首页    期刊浏览 2025年04月12日 星期六
登录注册

文章基本信息

  • 标题:Electronic communication facilities in academic institutions: issues of academic freedom.
  • 作者:Barkacs, Craig B. ; Schneider, Gary P. ; Barkacs, Linda L.
  • 期刊名称:Journal of Organizational Culture, Communications and Conflict
  • 印刷版ISSN:1544-0508
  • 出版年度:1997
  • 期号:March
  • 语种:English
  • 出版社:The DreamCatchers Group, LLC
  • 摘要:Debates over the right to privacy have arisen as e-mail use has become ubiquitous in businesses and other organizations (Barker and Hammond, 1995; Greengard, 1996; Traynor, 1994). These debates are often heated (Brown, 1994; Nelson, 1994), and pit the employee's right to privacy against the employer's right to control the use of its assets. Firms are concerned because information contained in e-mail can be used against the them in litigation (Barker, et al., 1995; Himelstein, 1995) and have tried, in many cases, to protect themselves by establishing written policies on permissible employee uses of employer electronic communications facilities (Cavanagh, 1996; McCune, 1997; Weisband and Reinig, 1995). Firms are also concerned because employees often experience increased stress and decreased productivity when they know their e-mail is being monitored (Aiello and Kolb, 1995; DeTienne, 1994). Legislation has been proposed that might act to balance employee and employer interests, but no uniform privacy act for non-governmental employees has been enacted (Bockanic and Lynn, 1996; Guffey and West, 1996; Pincus and Trotter, 1995; Van Duch, 1996; Waks and Brewster, 1994).
  • 关键词:Electronic mail systems;Email;Employers;Integrated logistic support;Privacy, Right of;Property rights;Right of privacy;Right of property;Universities and colleges

Electronic communication facilities in academic institutions: issues of academic freedom.


Barkacs, Craig B. ; Schneider, Gary P. ; Barkacs, Linda L. 等


INTRODUCTION

Debates over the right to privacy have arisen as e-mail use has become ubiquitous in businesses and other organizations (Barker and Hammond, 1995; Greengard, 1996; Traynor, 1994). These debates are often heated (Brown, 1994; Nelson, 1994), and pit the employee's right to privacy against the employer's right to control the use of its assets. Firms are concerned because information contained in e-mail can be used against the them in litigation (Barker, et al., 1995; Himelstein, 1995) and have tried, in many cases, to protect themselves by establishing written policies on permissible employee uses of employer electronic communications facilities (Cavanagh, 1996; McCune, 1997; Weisband and Reinig, 1995). Firms are also concerned because employees often experience increased stress and decreased productivity when they know their e-mail is being monitored (Aiello and Kolb, 1995; DeTienne, 1994). Legislation has been proposed that might act to balance employee and employer interests, but no uniform privacy act for non-governmental employees has been enacted (Bockanic and Lynn, 1996; Guffey and West, 1996; Pincus and Trotter, 1995; Van Duch, 1996; Waks and Brewster, 1994).

PRIVACY RIGHTS VS. PROPERTY RIGHTS

Historically, the law favors employers' property rights over employees' right to privacy in electronic mail. This may explain a survey of executives at American companies that revealed that 22% of firms engage in searches of employee E-mail, computer files and voice mail. In companies with 1000 or more employees, that figure rises to 30%. (Gerhart, 1995). Probably the most widely-cited E-mail case is Shoars v. Epson America, Inc. (B07322243 CA Ct. App.). In that case, an employee discovered her supervisor reading and printing electronic mail messages she had sent to other employees. The employee questioned the practice and was fired the next day. At trial, her wrongful termination claim was denied and the California Supreme Court ultimately refused to hear her appeal, 1994 CA LEXIS 3670 (S040065, CA June 29, 1994).

Just as historical, however, is the law favoring academic freedom. These two issues have yet to be juxtaposed in a case dealing with the electronic mail of professors, who expect that their words and actions will be judged under the current laws favoring academic freedom. This paper asserts that the principles of academic freedom can and should be applied to electronic mail, and that this can be accomplished despite the current state of the law on privacy, or lack thereof, in electronic mail.

PROTECTION OF ACADEMIC SPEECH

A recent Ninth Circuit case demonstrates the different standard applied to academic speech as opposed to nonacademic speech. In Cohen v. San Bernardo Valley College, (9th Cir. 1996) 92 F.3d 968 (Cohen), an English professor was accused of violating the college's written sexual harassment policy. A female student complained that the language used during the professor's English and Film Studies course was sexually harassing (Cohen, 970). The college held hearings, ruled against the professor and punished him. The appellate court, however, held that the college's sexual harassment policy was too vague as it applied to the professor.

In the First Amendment context, there are three areas of concern regarding vague policies: they trap the unwary by not providing fair warning; resolution is delegated to low level officials who may apply the policy in an arbitrary or discriminatory manner; and vague policies discourage the exercise of first amendment freedoms (Cohen, 972, citing Grayned v. City of Rockford (1972) 408 U.S. 104, 108-109). In the Cohen case, the college punished the professor based on his teaching methods (Cohen, 972). The appellate court, noting that the professor had used the same method of teaching for the last twenty-four years, held that the college had engaged in "legalist ambush" (Cohen, 972).

Ironically, the language of the college's written sexual harassment policy is found in nearly every written sexual harassment policy. Although the Ninth Circuit Court of Appeals failed to say so directly, the issue of academic freedom certainly came into play in the Cohen case, as it has in other cases. In 1995, the Sixth Circuit appellate court held that a university's policy prohibiting ethnic slurs and epithets was unconstitutional and overly broad as applied to a former head coach of the university's basketball program who used an ethnic slur Dambrot v. Central Mich. Univ. (6th Cir. 1995) 55 F.3d 1177. These two cases are prime examples of the different treatment of speech when it involves academic institutions. Electronic mail is just another form of speech, and the same principles of First Amendment protection and academic freedom are applicable.

GENERAL ACADEMIC FREEDOM PRIVILEGE

A general academic freedom privilege has been recognized by the U.S. Supreme Court for over four decades (Keyishian v. Board of Regents (1967) 385 U.S. 589 (Keyishian); Sweezy v. New Hampshire (1957) 354 U.S. 234(Sweezy)). In 1957, the Supreme Court reversed a contempt citation of a leftist university lecturer who refused to disclose the content of his university lectures (Sweezy, 250). Then, in 1967, the Supreme Court held unconstitutional an anti-communist "loyalty oath" required of university teachers (Keyishian, 603-604). The issue of how far the right to academic freedom extends, and how it should be balanced with other considerations, continues to be an open question among the various courts Wilkinson, et al. v. Federal Bureau of Investigation, et al. (1986) 111 F.R.D. 432, 440 (Wilkinson).

RESEARCHER'S PRIVILEGE

Another privilege recognized, though not yet clearly defined, is the researcher's privilege (Wilkinson, 441). In Richards of Rockford, Inc. v. Pacific Gas & Elec. Co (N.D. Cal. 1976) 71 F.R.D. 388, 389 (Richards), the plaintiff attempted to compel a third party researcher to produce documents and testify regarding confidential interviews conducted with PG&E employees in the course of a research project which was unrelated to the litigation. The court took into consideration the researcher's interest in academic freedom and privacy, along with the fact that the researcher was not a party to the litigation, and denied discovery (Richards, 441). The court's rationale was that the plaintiff's interest in the discovery was not strong enough to justify disclosure in the face of society's interest in fostering the work of researchers. (Richards, 390).

APPLICATION OF PRINCIPLES TO E-MAIL PRIVACY

This same principle, fostering the work of researchers, may be applied to the use of electronic mail by university professors. In universities, electronic mail is used to promote the free exchange of ideas. Many professors communicate via electronic mail, nationally, as well as internationally, with other academics. Joint research projects are often facilitated by the use of electronic mail. To protect this free exchange of ideas, privacy in electronic mail is essential.

In yet another case, Dow Chem. Co. v. Allen (7th Cir. 1982) 672 F.2d 1262 (Dow Chemical), the plaintiff sought disclosure of a researcher's notes, working papers and raw data related to a toxicity study, for use in an administrative hearing. The Seventh Circuit Court of Appeals discussed Sweezy and Keyishian, then held that a researcher's interest in academic freedom was substantial enough to be used as a factor in the court's inquiry as to whether the request was unreasonably burdensome (Dow Chemical, as discussed in Wilkinson at 442).

IMPLICATIONS FOR UNIVERSITY POLICIES

Many universities have or are considering adoption of policies that govern the acceptable use of their electronic communications facilities (EFF, 1997). Many of these policies attempt to specify acceptable use for all university users of computing and communication facilities. Current law appears to give faculty members specific rights beyond those to which all university employees would be entitled. We suggest that such policies either include specific provisions regarding faculty members' rights to academic freedom or that universities draft separate policies to govern faculty members' use of electronic communications facilities as a separate category of user.

Given the court's holding in Cohen, universities should consider having a faculty committee administer any acceptable use policy that applies to faculty members. The Cohen holding suggests that universities should particularly avoid having an administrative official make decisions on what qualifies as faculty members' acceptable use. Universities should, however, consider taking the necessary steps to protect their legal interests and establish reasonable defenses against potential sexual harassment suits (Hibbard, 1996; Taylor, 1996).

SUMMARY AND CONCLUSION

The threshold question in the researcher privilege cases thus far seems to be whether such information is discoverable, or whether academic freedom protects such information. That same threshold question should be applied to electronic mail in the university setting. The issue is not whether electronic mail is the property of the university as employer of the professor, but whether the electronic mail is entitled to the protections associated with academic freedom and the researcher's privilege. If we want to promote research, the obvious answer is yes. To answer no to this question would create a dilemma--an academic freedom privilege or researcher's privilege could exist for notes, raw data, and working papers; however, such privileges would not exist for identical information in the form of transmitted or stored electronic mail.

Future cases involving privacy of university faculty members' electronic mail should apply the case law surrounding academic freedom and the researcher's privilege and rule accordingly. Lack of privacy in electronic mail for non-university employees is not inconsistent, as the same First Amendment issues are not present in those situations. Society must decide what it wishes to promote--if research and the free exchange of ideas are of value, they must be protected by laws.

REFERENCES

Aiello, J. R. and K. J. Kolb. 1995. Electronic performance monitoring and social context: Impact on productivity and stress. Journal of Applied Psychology, 80(3), 339-353.

Barker, R. M. and A. E. Hammond. 1995. Legal liability and e-mail. Journal of Systems Management, 46(2), 18-22.

Barker, R.M., J.N. Karcher & N.L. Meade. 1995. E-mail issues. Internal Auditor, 52(4), 60-63.

Bockanic, W. N. and M. P. Lynn. 1996. The Privacy for Consumers and Workers Act: Is privacy protection on the horizon? Journal of Systems Management, 47(1), 64-66.

Brown, B. 1994. Companies own e-mail and can monitor it. Computerworld, 28(26), 135-136.

Cavanagh, M. 1996. E-mail privacy: A glass almost half-full. Computerworld, 30(12), 37.

DeTienne, K. B. 1994. Big brother is watching: Computer monitoring and communication. IEEE Transactions on Professional Communication, 37(1), 5-10.

Electronic Frontier Foundation (EFF). 1997. Computers and Academic Freedom: Academic Computing Policy Statements Archive, (http://www.eff.org/pub/CAF/policies/).

Gerhart, P. F. 1995. Employee privacy rights in the United States. (Fall) 17 Comp.Lab.L. 175.

Greengard, S. 1996. Privacy: Entitlement or illusion? Personnel Journal, 75(5), 74-82.

Guffey, C. J. and West, J. F. 1996. Employee privacy: Legal implications for managers. Labor Law Journal, 47(11), 735-745.

Hibbard, J. 1996. Monitoring employee access to Web. Computerworld, 30(50), 71-72.

Himelstein, L. 1995. The snitch in the system: Old data are showing up in court--and winning cases. Business Week, (April 17), 104-105.

McCune, J. C. 1997. Get the message: E-mail is great, but it can be too public, too. Management Review, 86(1), 10-11.

Nelson, C. 1994. Is e-mail private or public? Employers have no right to snoop through mail. Computerworld, 28(26), 135-136.

Pincus, L. B. and C. Trotter. 1995. The disparity between public and private sector employee privacy protections: A call for legitimate privacy rights for private sector workers. American Business Law Journal, 33(1), 51-89.

Taylor, D. 1996. Responsible users require your trust, not an overseer. InfoWorld, 18(20), IW6.

Traynor, M. 1994. Computer e-mail privacy issues unresolved: How extensively can an employer monitor messages? The National Law Journal, 16(22), S2.

Van Duch, D. 1996. Illinois workplace monitoring law: Friend of Big Brother? Union says eavesdropping law allows bosses to listen in on private conversations. A privacy advocate has doubts. The National Law Journal, 18(23), B1.

Waks, J. W. and C. R. Brewster. 1994. The new version of the federal electronic monitoring bill severely limits private employers' use of random or periodic monitoring. The National Law Journal, 16(35), B4.

Weisband, S. P. and B. A. Reinig. 1995. Managing user perceptions of e-mail privacy. Communications of the ACM, 38(12), 40-47.

Craig B. Barkacs, University of San Diego

Gary P. Schneider, University of San Diego

Linda L. Barkacs, Barkacs and Barkacs, LLP
联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有