-mail, Instant Messaging and Chat Rooms: The New Letter? Personal communication over distance used to be laborious – considerable physical impediments slowed the process. In the 1800’s, an aristocratic gentlemen hand-penned a letter with a quill pen and bottled ink, sealed the envelope with melted wax, and sent a footman to hand-deliver the missive to his faraway love; in the midst of battle, foot-soldiers ran relays across hostile

Some organizations have the technology to monitor all the electronic activities of its staff, from e-mail to keystrokes. Is this acceptable?

1075 words - 4 pages the Supreme Court, if an employee does something online without knowing that they are being monitored, they have the right to sue the company for infringement of privacy. This however wasn't the case in Smyth vs. Pillsbury Co., where an employee was fired for sending inappropriate e-mails over the company's e-mail system. The company repeatedly assured its employees that e-mail was confidential and would not be intercepted, however an e-mail

Mail Troubles of the Civil War

1441 words - 6 pages Mail Troubles of the Civil War The nation’s communication system was cut in two when the civil war began in 1861. Mail was very important in boosting most soldier’s morale. Writing letters was soldier’s link between Civil War camps and battlefields and “back home” (Civil War). Many soldiers had never been this far from home and would often feel very homesick. Staying in touch with their loved ones helped them from getting too sad and reminded

Junk Mail And The Art Of Hype

2035 words - 8 pages confined to "fine print" which they expect no one to read.No where is hype more prevalent, and indeed necessary, than in junk mail. The very fact that hype is so prevalent says a lot about the reader of junk mail. It implies that they have a short attention span and are unconcerned and unconvinced by details: they are emotionally driven. However, much of it can probably be attributed to the desensitization against the effects of junk mail

The Piracy of Privacy

1031 words - 5 pages Throughout history the world has seen significant decreases in privacies. Lately in the United States of America, many citizens have expressed concern with the government's overreach in personal privacy. The National Security Agency and other government administrations have been criticized for their operations. With much criticism, the nation has been seeing a decrease in social networking users and an increase in hacking abilities amongst

The Extinction of Privacy

1532 words - 7 pages technology and couldn’t wait for the next cell phone to be released. I was always highly interested in what was next, but that was then when I was a young and obvious little kid, now as a young adult in this day of age I have an entirely different feel for all of it; privacy no longer exists and technology is the primary blame. Your identity is unsafe in more places than you may realize. Every store you walk in has the possibility or either

Chapters 1-2 Study Questions: Lord of the Flies by William Golding (The website made alot of errors in my essays. Please rate the essay good if you like it, and I will e-mail you the original)

2189 words - 9 pages an individual with much hidden within himself.d)Piggy:Piggy is presented as scientific, logical, and an intelligent "adult" in Lord of the Flies. These character revelations are strated through Piggy's distinct ods of thinking.Piggy proves to be scientific when he explains to Ralph how to blow a conch; drawing from previous experience with a friend, Piggy strated: "'He kind of spat...[h]e said you blew from down here.' Piggy laid a hand on his

Chapters 3-4 Study Questions: Lord of the Flies by William Golding (The website makes alot of mistakes in my essays. Please rate them good if you like them, and I will e-mail you the original)

971 words - 4 pages on them ? we got in a circle...[w]e crept up...[t]he pig squealed...[w]e hit the pig...I fell on top...I cut the pig?s throat...[y]ou should have seen the !?? (72-74). Jack plainly enjoyed every moment of the hunt, especially the kill, which suggests that he may have a predisposition toward .In addition, Jack appears to be demanding more recognition for his contributions to the group?s efforts: ??I got you meat!...I painted my face ? I stole up

The History of George Brown and The Globe and Mail

1148 words - 5 pages his death, in 1911 the "Globe" stopped making the evening edition of the Newspaper and in 1936 a huge merger happened, the Globe took in the "Mail and Empire" to form now what is know as the "Globe and Mail".Canadian Government, Canda Digital Collection , January 15th 2004The Canadian encyclopediaHistorica Foundation of Canada c2005, January 15th 2004The Canadian encyclopediaHistorica Foundation of Canada c2005, January 15th 2004Edunetconnect

The Demolition of Privacy Rights

1050 words - 5 pages The Demolition of Privacy Rights Civil liberties is a term coined by the United States that guarantees certain rights to the people by the Bill of Rights. Although the Right to Privacy is not officially enumerated into the Constitution, the Supreme Court ruled that citizens do in fact, have the right to their own privacy in their own home and their own beliefs. Privacy rights are an essential part of everyday American lives, in that

The Lack of Digital Privacy

1461 words - 6 pages With everyone joining the online world your privacy is at even greater risk then ever before. The internet has become part of our everyday lives, from social networking to online transactions. Your privacy is threatened every day. However is our privacy threatened by our own government? According to the pew research data 56% of Americans say that it is acceptable for the NSA to run through millions of Americans phone records in

Similar Essays

The Global Problem Of Spamming And Unsolicited E Mail

2574 words - 10 pages The Global Problem of Spamming and Unsolicited E-mail Introduction Spamming and unsolicited email has become a growing issue all over the world. As the internet grows, so does the problem of spamming. With the evolution of the internet, there has been a love and hate relationship among the spammed and the spammers. Before going into discussing further about spamming, we have to actually define spamming: Spamming is sending a

E Mail: The Most Common Communication Method

1519 words - 6 pages same year Scott Fahlman created the first emoticon. In 1989, Elwood Edwards recorded AOL’s, “You’ve got mail” message which has become one of the most recognizable sounds in the world. In 1997, Microsoft launched Outlook which completely changed the way companies operated. When asked what inspired his invention, Tomlinson simply stated, “Mostly because it seemed like a neat idea. There was no directive to ‘go forth and invent e-mail’” (Campbell). As

Is Computer Security The Only Option To Combat The Misuse Of E Mail?

517 words - 2 pages In today's age of technology, internet security options are infinite. Email scams, hoaxes, spam, advertising and viruses are growing at a phenomenal rate. The technologies to prevent malicious emails are not far behind. Whilst computer security is not the only option when combating the misuse of e-mail, it is the most sensible option, and provides an ease of use to the home and commercial user.Spam e-mail's and 'hoax' e-mail's are growing more

Use Of Emoticons In E Mail To Convey Emotion

1769 words - 7 pages Use of Emoticons in E-mail to Convey Emotion When drafting an e-mail message, many senders are aware that their text may be confusing or easily misunderstood. To help minimize misunderstandings and miscommunication during e-mails, senders will often use their own form of nonverbal cues to convey meaning and emotion. This often comes in the form of emoticons. Dresner & Herring (2010) define emoticons as illocutionary acts, which is the