Where Are We Now? Get Out The Map 1.What is PA’s response to Plunkitt? We will build new organizations that reconcile bureaucracy and democracy. Those.

Slides:



Advertisements
Similar presentations
FREEDOM OF INFORMATION EXECUTIVE BRIEFING PART II.
Advertisements

Where Are We Now? Get Out The Map 1.PA’s response to Plunkitt will be to bridge the gap between bureaucracy and democracy by building new organizations.
Where Are We Now? Get Out The Map 1.What is PA’s response to Plunkitt? We will build new organizations that reconcile bureaucracy and democracy. We know.
1 Chapter 11 Evidence is Admissible if Obtained During an Administrative Function Under the “Special Needs” of Government Evidence is Admissible if Obtained.
US Constitution and Right to Privacy Generally only protects against government action Doesn’t obligate government to do something, but rather to refrain.
Confidentiality and HIPAA
Pearson Education, Inc., Longman © 2006 Chapter 15 Civil Liberties Policymaking American Government: Policy & Politics, Eighth Edition TANNAHILL.
Chapter 8 Part II. 2 New York v. Burger, 482 U.S. 691 (1987) Search of junk yard for stolen goods Lower court excluded the evidence in the criminal trial:
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Right to Privacy: The Unwritten Right
 Freedom of Information Act General Background. Access to Army Records. Exemptions. Exclusions. Procedural Rules for Processing FOIA Requests for Army.
The Federal Bureaucracy Chapter 15. Introduction Classic conception of bureaucracy (Max Weber) – Hierarchical authority structure – Uses task specialization.
EMPLOYMENT LAW CONSIDERATIONS March 16, Difference between being an employer vs. a law enforcement officer Garrity – this case involves employees’
EMPLOYMENT LAW CONSIDERATIONS JULY 13, 2004 Professor Susan Carle.
Developed by Susan Carle under NIC Cooperative Agreement 06S20GJJ1 EMPLOYMENT LAW CONSIDERATIONS Investigating Allegations of Staff Sexual Misconduct with.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 17 Administrativ e Law.
Informed Consent and HIPAA Tim Noe Coordinating Center.
Privacy & Personal Information -- Why do we care or do we?
Information Systems and Databases 1. Chapter Objectives 2  Describe the difference between data and information.  Describe what an Information System.
Introduction to Fraud Examination. Discount Plus Company has been concerned for some time about its cash flows. Since the company began five years ago,
Security Services Constitutional Issues in Private Security.
+ Protecting Individual Liberties Section 1 Chapter 14.
Unit Five Lesson 31 How do the Fourth and Fifth Amendments Protect Against Unreasonable Law Enforcement Procedures.
Privacy After Nixon's resignation, the govt took control of all of his presidential records, including the tapes, in the Presidential Recordings and Materials.
P A R T P A R T Regulation of Business Administrative Agencies The Federal Trade Commission Act and Consumer Protection Laws Antitrust: The Sherman Act.
American Government and Organization PS1301 Wednesday, 21 April.
HIPAA PRIVACY AND SECURITY AWARENESS.
Other Laws (Primarily for E-Government) COEN 351.
Headquarters U. S. Air Force I n t e g r i t y - S e r v i c e - E x c e l l e n c e Headquarters Air Force FOIA Exemptions Brief Della Macias HAF/IMII.
CSE/ISE 312 Privacy (Part 1). What We Will Cover Privacy risks and principles 4 th Amendment, expectations, and surveillance Business and social sectors.
Where Are We Now? Get Out The Map 1.PA’s response to Plunkitt will be to bridge the gap between bureaucracy and democracy by building new organizations.
Computerized Networking of HIV Providers Workshop Data Security, Privacy and HIPAA: Focus on Privacy Joy L. Pritts, J.D. Assistant Research Professor Health.
UNEMPLOYMENT COMPENSATION WHAT EMPLOYERS NEED TO KNOW.
Ch5 1 ETHC303 Chapter 5- Privacy Instructor: Dr. Hassan Ismail Abdalla Room: E236.
Philosophy 223 Technology in the Workplace: The Concern for Privacy.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
THE NATURE OF THE JUDICIAL SYSTEM The judicial system in the United States is an adversarial one in which the courts provide an arena for two parties to.
Chapter 7—Privacy Law and HIPAA
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 15 Privacy as a Value.
Unit 5: The President, the Bureaucracy and the Judiciary ppt. 6.
WELCOME BACK! ADMIN. LAW UNIT 6 ANN SANOK. THIS WEEK We look at an agency’s power to conduct inspections or to compel acts by individuals or companies.
1Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Defining Ethics Chapter 1: Ethics & Sources of Law.
McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 11 Employment Regulation and Labor Law.
The Paralegal Professional PA101.  the power to govern is shared by one central or federal government and the 50 state governments.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
School Law and the Public Schools: A Practical Guide for Educational Leaders, 5e © 2012 Pearson Education, Inc. All rights reserved. Chapter 3 Students,
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
Planning and Organizing Chapter 13. The Planning Function Planning for a business should stem from the company’s Business Plan – The business plan sets.
What did the 1890 Constitution Require Regarding Education? §201. It shall be the duty of the legislature to encourage, by all suitable means, the promotion.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
Copyright © 2008 Delmar Learning Chapter 7 Legal Issues.
1Chapter SECTION OPENER / CLOSER: INSERT BOOK COVER ART Defining Ethics Section 1.1.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
LAW RIGHT TO PRIVACY NOTES 1. Def: Right protecting citizens from unreasonable interference by government 2. No right to privacy in the Constitution.
 What is a Case Brief?  A case brief is a condensed, concise outline-form summary of a court opinion. Hence, the term “brief.” It is generally used.
1 Lecture 3 Legal Rights of Public Employees Introduction to Public Personnel Administration Spring 2014.
How the Executive Branch Works
How the Executive Branch Works
Chapter 14 Vocabulary Review The Federal Bureaucracy
ADM 636 Competitive Success/snaptutorial.com
ADM 636 Competitive Success-- snaptutorial.com
ADM 636 Education for Service-- snaptutorial.com.
ADM 636 Education for Service-- snaptutorial.com
ADM 636 Teaching Effectively-- snaptutorial.com
Other Sources of Information
The Right to Privacy I Foundations of the Right
The Health Insurance Portability and Accountability Act
THE 13TH NATIONAL HIPAA SUMMIT HEALTH INFORMATION PRIVACY & SECURITY IN SHARED HEALTH RECORD SYSTEMS SEPTEMBER 26, 2006 Paul T. Smith, Esq. Partner,
9th and 14th Amendments (and some others – but these are the top 2)
Presentation transcript:

Where Are We Now? Get Out The Map 1.What is PA’s response to Plunkitt? We will build new organizations that reconcile bureaucracy and democracy. Those organizations will tend toward the closed model and suffer from the usual defects in decision-making, and our task will be complicated by the vagueness of our goals, the diffusion of implementation responsibility, and the penetration of the task environment.

Where Are We Now? Get Out The Map 2.As we try to manage our primary resource (people) for getting the job done, we will have to keep in mind that motivation must be individualized (Skinner, McGregor, Maslow, Herzberg), that individuals relate to organizations in different ways (Hofstede, locals vs. cosmopolitans), and that public sector leaders do not have as much reward or coercive power over employees as private sector leaders and thus have to rely more on expert, charisma, and personal power to motivate.

Lecture Preface for Chapter 6 1.Now that we have built our organizations, we need to use the tools at our disposal to get the job done. Those include information management, productivity improvement, budgeting, and human resources. Each tool has limitations and complications, requiring us to evaluate them in light of the 5 E’s of public administration: efficiency, effectiveness, ethics, equality, and equity.

2.Information technology has amplified problems that have been around for a long time: how much power does government have over us, who is collecting information about us, who has access to that information, and how is that information used? Simultaneously, we face new threats, from terrorism, for example, which make it tempting to collect and use information to insure our safety.

3.The NPR stories assigned for this week show how difficult these questions can be: information gathered by security cameras and DNA testing allows law enforcement authorities to track terrorists and criminals, but that same surveillance equipment is used to monitor the lives of ordinary citizens who pose no threat to the public. If new information technologies make it easier to gather information that previously was much harder to obtain, what is the problem with using them, even though they seem more “intrusive” than older methods? Does the threat of misuse of information mean that we should not gather it? What safeguards might we put in place to restrict the use of information to only those purposes on which we are all agreed?

What do I need to know from this chapter and why is it important? 1.What is knowledge management? 2.What is computer matching? 3.What are the differences among street-level, screen-level, and system-level bureaucrats? 4.What court case recognized a constitutionally protected zone of privacy of information? 5.What is the three-pronged test used to balance employee privacy rights with an employer’s right to legitimate information?

What is knowledge management?

1. The coordination and administration of public policies and procedures for information technology, resources, personnel, and systems in the public sector. 2.Public agencies gather sensitive information that can be misused. Having data means protecting it and organizing it so that it can be used properly. 3.The complexity of this problem is made even more problematic by the scale of the issue, the general difficulties of getting things done in the public sector, and the growing digital divide.

What is computer matching?

1.The electronic comparison of two or more sets or systems of individual personal records. 2.Accessing multiple sources of data allows users to compile a detailed portrait of citizens. 3.What do we want government to know about us?

What are the differences among street-level, screen- level, and system-level bureaucrats?

1.Street-level = employees who interact directly with citizens. 2.Screen-level = employees act as the interface between citizens and the system. 3.System-level = almost no contact with citizens but high levels of administrative discretion. 4.Personal connection to public sector workers becomes more remote; decision-making is routinized; all contact is through impersonal systems.

What court case recognized a constitutionally protected zone of privacy of information?

1.Whalen v. Roe (1977): New York statute created computer database with names of patients prescribed drugs likely to be abused. Court ruled that the identification requirement was the product of an orderly, rational legislative decision and did not violate privacy. 2.Court recognized a limited right to informational privacy, but it is still a matter of controversy.

“We are not unaware of the threat to privacy implicit in the accumulation of vast amounts of personal information in computerized data banks or other massive government files. The collection of taxes, the distribution of welfare and social security benefits, the supervision of public health, the direction of our Armed Forces, and the enforcement of the criminal laws all require the orderly preservation of great quantities of information, much of which is personal in character and potentially embarrassing or harmful if disclosed. The right to collect and use such data for public purposes is typically accompanied by a concomitant statutory or regulatory duty to avoid unwarranted disclosures. Recognizing that in some circumstances that duty arguably has its roots in the Constitution, nevertheless New York's statutory scheme, and its implementing administrative procedures, evidence a proper concern with, and protection of, the individual's interest in privacy. We therefore need not, and do not, decide any question which might be presented by the unwarranted disclosure of accumulated private data - whether intentional or unintentional - or by a system that did not contain comparable security provisions. We simply hold that this record does not establish an invasion of any right or liberty protected by the Fourteenth Amendment.” – J. Stevens

“What is more troubling about this scheme, however, is the central computer storage of the data thus collected. Obviously, as the State argues, collection and storage of data by the State that is in itself legitimate is not rendered unconstitutional simply because new technology makes the State's operations more efficient. However, as the example of the Fourth Amendment shows, the Constitution puts limits not only on the type of information the State may gather, but also on the means it may use to gather it. The central storage and easy accessibility of computerized data vastly increase the potential for abuse of that information, and I am not prepared to say that future developments will not demonstrate the necessity of some curb on such technology.” – J. Brennan, concurring

“In Katz v. United States, the Court made clear that although the Constitution affords protection against certain kinds of government intrusions into personal and private matters [1 st = association, 3 rd = quartering, 4 th = searches, 5 th = incrimination, 9 th = retained; Griswold = contraceptives by married couple, “zone of privacy”], there is no "general constitutional 'right to privacy.'... [T]he protection of a person's general right to privacy - his right to be let alone by other people - is, like the protection of his property and of his very life, left largely to the law of the individual States.” – J. Stewart, concurring Scalia dissenting in NASA v. Nelson (2010): “A federal constitutional right to ‘informational privacy’ does not exist.”

What is the three-pronged test used to balance employee privacy rights with an employer’s right to legitimate information?

1.Reasonableness, compelling interest, and job relatedness. 2.Under what circumstances can an employer monitor an employee or collect data about them? 3.As with all invasions of privacy, there will be grey areas along side obvious intrusions. However, in a society that values privacy, there are rules that must be used to justify gathering information.