Privacy Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.

Slides:



Advertisements
Similar presentations
SO WHAT DOES THE AUP MEAN FOR ME…??? A Presentation for Students in Grades 3-5.
Advertisements

BUSINESS B2 Ethics.
Whistle-Blowing Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
Strand 1 Social and ethical significance. Reliability and Integrity Reliability ◦Refers the operation of hardware, the design of software, the accuracy.
Emily Snyder, William Darras, Stephanie Berger.  40Y 40Y.
 IT pro’s work raises ethical issues involves privacy. Ex: Should company have right to monitoring employees’ ? Should company have right to log.
Employees and the Corporation The Employment Relationship Workplace Rights Privacy in the Workplace Whistle-Blowing and Free Speech in the Workplace Working.
Business Plug-In B7 Ethics.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
The Role of Computers in Surveillance ~ Katie Hatland.
Ethics and Finance Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
Business Plug-In B7 Ethics.
Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
Business and Society: Ethics and Stakeholder Management, 5E Carroll & Buchholtz Copyright ©2003 by South-Western, a division of Thomson Learning. All.
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
5.02 PowerPoint Objective 5.02 Understand ethics and ethical decision-making.
Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
Computer and Internet privacy University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2010 Feb 2010 ITSS 4201 Internet.
By: Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
Privacy Information: A Consumer Action Project information.org Workplace Privacy Your rights on the job © Consumer Action 2009.
Objective 5.02 Understand ethics and ethical decision-making.
ISNE101 Dr. Ken Cosh. Review  Dependability  Reliability  How do we improve it?  Security  Threats & Countering the Threats.
CORPORATIONS AND EMPLOYEES Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
© The McGraw-Hill Companies, Inc., 2002 All Rights Reserved. McGraw-Hill/ Irwin 17-1 Business and Society POST, LAWRENCE, WEBER Employees and the Corporation.
Ronald F. White, Ph.d. Professor of Philosophy College of Mount St. Joseph.
Computer and Network Use Policies ITSS 4201 Internet Insurance and Information Hiding ► University of Palestine ► Eng. Wisam Zaqoot ► Feb 2010.
Perky Perko Placement Co Employment Training Agency.
Norton UniversityBusiness Concepts and Social Issues 1 PART TWO Business Concepts and Social Issues.
8/2: Managing IT: Security & Ethics Security: Controls –Information Systems controls Input, processing (hardware, software), output, storage –Facility.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
Distribution of Health Care: The Classical View By: Ronald F. White, Ph.D. College of Mount St. Joseph.
By: Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
RISK Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
By: Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
McGraw-Hill/Irwin © 2006 The McGraw-Hill Companies, Inc. All rights reserved. 2-1 BUSINESS DRIVEN TECHNOLOGY Business Plug-In B2 Ethics.
Privacy at Johnson and Dresser By: Anuj Ghai & Ubaid Khan.
By: Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
Personal Identity Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
Understanding Business Ethics 2 nd Edition © 2014 SAGE Publications, Inc. Chapter 9 Ethics and Information Technology Understanding Business Ethics Stanwick.
“How Technology Is Changing Privacy Issues In The Workplace” By Catherine Clarke.
F.A. Hayek and Libertarianism Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
Health and Safety in the Workplace Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph.
Privacy.  Fact: One of the least secure methods of communication you can use.  s are stored at multiple locations such as sender’s computer,
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Ronald F. White, Ph.D. College of Mount St. Joseph.
What Would You Do? The Risks of Behavior on the Internet.
Employee Crime and Employee Monitoring Ryan Gray Eric Van Horn.
CHAPTER SIXTEEN The Right to Privacy and Other Protections from Employer Intrusions.
BA 417: Business Ethics Mini-Lecture 5b: Privacy and Safety in the Workplace.
Ethics and the Conduct of Business
Privacy and the Law.
Chapter 16 – Careers in Information Technology
Ethical, Social, and Political Issues in E-commerce
Justice in Compensation
Emily Snyder, William Darras, Stephanie Berger
Ronald F. White, Ph.D. College of Mount St. Joseph
Understand ethics and ethical decision-making.
By: Ronald F. White, Ph.D. College of Mount St. Joseph
– Communication Technology in a Changing World
LEGALITY, MORALITY, AND ECONOMICS
Global Issues in Business
Objective 5.02 Understand ethics and ethical decision-making.
Personal Responsibility and the Regulation of Vice
Communication Technology in a Changing World
Allocation of Health Care Resources By: Ronald F. White, Ph.D.
Understand ethics and ethical decision-making.
Organizational Leadership: The Philosophical Landscape
Ethical Issues in Information Technology By: Ronald F. White, Ph.D.
Presentation transcript:

Privacy Ronald F. White, Ph.D. Professor of Philosophy College of Mount St. Joseph

Introduction Individuals living in communities. Business as a competitive enterprise. – Need for monitoring and enforcement of rules – Need to hire and fire employees based on information Business and Government – Should government play a role in protecting (or not protecting) employee privacy?

Employee Privacy Three Definitions – The right to be left alone – The right to have control over personal Information – A right not to have undocumented personal information known by others

Value of Privacy Utilitarian Arguments – Costs and benefits of respecting employee privacy Kantian Arguments – Treat persons with dignity – Treat persons as ends never as means. Lockean Arguments – Personal Information as Private Property

Steps toward a Policy The purpose for information gathering. – Is gathering the information worth the cost of gathering it? The means used to gather information. – Does the employee know that certain information will be accessed? Accuracy, completeness, and access. – Is the information gathered Complete, true, and who shall have access to that information.

Some Issues Pre-Employment Screening – Internet Searches – Facebook, Twitter, etc Monitoring computer use in the workplace. – Non-work-related usage Social networking Private Surveillance cameras in the workplace – Employee safety – Monitor employee behavior Theft Use of health related information – Health insurance Testing – Drug Testing – Honesty Testing

Approaches Stockholder Theory – Market-Based – Contractual Stakeholder Theory – Duty-Based