...The ethical issue identified questions if it is right for BB to implement the 8-minute rule and surveillance system to limit employees’ personal break time in order to reduce customer waiting time, when doing so infringes upon the employees’ rights to fairness and privacy? Kantian ethics is the most relevant here as the tension results from conflicting rights and duties. This 8 minutes policy promotes the rights of BB, its shareholders and customers. However, even though employees have a duty to adhere to this policy, doing so would be incongruent with their moral rights to fairness and privacy. The employees are not being respected as equal and autonomous persons capable of making decisions in their own life, and physical privacy is violated when they are no longer able to have private personal time as and when required, without being monitored. This perspective identifies which rights and duties are in conflict, to be be addressed in the recommendations. Rawlsian ethics is also relevant as it helps to prioritize the conflicting rights and duties. Under the veil of ignorance, no rational and self-interested employer who could now be at the receiving end of the policy would want to risk having his privacy infringed upon. Hence, this perspective helps to decide which rights cannot be sacrificed for others. Lastly, the Utilitarian perspective here helps to analyze and weigh the consequences of each decision made. The analysis shows that short term benefits of a policy...
Words: 604 - Pages: 3
...CONTEMPORARY BUSINESS ISSUES – PRIVACY IN THE WORKPLACE How Privacy Issues Affect Businesses How Privacy Issues Affect Businesses The existing economic and business setting implies on-going efforts towards better understanding and dealing with the challenges of the modern era, which are characterized by the crucial need for making changes due to intense competition and ongoing global crisis’. As a rule, privacy rights are established by explicit regulations, laws or rules. Some privacy rights are relevant in the workplace and some don't. And even if there is no particular law, a right to privacy can be based on the legal common law notion of having a "reasonable expectation of privacy”, (Lippke, 1998). For employers and employees in the business industry, privacy concerns have become progressively more widespread in the workplace, and with the increased use of electronic resources, privacy at work is even more compound. Consequently, it is imperative that both supervisors and managers have a fundamental understanding of some of the more common privacy rights and issues that can arise, as well as the restrictions that may apply. Some of the more prevalent privacy issues that employees face are drug testing, email monitoring, personnel records, social security numbers, monitoring and eavesdropping, back-ground screening, and medical records. Because of these issues, there are quite a few areas of human capital management in which privacy rights are recognized. Whether...
Words: 2173 - Pages: 9
...[Type the company name] | Google and Privacy Issues | | | Google is the highest used internet search engine and is free for international use. Good and bad exists with everything and although Google provides people all over the world with tons of information, it is constantly being overlooked and controlled by the people who created it and who control it which can be seen as a huge downside for many individuals. There are many critisms of Google such as manipulation of search results, violating people’s privacy and censorship of search results such as page ranking. Although Google provides services that play a large part in many people’s lives for free, it does come at the price of an individual’s personal information and privacy. Google, Facebook and every browser ever created have always gathered data and used that data, but never have these companies created a compilation of personal information based on years of our trusting them. Google has been attempting and has begun to succeed in taking over all of our digital media, from the top used search engine as well as Gmail and Google news which have become the number one news source for many people. People are taking information that they want to hear and Google has been trapping society in a box by finding out our major interests and purely basing everything else off of that rather than incorporating new ideas. Google has the power to control us without us even realizing it and “because Google is so readily...
Words: 1655 - Pages: 7
...MOBILE COMPUTING Mr. Rohit Rastogi1 Mr. Amit kumar singh2 Mr. Anant gupta3 Mr. Anshul ojha4 --- Sr. Asst Professor, CSE-Dept-ABES Engg. College, Ghaziabad (U.P.), India, rohit.rastogi@abes.ac.in (+91-9818992772) 2,3,4 ---B.Tech. CSE-III Yr., CSE-Dept-ABES Engg College, Ghaziabad (U.P.), India 2----amit04cs@gmail.com , 3----anant1993@gmail.com , 4-----anshul.ojha733@gmail.com (+91-9540965583) (+91-9716422396) (+91-9650296661) EXTENDED ABSTRACT Definition: A technology that allows transmission of data, via a computer, without having to be connected to a fixed physical link. INTRODUCTION • Emerging technology with intercross of many subjects. • Hotspot in computer technology sector. • One of four far reaching computer implications. • New technology growing with mobile communication, internet, database, distributed computing. ASPECTS • Mobile Communication • Mobile Software • Mobile Hardware MOBILE COMMUNICATION Communication between moving bodies or, between a moving body and a fixed body. Features • Sever noise and interference. • Complex system and network configuration. MOBILE HARDWARE AND SOFTWARE • History of mobile hardware goes from a mobile phone with calling facilities to a mobile phone with internet, camera, video recorder etc. • Mobile software’s run on handheld computers, smartphones...
Words: 402 - Pages: 2
...III. Security and Privacy Issues of electronic medical records Although it has been around three decades, moving from paper-based to electronic medical records might still face some issues and challenges. These issues can be classified as information use and disclosure; information viruses and errors; secondary use of the information; unauthorized access; and external or internal attacks. Therefore, electronic medical record needs a high level of anonymity, and privacy and security are considered as the most essential obstacles that face this anonymity. There are different laws in the United States that care about the patient’s rights of security and privacy, such as the Health Insurance Portability and Accountability Act (HIPAA). However,...
Words: 1213 - Pages: 5
...German Politician Exposes Personal Data Gathered by Cell Phone Companies German politician Malte Spitz recently sued his mobile provider, Deutsche Telekom, in order to obtain data that the company had collected on his own whereabouts. Deutsche Telekom complied, and handed over all the geographic information it had gathered over a six-month period. As it turns out, the provider recorded Spitz's location on more than 35,000 occasions in six months, or about 78-percent of the time. Deutsche Telekom knew where he worked, where he liked to hang out, and which cities he visited. It knew when he was flying, when he was sleeping, and when he was most likely to send text messages. Spitz, on the other hand, never even knew that he was being tracked. Cell phone companies are constantly gathering data on their customers' whereabouts in order to efficiently route calls through nearby towers. But U.S. law doesn't require these providers to report the information they collect. Law enforcement agencies actually encourage companies to keep close tabs on consumers, since cell phone data is often critical to criminal investigations. That information could also be of interest to many marketers, but some U.S. cell phone companies have been less than forthcoming about how they use our personal data. In a statement provided to the Times, Verizon acknowledged that "information such as call records, service usage, traffic data," could be used in targeted marketing campaigns, "based on your use of...
Words: 382 - Pages: 2
...Ethical issues on confidentiality and privacy of patients According to American nursing association article regarding patients medical information’s privacy and confidentiality shows us “Advances in technology, including Computerized Medical Databases, The Internet and Tele-Health, have opened the door to potential, unintentional breaches of private /confidential information of patients, so nurses and other health professionals who regularly work with patients and their confidential medical records should contribute the development of standards ,policies and laws that protect patient privacy and confidentiality of health records .” Due to the fast advancement of technology, it is very hard to protect our privacy in the areas of medical sectors. Many people have access to patient’s medical records including the attending physician, house staff, student, consultant, nurses, social workers, pharmacists, billing staffs and insurance company employees. Although computerized medical records have vital roles to improve the access to medical information efficiently, they allow more serious breaches of confidentiality. For example, confidentiality can be violated at any computer station, and fax and e-mail also present opportunities for confidentiality to be broken. I think in my opinion, keeping medical information confidentially shows respect for patents that except physician to maintain confidentiality, and it plays a vital role in improving employees ethics at work. Furthermore,...
Words: 610 - Pages: 3
...BIOMETRICS (IN TERM TO ETHIC AND PRIVACY ISSUES) IFSM201 Section 4035 Semester 1302 DUE DATE 02/03/2013 Introduction Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyzes human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes. Authentication by biometric verification is becoming increasingly common in public security systems, cooperate, consumer electronic and point of sale application. In addition to security, the driving force behind biometric verification has been convenience. (Rouse, 2008) In the recent years, civil liberty organization has argued that the collection of biometric data undermines the human rights for privacy and anonymity. (Shaikh, 2005) One of the most oldest and accurate type of biometric systems is fingerprint recognition; it is an extremely useful biometrics technology. Fingerprints have long been recognized as a primary and accurate identification method. It has been used for commercial, government and forensic purposes. Iris recognition system is highly nature technology and provides the most secure methods of authentication and identification thanks to the unique characteristics of the iris. This made the technology very useful in areas such as information security, access security, ATMs and airport security...
Words: 657 - Pages: 3
...RFID Tags in Stores and Their Privacy Issues RFID tags in stores and the privacy issues that arise from their use are that they can be read from a distance. These tags are able to store personal information about the consumer. The RFID tags can be placed on an item without the consumer even knowing that it is there. RFID stands for Radio Frequency Identification. RFID tags are a technology that uses very small computer chips about the size of a grain of sand. They are used to keep track of items from a distance. Each chip has a unique identification number that is paired to an antenna that transmits information between it and a reader device. Some of these chips can transmit information to a reader that is up to 30 feet away. RFID tags can be programmed to store personal information about how a person shops, what they buy most often, how often they go to a certain store. Some chips could even store what credit card was used to make a purchase. RFID tags can be hidden from the consumer. These chips can be put between layers of cardboard. RFID tags can be placed in plastic or they can be in the design of the package. Privacy issues for RFID tags are that they can be read from a large distance by anyone with a reader. RFID chips can lead to theft of personal information by criminals. The consumer may not know that the chip has stored their personal information or that it can be read by anyone with a reader. The RFID tags can be hidden many different ways from...
Words: 297 - Pages: 2
...Introduction: A brief chronological review of “privacy” concept indicated that it is accentuated since Hippocrate, s oath at the first time (1، 2). Thereafter, It was argued as “the right to be let alone” by Samuel Warren and Louis Brandies in 1890s, then it evolved as “informational privacy,” which is defined by Allen Westine suggesting it is considered as an individual’s right to control personal information(3). Privacy, confidentiality and security are three interwoven concepts concerning personal information. Privacy refers to determination of the authorized collection and storage of personal information, meanwhile, confidentiality indicate how organizational information may be collected or re-used and also explicate required conditions...
Words: 898 - Pages: 4
...publish or communicate their work to the world. The nature of this technology makes it easy and popular way to communicate information to a much wider audience. There are number of different types of web 2.0 applications including wikis, blogs, social networking, folksonomies, podcasting & content hosting service, YouTube, Facebook, MySpace, and Flickr (Thomson, 2008). However, despite it greater advantageous to our world today, there are some threats involved on the other hand. In this essay, I will discuss some number of privacy and ethical issues associated with the use of this type of technologies. As well some threats such technologies pose for small Pacific Island communities. Lastly, I will discuss the reasons why a privacy bill should or should not be adopted in the Pacific. Ethical and privacy issues related with the use of web 2.0 technologies? Copyright is one of a major issue related with the use of web 2.0 technologies. This ethical issue is referring to copy of others information illegally, by means without the permission of the copyright holder. Using of web 2.0 technologies like Facebook, you tube and other applications nowadays are rapidly growth all over the world. So, this great revolution supports us in every aspects of life. For example, businesses use it to enhance business activities such as advertisement of their products and other related activities. In somehow, these great opportunities of communication and exchange misuse by some other business to...
Words: 774 - Pages: 4
...Running Head: THE EXISTENCE OF PRIVACY WITH TECHNOLOGY THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Obediah Howard Bellevue University THE EXISTENCE OF PRIVACY WITH TECHNOLOGY Abstract This research paper will discuss the relationship between privacy and technology. It will attempt to ascertain if technology and privacy can share the same plane of existence. Benefits and deficiencies of a particular technology are not hereditary to that technology, but are depend on their application. The public insists on accountability of technological innovation and assurance that privacy will remain intact. Striking a balance between enabling technology to enrich lives and restricting it from invading privacy has to be addressed. Implementing controls to protect private data is imperative. Technological advances over the years have challenged the public’s perception and expectation of privacy. Technology and one of its preeminent by-products, convenience, will continue to grow exponentially for the foreseeable future; there is no evidence to suggest otherwise. Privacy finds itself in a precarious position in the face of evolving technology. The collective concept of privacy has to be revisited. With the advent of technological innovations and the accessibilities they bring, privacy in its purest form does not exist. From an anthropological perspective, privacy is a relatively modern development. Ancient cultures practiced communal...
Words: 1783 - Pages: 8
...Ethical and Legal Issues Concerning At-will Employment Jasmine Mills Park University Abstract As years pass by, every sphere of life is taking a new dimension; for instance, advancing technology. This has resulted in some ethical issues in workplaces such as cyberloafing, privacy, information technology usage, employee monitoring. Also, legal issues in workplaces such as lawsuits have emerged. Both employers and employees are worried about the ethical consequences resulting from the ethical issues While bosses use surveillance devices to keep track of their workers' activities and output, these workers feel that excessive monitoring is an attack on their confidentiality and privacy. The strategy of checking workers on a timely basis is contributed by the fact that bosses have rights over everything in the “at-will employment environment.” Additionally, this paper provides a proposal for reducing the ethical and legal issues. The paper also encourages organizations to generate and efficiently communicate ethical standards for workers in their companies. It also includes real examples of workers' perceptions as well as an emotional state from the surveys based on ethical and legal issues raised regarding the topic of study. Keywords: At-will employment, employee monitoring, Ethical and legal issues. Introduction At- will means employment can be terminated at any time, for any reason or no reason without facing legal action. Likewise, an employee can quit a job with or...
Words: 2152 - Pages: 9
...Privacy in the 21st Century Eng 122 Mrs. Samaniego 10 June, 2013 In today’s society cameras are watching every step you take and every move you make. How do you feel about that? Someone is watching you, whether it is the surveillance cameras at a gas station or it’s the security guard in a shopping mall. Does this make you feel uncomfortable? You post something on Facebook and decide to delete it 5 minutes later, but did you know that it will always be on the internet although you deleted it? You may not see it but others will. In today’s society, personal privacy rarely exists. There are certain devices and tools that people use when trying to invade someone’s privacy including hidden cameras and satellites. Privacy no longer exists due to all of the new technologies and programs enabling the invasion of someone’s privacy. What is privacy? Do people today really understand what privacy is? Have they had the opportunity to experience privacy? The definition of privacy is “allowing an individual or group to seclude themselves or information about themselves and thereby reveal them selectively.” When something is private it is usually something personal or valuable to someone. Everyone likes privacy but...
Words: 1903 - Pages: 8
...reasonably expect to have privacy in the workplace. Privacy has become extremely important part of American culture. Lately, work place privacy has brought unwanted and costly litigations. To protect the company from those kinds of litigations, organizations are monitoring employee communications carefully. Although according to courts the private organizations have rights to monitor employee communications. In order to this `` Employee surveillance and email monitoring in the workplace present a number of sometimes conflicting issues regarding an employer’s need to protect its property and itself against liability and an employee’s right to privacy``(Adams, Scheuing & Feeley, 2000). Martin and Freeman (2003) also examined key arguments for and against employee monitoring, productivity, security, liability, privacy, and creativity. Privacy may be invaded in four ways. The first is unreasonable intrusion upon a person’s seclusion. Appropriation occurs when the use of a person’s name or likeness is used for economic benefit. Third is public disclosure of private facts. Finally, false light Most cases concerning invasion of privacy by employers involve intrusion upon seclusion’s is publicly characterizing or placing a person in a false light (Chieh and Kleiner, 2003) Most cases concerning Invasion of privacy by employers involve intrusion upon seclusion. At this video to listening to conversion is not an ethic behavior and employee can expect to have privacy at that situation. ...
Words: 885 - Pages: 4