Sample MLA Paper
Sample MLA Paper
Orlov 1
Anna Orlov
Professor Willis
English 101
17 March XXXX
Title is centered. Online Monitoring:
A Threat to Employee Privacy in the Wired Workplace
Opening sentences As the Internet has become an integral tool of businesses,
provide background
for thesis. company policies on Internet usage have become as common as
policies regarding vacation days or sexual harassment. A 2005
study by the American Management Association and ePolicy
Institute found that 76% of companies monitor employees’ use of
the Web, and the number of companies that block employees’
access to certain Web sites has increased 27% since 2001 (1).
Unlike other company rules, however, Internet usage policies often
include language authorizing companies to secretly monitor their
employees, a practice that raises questions about rights in the
Thesis asserts workplace. Although companies often have legitimate concerns
Orlov’s main point.
that lead them to monitor employees’ Internet usage—from
expensive security breaches to reduced productivity—the benefits
of electronic surveillance are outweighed by its costs to employees’
privacy and autonomy.
While surveillance of employees is not a new phenomenon,
electronic surveillance allows employers to monitor workers with
Summary and long unprecedented efficiency. In his book The Naked Employee,
quotation are
introduced with a Frederick Lane describes offline ways in which employers have been
signal phrase
naming the author.
permitted to intrude on employees’ privacy for decades, such as
drug testing, background checks, psychological exams, lie detector
Orlov anticipates Some experts have argued that a range of legitimate concerns
objections and
provides sources justifies employer monitoring of employee Internet usage. As PC
for opposing views.
World columnist Daniel Tynan points out, companies that don’t
monitor network traffic can be penalized for their ignorance:
“Employees could accidentally (or deliberately) spill confidential
information . . . or allow worms to spread throughout a corporate
network.” The ePolicy Institute, an organization that advises
companies about reducing risks from technology, reported that
breaches in computer security cost institutions $100 million in
1999 alone (Flynn). Companies also are held legally accountable
for many of the transactions conducted on their networks and with
their technology. Legal scholar Jay Kesan points out that the law
holds employers liable for employees’ actions such as violations
of copyright laws, the distribution of offensive or graphic sexual
material, and illegal disclosure of confidential information (312).
Transition helps These kinds of concerns should give employers, in certain
readers move from
one paragraph to instances, the right to monitor employee behavior. But employers
the next.
rushing to adopt surveillance programs might not be adequately
weighing the effect such programs can have on employee morale.
Employers must consider the possibility that employees will
perceive surveillance as a breach of trust that can make them feel
like disobedient children, not responsible adults who wish to
perform their jobs professionally and autonomously.
Orlov treats both Yet determining how much autonomy workers should be given
sides fairly; she pro-
vides a transition to is complicated by the ambiguous nature of productivity in the
her own argument.
wired workplace. On the one hand, computers and Internet access
give employees powerful tools to carry out their jobs; on the other
Fig. 1. This "Dilbert" comic strip suggests that personal Internet Illustration has
figure number,
usage is widespread in the workplace (Adams 106). caption, and
source information.