Employee Privacy Report

Submitted by: Submitted by

Views: 619

Words: 1299

Pages: 6

Category: Business and Industry

Date Submitted: 11/04/2010 06:44 AM

Report This Essay

Running head: Employee Privacy Report

Employee Privacy Report

Dan Bear

COM/285

April 27, 2010

James E. Powell

GE (General Electric) Capital is an organization that leads by example for many responsible reasons, which fosters good behavior in the workplace. There are regulations and procedures in place to raise the level of integrity in the workplace. Directors, officers and employees must abide by a code of conduct, also known as “Spirit and the Letter” or the “GE Acceptable Use of Company policies.” GE policies structure to uphold ethical commitments in the workplace, at home, or at any other location. Each employee is made aware of use of company e-mail and Internet in a business manner from day one. Privacy policies are also defined to GE employees, by even requiring associates to sign a document recognizing their understanding of these regulations annually. The direction is instilled in each every associate to make aware where boundaries are and lye. Violating the policy and not deeming to conduct business activities by staying within compliance rules can result in disciplinary action, up to, and including termination accordance with the law.

E-mail, Internet use and Privacy Policies

“GE Capital Acceptable Use of Company information sources policy. This policy applies to GE Capital employees – including employees of its wholly owned affiliates – and all others who have been authorized to use company information sources or have access to company info-sources, including, but not limited to contractors, temporary or contingent workers, agency workers, employees of suppliers and vendors” (GE Capital, 2009). The policy is directly outlining who is categorized to commit to the policy in the workplace. All boundaries are covered when identifying the stakeholders who must obey to avoid disciplinary action. Company info-sources are defined as the software, hardware, portable devices, telecommunication devices, data storage and online services as well...