The purpose upon which people connect through these sites goes beyond creation of friendship to networks that prompt search of information by employers. This paper strongly supports the idea of the employers seeking personal information and passwords from their potential employees. For example a photo of an applicant smoking on social media posted for viewing would create a negative perception of the employer towards the user.
The employers risk use of information from social networks because of noncompliance with government regulations and guidelines regarding employments. However, human resource management acts illustrates that the moment the applicant is selected, the employer has the right to use information from any resources concerning their characters (Fishman 122). The governments have enacted laws that protect users of social networks from unauthorized search and confiscation. Information obtained from social networks does not qualify to be illegal invasion into the user’s privacy. This is because it is found on a public domain.
The privacy statement of the social networks informs the users on the limits and protections about the information they share and the way they sites will utilize the information. These policies do not prevent any one from accessing the information provided, but they highlight procedures and actions implemented by the network managers Leigh (98) The objective to information privacy considers the information shared with the third party, failing to outline the possible people to access the details of the users through the networks. For example, Facebook outlines what it will do to offer protection to the posted information but fails to guarantee the access of the same information by an authorized person.
The ethics gives the employers obligations towards the shareholders and the employees and the company itself. The scope and the coverage of the obligations fails to give what are ethical and what is not ethical. The increased numbers of social users and innovations in applications by the end users creates more linkages in connectivity. This ends up removing the line that authorizes specific users. Theory by Pan and Zinchn (101) helps in explaining the contract entered into between the consumer and the supplier. The theory supposes that the consumer creates an assumption on the contract during the exchange of the information on the social network. The three factors considered in the theory are the consent of the user, created agreements and the mode through which the agreement is created. The application of the theory has been developed by various disciplines related to business. It helps to create understanding conditions of taking risks, privacy together with issues to do with gender. The report by Pan et al. (66) states that almost 80% of the students that were yet to graduate, voluntarily created their personal profiles on the network. This also contained their personal information. The report further shows that more of the people were willing to take up the risk of posting their information to the web sites so that it could be visible to any one. Nevertheless, the number of male on the social networks was more than their counterparts hence more male willing to take up the risk than the female. The report seems to be in consistent with that of Huang, Derevsky and Paskus (112) which explains the higher rate of adolescence and young men having greater tendency to taking risks.
Further research needs to be carried out in this topic of social media privacy, its legal issues and ethics as guidelines to practices. Human resource needs to understand the perception of the social network user’s privacy. Also, workers need to be equipped with knowledge so that they can be cautious of the contents they apply on social networks. The reality is any personal information that goes to the web may be available for anyone to view.
Social networks are away individual; keep in touch with one another. Today it is not only about staying in touch with friends but also goes far to employees and therefore it’s professionally responsible for the users to understand this technology and its surroundings.