Unit 6- Privacy Flashcards

1
Q

What is Privacy?

A

It includes the right to be left alone, to control and access information, having secrets remain secrets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When was Privacy constitutionally declared in the US?

A

1965

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Challenges in Achieving Privacy

A

The Privacy Act of 1974 was designed in large part to
resolve the conflict between government accountability and individual privacy.

Privacy of private individuals is compromised in investigations, collective bargaining by unions( they would use info like the number of children, marital status, illnesses which may not directly affect one’s job).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Three items to consider in finding balance between employee privacy and employer’s right to employee info

A
  1. Relevance - the employer must limit his inquiry to areas that are directly relevant to the issue at hand.​
  2. Consent - employees must be given the opportunity to give or withhold consent before their private lives are investigated and should be informed of any surveillance.​
  3. Methods - employers must use ordinary and reasonable methods of inquiry unless circumstances are extraordinary.​
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Arguments for Privacy

A

Utilitarian

Kantian

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Utilitarian Argument for Privacy

A

Collecting inaccurate incomplete info and using it to make important personnel decisions will harm individuals and employees.

Drawbacks- It only looks at the harm done and ignores the benefits when employers use various methods of data collection ( amass personal info, poly graph testing, drug testing).

Only considers negative consequences

Note:
(Remember that to apply Utilitarian theory, you look at benefits and costs and then you come to a conclusive consequence. So point 1 and 2 are not the same point 1 looks at benefit/cost, point 2 is the ultimatum)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Kantian Arguments

A
  • Autonomy- invasion of privacy prevents him from making rational decisions as a free being, (You know Kant valued freedom to be given to us rational beings)
  • Respect for Persons- invasion violates having respect for that person
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List the 7 Privacy Issues with Employee Record

A
  1. Kind of Info collected
  2. Use if Info
  3. Informal access to info- unauthorized people know the info
  4. Disclosure to outsiders
  5. Information Collection Methods- use only ethical means, use the least intrusive means as much as possible
  6. Accuracy and Completeness- if the info will be used to make critical employee decisions, employees should have good records.
  7. Employee access to own records- if the info will be used to make critical employee decisions, employees should be able to see their file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or false- Efforts to improve employees’ well-being can undermine their privacy​

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Employee Assistance Plans?

A

Programmes that Help in handling personal problems and drug addictions​

The information gained is held in confidence but is available for company use when an employee ​files a workplace injury claim, sues for discrimination, or wrongful discharge​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the concern with Consumer Privacy

A

The info gathered are given to or sold and in turn used to make tailored offers to consumers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The term for the main concern in Consumer Privacy is?

A

Secondary use of Information- info being used for another purpose than what it was given for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The task of justifying a right of privacy consists of both:

A
  • Demonstrating the value of privacy

- Determining which intrusions into our private lives are justified and which are not​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Employees’ right to privacy can be violated when personal information is​:

A

Gathered without a sufficient justifying purpose. ​

Known by someone, not in a position related to the justifying purpose​.

Used for illegitimate purposes​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some examples of a justified reason for certain handling of employee info?

A
  1. Personal info gathered with a legitimate purpose
  2. Only relevant persons have access to info
  3. Info is used for legit purposes

Eg. medical records on employees in order to
administer benefit plans, for example, and to monitor occupational health and safety.

Only specific medical info taken
Only administers of health benefits plan etc have access to info
Info only used to administer the plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the Objections to the polygraph machine?

A
  • Whether we are telling the truth is measured using physical traits which we cannot control
  • Proven to be unreliable
17
Q

The reality of Using the Internet

A

Nothing is private. The internet makes it easier to access your information. Most commonly done through cookies which get your information and makes it available for secondary use

18
Q

What is the issue with data collection According to Lessig?

A
  1. Info collected places us into a mold, which may not truly reflect who we are and only feeds us info based on the mold. (Autonomy)
  2. Info collected could undermine equality. Info can be used to select those who will receive better offers. Eg. Airlines identify better customers and offer them special treatment. (Equality)
19
Q

Ethical Issues with Big Data (Based on What’s wrong with data collection)

A
  • Lack of awareness​
  • Difficulty of protection​
  • Loss of privacy​
20
Q

Three views “Camps” on privacy

A
  1. Those who fear a “dossier” society where every facet of our lives is controlled by those with power.These want strict limits on the kinds, amount and
    availability of data.
  2. Those who view data as “tradable” in the market.
    Seeing it as a valuable commodity, these want to ensure customers don’t trade their info too cheaply
  3. The dominant Camp- consists of people in the industry, government, and public interest groups
    who want to balance people’s concerns about privacy
21
Q

What are the 5 principles of Privacy?

A
  1. Notice/Awareness. Disclose the identity of the collecting party, the information collected the means for collecting it, and the uses to which the information will be put.
  2. Choice/Consent. Provide a mechanism for choosing whether to allow information to be collected.
  3. Access/Participation. Allow consumers access to the information collected about them and the opportunity to contest the accuracy or completeness of the data.
  4. Integrity/Security. Inform users of the steps taken to protect against the alteration, misappropriation, or destruction of data and of the action that will be taken in the event of a breach of security.
  5. Enforcement/Redress. Assure consumers that the company follows responsible information practices and that there are consequences for failing to do so.
22
Q

What are the 2 ways in which to implement Internet Privacy?

A

Formal means- the law

Material means- development of software

23
Q

Limitations to Material means

A

Ineffective as not all persons can use it (not everyone is tech savvy)

24
Q

What is the name of the most promising tech.

A

Cyber-Jeeves would force websites to adopt the privacy policies that
the majority of Internet users desire.