Privacy in the workplace – an interview

//Privacy in the workplace – an interview

Recently Helaine Leggat was one of the guests on Kaya FM to comment on the interception of email, voice, or other communications in the workplace and the right to privacy in the workplace.

Caution: The audio files on Michalsons can be large. Most are about 2.5MB in size and last for some time. If you press play, you will start to stream the audio file. By pressing pause you will only pause listening to the audio and not the downloading and streaming of the audio file, which will continue until finished. Depending on the speed of your connection, you might not be able to listen to more than one audio at a time.

Part 1: 00:00 – 15:00

Kaya FM introduces the topic as well as the speakers, including Helaine Leggat from Michalsons Attorneys. The topics discussed include:

  • the existence of a summary of exact “neat laws” on privacy in the workplace.
  • growing concerns involving  businesses monitoring and intercepting communications by managers.
  • what happens if you’re caught applying for another job?  Are you guilty of misconduct or has your privacy been invaded.

Part 2: 15:01 – 29:15

The speakers discuss what is considered reasonable internet usage or what is abuse, in the workplace and continue to discuss the situation where someone is caught applying for other jobs in their workplace. They also discuss the extent to which employers use some form of tracking software to pick up possible negligence or misuse of company resources?


Part 3: 29:16 – 40:33

Callers phone in asking further questions relating to privacy, and the speakers talk about the effects of minimising communication interception with regards to the exploitation of company resources. Does communication interception boil down to the extent of employee and employer trust? Callers phone in explaining their personal experiences and suggest that some extreme action has been taken by their companies with the interception of communications and invasion of privacy.

By |2019-08-24T10:26:28+02:00March 20th, 2009|Categories: POPI and Data Protection|Tags: , , , , |