Ethics of Information Flashcards
The majority of major US companies use ____________ to monitor their employees to prevent theft.
surveillance
Explanation
The US Chamber of Commerce has estimated that businesses lose $40 billion yearly from employee theft. Therefore, big companies use surveillance as a deterrent and to catch employees who steal.
By 2003, 92 percent of employers were conducting some form of electronic monitoring of _________.
employees
Explanation
Monitoring included video taping, GPS tracking of cars and cell phones, monitoring of email, chat messages, phone calls and web browsing.
One modern method of determining the ____________ of employees is via electronic monitoring. Using information such as counting computer mistakes, keystrokes, time taken to complete tasks, and time away from terminals, management can determine the standard of each worker.
productivity
Explanation
Using technology, employers are capable of keeping a close watch on the activities and productivity of every employee. Although this provides useful information for the employer, unions argue that employees’ privacy is being invaded and that it causes employees stress.
Employees who have sued their employer over the issue of employee surveillance have claimed that it is an invasion of ______.
privacy
Explanation
Courts generally rule in the employer’s favor if a legitimate purpose for monitoring can be provided. Where business interests, such as efficiency or legal liability, are at stake, surveillance is legally allowable.
_________ employee use of email, voice mail and Internet use is common practice for employers and they have great latitude when doing this as it covers their own equipment.
Monitoring
Explanation
Since company equipment is used for generating email, voice mail and for surfing the Internet; employers have greater scope in monitoring such activity. The courts have held that they can monitor materials created, sent and received for business purposes. Employees can be disciplined for inappropriate email messaging or Internet use.
In spite of potential invasion of _______ issues, companies are monitoring employee email and Internet usage as never before.
privacy
Explanation
By 2001, 47 percent of big companies actively monitored email use on the job. One of the primary reasons employers monitor employee internet and email use is that low cost software is now available that enables them to do so.
In National Treasury Employees Union v. ________(1989), the US Supreme Court permitted suspicionless searches where the public need for safety created a compelling interest to suppress the individual’s right to privacy.
Von Raab
Explanation
In this case, the court upheld the right of the US Customs Service to subject their employees seeking promotions or job transfers where drug interdiction or firearm carrying was necessary to a mandatory drug test.
A hospital is suspicious of a mother’s claims that her son is sick and suspect her of deliberately harming her child, so they move the child to a room which is installed with hidden cameras to determine if their suspicions are correct; it is arguable that the hospital is acting in the best interests of the child but on the other hand they are committing a breach of _______ and trust.
privacy
Explanation
We trust our medical professionals, so when they take these type of actions without telling us, they are breaching the trust element of a doctor-patient relationship.
The US Patriot Act, enacted in 2001, was designed to considerably increase the surveillance and investigative powers of local law enforcement agencies but it has been argued that since it was hastily introduced, it lacks the normal checks and balances that safeguards _______________.
civil liberties
Explanation
This Act has been criticized for providing excessive powers to law enforcement agencies to interfere in the privacy rights of individuals.
A ___________ agreement (NDA) states that the individual signing it agrees not to share information regarding the company or its customers with anyone, or to use the information for personal gain.
nondisclosure
Explanation
For example, when someone works for the government they might have access to sensitive information, tax records, police records, etc. It would be unethical and often illegal to access those records for any other purpose than in the course of official business.
There are three broad categories of ___s: bilateral, unilateral, and unilateral with a noncompete.
NDA
_________ nondisclosure agreements are the most common and prohibit employees from disclosing the company’s proprietary information.
Unilateral
Unilateral NDAs that include noncompete agreements are often used by companies that hire ________ workers.
contract
Explanation
Noncompete agreements limit when, where, and for whom the contractor may work after completing the assignment.
In order to be legally enforceable, an NDA must be _______.
specific
Explanation
Nondisclosure agreements (NDAs) must differentiate among the kinds of confidential information to be disclosed. For example, trade secrets, contact lists, and business processes are all different kinds of confidential information.
Industrial _________ can take on many forms, from breaking and entering to stealing documents or other objects to information gathering through IT systems to infiltration by temporary staff or consultants.
espionage
Explanation
It is estimated that industrial espionage costs American businesses $100 billion annually.