Philosophy 223 Technology in the Workplace: The Concern for Privacy.

Slides:



Advertisements
Similar presentations
The Role of the IRB An Institutional Review Board (IRB) is a review committee established to help protect the rights and welfare of human research subjects.
Advertisements

Data Protection & Human Rights. Data Protection: a Human Right Part of Right to Personal Privacy Personal Privacy : necessary in a Democratic Society.
Protect Our Students Protect Ourselves
Freedom of Speech (Part 3)
Topics in Moral and Political Philosophy Political Obligation II: Natural Duties and Associative Reponsibilities.
Presented by: Mark Meyerhoff Let’s Talk Politics and Religion: First Amendment Issues in the Workplace.
Copyright © Allyn & Bacon 2008 Chapter 8 Teacher Freedoms This multimedia product and its contents are protected under copyright law. The following are.
1.8 Malpractice and Crime In this section you must be able to: Explain the consequences of malpractice and crime on information systems. Describe the possible.
Basic Nursing: Foundations of Skills & Concepts Chapter 6 LEGAL RESPONSIBILITIES.
Ethical Treatment of Employees: Hiring and Firing
The Problem Solvers TM Privacy Rights: Minors and Parents Michael J. Hewitt Marcel Daigle Singleton Urquhart LLP.
Human rights exploration
Ethical and Social...J.M.Kizza 1 Module 5: Anonymity, Security, Privacy and Civil Liberties IntroductionAnonymitySecurityPrivacy Ethical and Social Issues.
IS3350 Security Issues in Legal Context
1 Module 2: Promoting Compliance with Environmental Law.
Authority & Democracy Political Obligation II: Natural Duties and Associative Reponsibilities.
Right to Privacy: The Unwritten Right
The Ethicality of Altering Google Traffic in China Kayley Paris CSCE 390 April 17, 2011.
1 Freedom of Expression Prepared By Joseph Leung.
The National Academy of Sciences of Ukraine Kyiv University of Law Anna Vasilchenko Department of International Law Group IL-41.
Should Promotion of Autonomy be a Goal of Public Health? Christian Munthe Department of Philosophy, Göteborg University.
How Egypt Shutdown the Internet Drew Steptoe April 18th, 2011 CSCE 390 Professor Valtorta References: - JAMES GLANZ. “Egypt Leaders Found ‘Off’ Switch.
EU responses to hate crimes and support to the victims Linda Maria Ravo DG Justice – European Commission Unit C1.
The Growth of Dual-Use Bioethics Lecture No.13 Further Inf. For further information and video link please click on the right buttons in the following slides.
© Michael Lacewing Mill on democracy Michael Lacewing.
Authority and Democracy The Ethics of Voting. Questions about voting: Should everyone have a right to vote? Do we have a duty to vote? Do we have a duty.
Conference – 7-8 August, 2013 Presented by David Melnick | pg 1 Employee Privacy and Organizational Security: August 8th, 2013 Addressing.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
C4- Social, Legal, and Ethical Issues in the Digital Firm
Censorship Thomas Morrissy and Sam Joiner. Individual rights as determined by the government o Adults should be able to read see and hear what they.
Computer Ethics.
Amicus Legal Consultants THE DEPLOYMENT OF SPECIAL INVESTIGATIVE MEANS IN PROACTIVE ANTI-CORRUPTION INVESTIGATIONS.
What Should Be A Crime?. Recall: Two Main Perspectives 1. Achieving social order outweighs concerns for social justice. 2. CJ system goals must be achieved.
A.ABDULLAEV, Director of the Public Fund for Support and Development of Print Media and Information Agencies of Uzbekistan.
LAW AND POLITICS The aim of this tutorial is to help you learn to identify and evaluate the foundations of the American legal and political system.
Ch5 1 ETHC303 Chapter 5- Privacy Instructor: Dr. Hassan Ismail Abdalla Room: E236.
Environmental Management System Definitions
Use of force Ocga
Copyright © 2012 Pearson Education, Inc. All rights reserved. Business Ethics Concepts & Cases Manuel G. Velasquez.
 the study of the rightness or wrongness of human conduct.  In any situation involving two or more individuals, values may come into conflict and ethical.
Policy & Jurisdiction Discussion Group Report Sharon Dawes, SUNY Albany.
Audit Director Roundtable, Finance Practice © 2009 Corporate Executive Board. All Rights Reserved. ADR1B2ZMP1 1 The FCPA establishes both anti-bribery.
Chapter 1.  Laws regulating the employment relationship  Evolutionary in nature  Importance of understanding employment law.
Copyright © 2007, 2003 by Mosby, Inc., an affiliate of Elsevier Inc. Chapter 2 The Nursing Assistant in Long-Term Care.
Report Writing Intro to Law Enforcement ROP Instructor: G Uppal.
Chapter 42 Ethics and Social Responsibility of Business.
© BLR ® —Business & Legal Resources 1408 How to Manage Challenging Employees.
Copyright © Allyn & Bacon 2008 Chapter 7 Liability and Student Records This multimedia product and its contents are protected under copyright law. The.
DrugEpi 1-6 Other Drug Abuse Surveillance Systems Module 1 Overview Context Content Area: Descriptive Epidemiology & Surveillance Essential Question (General):
The Right To Be Forgotten In 2006, the European Union and Argentina put the concept of the right to be forgotten into practice. This issue started from.
Chapter 11: Investigative Constitutional Law LawTech Custom Publishing, Inc. Copyright 2010 Investigative Constitutional Law.
Chapter 8 Business-Government Relations Copyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Amartya Sen Development as Freedom. Lesson Overview 1.Sen: The BIG Picture 2.Sen: The Roles of Freedom 3.Instrumental Freedoms 4.The world as we know.
1 Ethical Issues in Computer Science CSCI 328, Fall 2013 Session 13 Privacy as a Value.
1 Ethics of Computing MONT 113G, Spring 2012 Session 31 Privacy as a value.
Why Stakeholder Theorists Should Support Stakeholder Democracy Jeffrey Moriarty Bentley University February, 2011.
Legal Considerations and Administration
LAW RIGHT TO PRIVACY NOTES 1. Def: Right protecting citizens from unreasonable interference by government 2. No right to privacy in the Constitution.
School Law and the Public Schools: A Practical Guide for Educational Leaders, 5e © 2012 Pearson Education, Inc. All rights reserved. Chapter 7 Liability.
University of Colorado – Denver
Employees and the Right to Privacy
Why do we study American citizenship…
Chapter 6 Ethical Principles Applied to Sport Management
Administrative law Ch1 scope and Nature of Administrative Law.
Who was Charles Schenck?
Legal Considerations and Administration
U.S. Department of Justice
Directive 2016/800 on procedural safeguards for children suspected or accused in criminal proceedings Steven Cras Political Administrator, General Secretariat.
Importance of Law and Policies in the Environmental Management System
Public Safety and Title IX Administrators: Working Together
Presentation transcript:

Philosophy 223 Technology in the Workplace: The Concern for Privacy

Morality and Privacy What is the moral status of the claim to a “right to privacy?” One way to think about it is to remind ourselves of how rights work: they protect us from vulnerabilities. All of us have facts about ourselves that, if known by others or in the right circumstance, would make us vulnerable to harm. It is on this basis that something like a right to privacy is thought to have moral standing. Clearly, work is one of the circumstances where we could potentially be harmed by other’s knowledge of certain facts about ourselves. Like all rights the right to privacy must presumably be balanced by the compelling rights of others.

Johnson, “Privacy” Johnson examines the effects that computers have had on record keeping and as a result on personal privacy. Examining the justifications for a right to privacy, she raises several issues regarding privacy and the manner in which we use computers in record keeping.

Four Scenarios Johnson begins her discussion by detailing the sort of concerns that technology in the workplace have raised about privacy. Fund Raising and Potential Donors Taking Data Home Workplace Monitoring Data Mining What concerns do these scenario raise?

Computers have changed record keeping five primary ways The scale of information has changed. The kind of information that can be gathered has changed. The scale of exchange of information has changed. The effect of erroneous information can be magnified. Information about events in one’s life may endure much longer.

Why do Businesses Collect the Information? Institutions justify information gathering by arguing that it helps them make better decisions: i.e. banks make better loans, law enforcement agencies are better able to identify and capture criminals, etc. The question we have to consider is how do these sorts of considerations balance against the rights to privacy of employees, suppliers, customers, etc.

Arguments for Privacy Information Mediates Relationships: Control of information is central to the control of relationships and this extends to Individual-Organizational Relationships and thus reduces our autonomy. Information as a Social Good: Harms our autonomy, when we alter behavior because we know we are being observed and recorded, has the potential to stifle creative and critical activity, aspects central to a flourishing democracy and an important social good. Thus, privacy should be seen as a competing social good alongside the social goods used to justify the gathering of information such as law enforcement.

Smith, “Internet Content Providers and Complicity in Human Rights Abuse” Smith examines the recent issues that have emerged surrounding ICPs operating in China. She argues that there is an important difference between active and passive indirect violations of human rights. As a result, she encourages ICPs operating in China to strive for more passive responses to demands that are likely to violate human rights.

Problems raised by internet censorship in China Regulatory efforts to block access to Web sites, filter information, shut down information portals, and gather information off the Internet on activities of individuals violate basic human rights: the right to expression political association entitlement to privacy in matters of legitimate, peaceful social action.

The Role of ICPs ICPs have been instrumental in the carrying out of directives of the Chinese government, including: filtering content; turning over personal information in order to aide in the prosecution of Chinese citizens for unlawful political speech.

What Should the ICPs do? Complicity: Authorization, toleration, neglect, or assistance in the commission of abuses of human rights by another. Direct Violations – characterized by the intention to deprive an individual of some human right. Indirect Violations – violations that would not occur but for adherence to a directive issued by some authoritative individual, organization, or agency. Active Indirect Violations – acts that take positive steps to deprive individuals of their rights where the extent and methods used in the violation are at the discretion of the secondary party. Passive Indirect Violations – acts that are compliant to a specific directive issued by a principal authority.

Resistance through Passivity Since passive indirect violations constitute instances most in line with merely following the specific directives of an authoritative power, these acts are the least morally problematic. Additionally, by restricting compliance to the most specific demands and requirements some human rights violations may be deterred or prevented. Thus, ICPs should aim for greater passivity with regard to government censorship of the internet.