Ethics of Information Flashcards
The majority of major US companies use ____________ to monitor their employees to prevent theft.
surveillance
Explanation
The US Chamber of Commerce has estimated that businesses lose $40 billion yearly from employee theft. Therefore, big companies use surveillance as a deterrent and to catch employees who steal.
By 2003, 92 percent of employers were conducting some form of electronic monitoring of _________.
employees
Explanation
Monitoring included video taping, GPS tracking of cars and cell phones, monitoring of email, chat messages, phone calls and web browsing.
One modern method of determining the ____________ of employees is via electronic monitoring. Using information such as counting computer mistakes, keystrokes, time taken to complete tasks, and time away from terminals, management can determine the standard of each worker.
productivity
Explanation
Using technology, employers are capable of keeping a close watch on the activities and productivity of every employee. Although this provides useful information for the employer, unions argue that employees’ privacy is being invaded and that it causes employees stress.
Employees who have sued their employer over the issue of employee surveillance have claimed that it is an invasion of ______.
privacy
Explanation
Courts generally rule in the employer’s favor if a legitimate purpose for monitoring can be provided. Where business interests, such as efficiency or legal liability, are at stake, surveillance is legally allowable.
_________ employee use of email, voice mail and Internet use is common practice for employers and they have great latitude when doing this as it covers their own equipment.
Monitoring
Explanation
Since company equipment is used for generating email, voice mail and for surfing the Internet; employers have greater scope in monitoring such activity. The courts have held that they can monitor materials created, sent and received for business purposes. Employees can be disciplined for inappropriate email messaging or Internet use.
In spite of potential invasion of _______ issues, companies are monitoring employee email and Internet usage as never before.
privacy
Explanation
By 2001, 47 percent of big companies actively monitored email use on the job. One of the primary reasons employers monitor employee internet and email use is that low cost software is now available that enables them to do so.
In National Treasury Employees Union v. ________(1989), the US Supreme Court permitted suspicionless searches where the public need for safety created a compelling interest to suppress the individual’s right to privacy.
Von Raab
Explanation
In this case, the court upheld the right of the US Customs Service to subject their employees seeking promotions or job transfers where drug interdiction or firearm carrying was necessary to a mandatory drug test.
A hospital is suspicious of a mother’s claims that her son is sick and suspect her of deliberately harming her child, so they move the child to a room which is installed with hidden cameras to determine if their suspicions are correct; it is arguable that the hospital is acting in the best interests of the child but on the other hand they are committing a breach of _______ and trust.
privacy
Explanation
We trust our medical professionals, so when they take these type of actions without telling us, they are breaching the trust element of a doctor-patient relationship.
The US Patriot Act, enacted in 2001, was designed to considerably increase the surveillance and investigative powers of local law enforcement agencies but it has been argued that since it was hastily introduced, it lacks the normal checks and balances that safeguards _______________.
civil liberties
Explanation
This Act has been criticized for providing excessive powers to law enforcement agencies to interfere in the privacy rights of individuals.
A ___________ agreement (NDA) states that the individual signing it agrees not to share information regarding the company or its customers with anyone, or to use the information for personal gain.
nondisclosure
Explanation
For example, when someone works for the government they might have access to sensitive information, tax records, police records, etc. It would be unethical and often illegal to access those records for any other purpose than in the course of official business.
There are three broad categories of ___s: bilateral, unilateral, and unilateral with a noncompete.
NDA
_________ nondisclosure agreements are the most common and prohibit employees from disclosing the company’s proprietary information.
Unilateral
Unilateral NDAs that include noncompete agreements are often used by companies that hire ________ workers.
contract
Explanation
Noncompete agreements limit when, where, and for whom the contractor may work after completing the assignment.
In order to be legally enforceable, an NDA must be _______.
specific
Explanation
Nondisclosure agreements (NDAs) must differentiate among the kinds of confidential information to be disclosed. For example, trade secrets, contact lists, and business processes are all different kinds of confidential information.
Industrial _________ can take on many forms, from breaking and entering to stealing documents or other objects to information gathering through IT systems to infiltration by temporary staff or consultants.
espionage
Explanation
It is estimated that industrial espionage costs American businesses $100 billion annually.
___________ information about a company concerns information a competitor might find valuable.
Proprietary
Explanation
Such information includes information related to company finances, research, products and procedures.
The Employee Polygraph Protection Act (EPPA) of 1988 banned most private sector uses of the ____________.
lie detector
Explanation
There are many exemptions to the act however, and these include companies which manufacturer, distribute or dispense controlled substances as well as businesses under contract with the Federal Government involving specified activities.
Proponents of ____________s argue that they are a more reliable and less expensive way to safeguard an employers property than alternatives.
lie detector
The two legitimate purposes of advertising are to ______ and persuade.
inform
Explanation
Through advertising, companies provide potential customers with information prospects need to make the best choice among the variety of available competing products. Advertisers also use advertising to persuade prospects to buy their specific product.
According to William Shaw and Vincent Barry there are ____ types of advertising abuses.
four
Explanation
Ambiguous advertising, concealed facts, exaggerated claims, and psychological appeals are all forms of advertising abuses.
Using vague terms like big savings, low payments, sporty cars and mild cigarettes are all examples of _________ advertising.
ambiguous
Explanation
Ambiguous advertising is unclear and can be understood in a variety of ways.
Advertising which deliberately fails to communicate some facts the consumer needs to make an informed decision is called _________ facts.
concealed
Explanation
An example of concealed facts would include advertising for a health insurance policy which lists illnesses covered but fails to list commonly covered illnesses it does not cover.
In advertising, _______ is a form of exaggerated claims.
puffery
Explanation
Puffery is extravagant praise. It is the combination of exaggeration and evaluation. An example is the use of superlatives: greatest, biggest, best, fastest, etc.
Advertising which attempts to link the product to the prospect’s deepest and most basic needs is called _____________ appeals.
psychological
Psychological appeals use ______ to persuade rather than reason.
emotion
Directly comparing a company’s product with a competitor’s product is called ___________ advertising.
comparative
Explanation
Comparative advertising has increased in recent years due to a belief by advertisers that specific information about brands, especially comparative information, helps consumers make informed decisions.
One issue which has been controversial since the 1970s is ____ in advertising.
sex
Explanation
Sex in advertising is a hotly contested and long-debated subject, The use of sex and sexuality briefly subsided in the late 1970s (primarily due to the feminist movement), but in 1980, Calvin Klein jeans ran a series of successful ads featuring Brooke Shields and made it popular again.
In negotiation, when one attempts to deceive others about one’s negotiating position or intentions, it is called ________.
bluffing
Explanation
For example, if Sam is attempting to sell a used car and he tells the prospect that the lowest price he will accept is $500 when he would really be willing to accept $350, Sam is bluffing.
According to ____, deliberately lying about the reservation price (bluffing) is legal, a common practice, and permissible according to conventional morality and it is therefore morally permissible.
Carr