SlideShare a Scribd company logo
1 of 12
Running head: ETHICS RESEARCH PAPER 1
Employee Surveillance – how elastic can rights be?
Irena Tsikaris
Baker College
ETHICS RESEARCH PAPER 2
Employee Surveillance – how elastic can rights be?
Introduction
According to an Academic article, retrieved from the ProQuest database, the statistics
about how employees manage their time while working “on the clock” is not very much in their
favor. “A recent survey of over 4,600 human resource managers and over 4,000 employees
indicates that approximately 65% of employees spend at least some work time on non-work
related Internet activity” (Sanders, Ross, & Patison, 2014, p. 1). The article further gives more
information about the kind of activity they perform: “Of those employees using social networks
sites, some 56% check their profiles during their typical workdays and 15% of this group spends
at least one hour a day browsing (Sanders et al., 2014, p. 1). With respect to the previous facts,
this paper further researches the issue, engaging relevant sources to elaborate on both opposed
approaches; on the side of the employers – they have all the rights to preserve company’s profits
and to protect it from any attempts to discredit and on the side of the employees – it’s a violation
of their privacy and the fact that they are on the pay roll does not give the company rights to put
them under surveillance. How elastic can really employees’ rights be and would they allow for
the employers to “squeeze in” regulation for random acts of surveillance?
Business interests vs worker privacy
With respect to the problem introduced above, most of the employers take two basic
steps: they monitor the email accounts of their employees and they block certain web- sites from
accessing. According to the following information published online: “Looking just at e-mail, a
1996 survey by the Society for Human Resource Management found that 36 percent of
responding companies searched employee messages regularly and 70 percent said employers
should reserve the right to do so” (Schulman, 2014 , para. 5). There is statistics available for the
ETHICS RESEARCH PAPER 3
other step as well: “In 2007 employers seemed to be highly concerned with inappropriate web
surfing and cyberloafing; 65% of the companies monitoring employees used software to block
inappropriate websites, up 27% from 2001. Inappropriate sites that are blocked by companies
include those sites with adult content (96%), games (61%), social networking (50%),
entertainment (40%), shopping (27%) and sports (21%)” (Sanders et al., 2014, p. 2). In addition
to this a company might decide to opt for a more radical option, called “behavioral monitoring”
thus monitoring all kinds of activity connected to the workplace. This will not necessarily be
implemented only for the lower level of employees, but also for the technical and managing staff.
In the era when there is video surveillance everywhere, it is not that hard to implement it; and
again there are two approaches to this, it can be done openly or secretively.
It is debatable exactly what portion of his/her privacy, if any, an individual should give up
upon entering a certain workplace. Some would argue that the right to privacy is a part of the
“respectful” treatment they are entitled to, given the fact that one of every company’s greatest
assets is – the human capital.
Monitoring software, privacy & law
The use of the Internet for private research or engaging in social media poses a huge
problem to most businesses. One concept would be that the company is allowed to acquire some
monitoring programs: “the number of ways these programs can monitor an employee is
astonishing and now that the monitoring software product market is maturing, it is possible for
any company to cheaply and easily use software to monitor their employees” (Bassick,
McNamara & Sullivan, n.d., Monitoring Employee Internet Use: The Rights Approach Section).
The concept of privacy is also strictly related to the topic and the notion is that Internet
means – “end of privacy”. As stated in the following citation: “There are two differences
ETHICS RESEARCH PAPER 4
between the Internet and the “real world.” First, unlike its physical counterpart, the Internet
records everything. Second, it allows for far easier, remote, access to what is going on and the
record thereof — either by the person-of-interest’s design, with her permission, or (unfortunately
frequently) otherwise (Morrison & Bailey, 2011, p. 91). Another concept is the legal one, and
this is where “employees have little recourse; the most relevant federal law, the 1986 Electronic
Communications Privacy Act, prohibits unauthorized interception of various electronic
communications, including e-mail” (Schulman, 2014 , para. 6). The legal concept is very well
covered in the following citation:
Because of constitutional considerations public employers have a greater burden to
protect employee privacy. The Fourth Amendment’s protection against unreasonable
search and seizure may include employee privacy of messages sent electronically on the
employer’s equipment. The Fourth Amendment, as applied to the states and
municipalities through the Fourteenth Amendment, protects the “right of the people to be
secure in their persons, houses, papers, and effects, against unreasonable searches and
seizures . . . .” Employees have Fourth Amendment rights only when they have “an
expectation of privacy that society is prepared to consider reasonable. (Sanders et al.,
2014, p. 3)
Solutions
One of the possible solutions that would take both standpoints into consideration is an
approach in which there will be some kind of surveillance in place, but the extent to which it will
cover the workplace activities will be “loosely” defined, allowing for consideration for the needs
of the employees. This kind of approach has already been implemented in Saratoga Systems in
California, where “Employees know they are being monitored, but they also know the company
ETHICS RESEARCH PAPER 5
respects their occasional need to take care of personal business from the workplace” (Bassick,
McNamara & Sullivan, n.d., Monitoring Employee Internet Use: The Rights Approach Section).
Another proposed solution would be, the company can implement any kind of
monitoring, as long as the employees are well-informed about this; thus being able to exercise
their “right to be told the truth”. This also means that every employee will be given some kind of
list of the websites that are allowed to visit during working on company time and those that are
not, unless self-explanatory. Many employers have found ways to protect themselves from
possible lawsuits for invasion of privacy by making signing a policy that entitles them this rights
part of the employment package. There are lately many cases in the “case law” in favor of the
employers, provided there is a signed policy in place. Such is the case ruled out by the Supreme
Court in favor of the employer Ontario, California police department. The employer had a policy,
“Computer Usage, Internet and E-Mail Policy” and the plaintiff, their lieutenant had signed it.
Sources
Bassick, M.., McNamara, T., & Sullivan, D. (n.d.). Employee Surveillance: An Ethical
Consideration. Retrieved from http://www.ethicapublishing.com/ethical/3CH6.pdf
This is a research paper published on the website of Ethica Publishing, which is owned by Leeds
School of Business at the University of Colorado, Boulder. The research is based on a number of
scholarly articles and publicatons, including journals and other sources from established
authorities in the field of Ethics.
Ghoshray, S. (2013). EMPLOYER SURVEILLANCE VERSUS EMPLOYEE PRIVACY: THE
NEW REALITY OF SOCIAL MEDIA AND WORKPLACE PRIVACY. Northern
Kentucky Law Review, 40(3), 593-626.
ETHICS RESEARCH PAPER 6
This is an article by Ghoshray Saby, published in 2013, in the Northern Kentucky Law Review
Academic Journal, focusing on the surveillance as opposed to employee’s privacy, which is
exactly what this paper will be dealing with. It examines the “privacy” zone of the employees
and discusses the applicability of the First Amendment.
Morrison, C. D., & Bailey, R. L. (2011). Employee Privacy Rights: Employer Monitoring and
Investigating Employees' Electronic Activities and Communications. Energy & Mineral
Law Institute, (32), 66-173.
The article by David C. Morrison and Robert L. Bailey was published in 2011 in Energy &
Mineral Law Institute Academic Journal and focuses on the electronic activities and
communications in the place of employment. It brings about the restrictions imposed on the
employers by regulation in the field of intellectual property.
Sanders, D. E., Ross, J. K., & Pattison, P. (2013). ELECTRONIC SNOOPS, SPIES, AND
SUPERVISORY SURVEILLANCE IN THE WORKPLACE. Southern Law Journal,
23(1), 1-27.
Another article published in Southern Law Journal, in 2013; its authors are Donald E. Sanders,
John K. Ross and Patricia Pattison. The article examines federal and state legislation regulating
electronic monitoring of employees in the U.S with respect to U.S. Constitution Fourth
Amendment rights. It also offers guidance for the employers for successful implementation of a
surveillance system.
Schulman, M. (2014). LittleBrother is watching you. Retrieved from
http://www.scu.edu/ethics/publications/iie/v9n2/brother.html
Meriam Schulman is an associate director of the Ethics Center at Santa Clara University. She
manages the communication, operations, and administrative activities of the Center and serves
ETHICS RESEARCH PAPER 7
on the Center's Management Committee. She also facilitates the Emerging Issues Group, which
brings Ethics Center staff and scholars together to discuss the ethical issues behind the news.
Discussing the arguments
Employers’ arguments in favor of the surveillance go anywhere from - they have to make
sure they get maximum productivity and high level of quality of their services, provided through
an undivided attention of their employees, to - an employee will use the social media to discredit
the company or a coworker and all that on company’s expense. It is a valid argument; moreover,
“such violations of compliance related to social media communication may not be easily
apparent to a supervisor, as it may only be identified either through tracking or through third-
party reporting” (Ghoshray, 2013, p. 602). Another very important argument on the side of the
employers is, they have to protect their stakeholders or the interest of protecting a third party.
Under stakeholders we would consider the customers, shareholders, suppliers, creditors,
neighbors to the workplace and others. Corporations are generally liable for their employee’s
behavior which kind of gives them the rights to monitor the workplace behavior. Any kind of
indiscretion on the part of the employees might directly affect some, if not all of the entities
stated above. These arguments are valid in favor of some surveillance being necessary to regulate
business activities.
Employees’ argument about invasion of privacy in the workplace is equally valid;
“Monitoring employee’s Internet use invades both physical and personal privacy. Regardless of
location or ownership of equipment, employees still possess these rights and by being placed
under such extreme scrutiny, they are being treated in an unethical manner” (Bassick, McNamara
& Sullivan, n.d., Monitoring Employee Internet Use: The Rights Approach Section). Some
employees argue that the whole idea is counter- productive because they spend time and energy
ETHICS RESEARCH PAPER 8
on finding a way to get around the surveillance procedures and take care of their personal
business, which is more time-consuming than if the resources were readily available to them. It
would be far more productive for the company to implement some kind of coaching approach
and train the employees on how to make ethical decision in the light on unrestricted personal
freedom on the workplace, instead of making them respond to rules and regulations. Some kind
of appreciation or reward system for their performance and an increased productivity might also
be more effective than simply applying restrictions.
Ethical theories applied
An application of Utilitarianism in search for the best solution would mean that we
should sacrifice the benefit of few for the benefit of many. In this case, the “invasion” of privacy
imposed on the employees will mean that they will be more productive in the workplace and they
will use more effectively their working hours. This is an input in the company’s overall success
that will benefit the whole society, as better products/services will be brought out to the market.
The enhancement of the company’s financial record will bring additional benefit not only to the
owners, but ultimately to the employees themselves. This will give a Paternalistic “touch” to the
applied Utilitarian theory, as the workers will be protected from themselves and their apparently
wrongful actions.
Kantian theory consists of two important points, as stated in our textbook. The first one
would be the “Golden rule”: “Kant says that we should follow those maxims (or ethical rules)
and only those maxims that we would want all persons to follow. This sounds a bit like the
“Golden Rule,” but it is intended as a test for universalizing, that is, for applying universally”
(Van Camp, 2013, p. 25). The second point “says that we should always treat all other persons
with dignity and respect in themselves and not as a mere thing to use for our own advantage”
ETHICS RESEARCH PAPER 9
(Van Camp, 2013, p. 25). If we make a discussion about his first point, the employers probably
should ask themselves how would they like the surveillance applied on themselves and someone
monitoring closely their activities in the workplace, and the second principle applied, will bring
about questions such as: “Are employees just a means for a company’s success or deserve to be
treated as ends themselves? This makes no surveillance justified under this approach, unless
some kind of individual rationale is in question or the employer really has a reason to suspect
that some of the employees is behaving unethically in the workplace, to the point that it really
interferes with the overall performance of the company.
Virtue ethics theory can also be applied, since privacy seems of little significance in the
eye of employers:
A company implementing this framework would rely on employees to conduct
themselves in an ethical manner. Based on character development, virtue ethics gives
employees the freedom to make their own decisions with the faith that their choices will
represent those made by a “good” person. Giving employees the ability to make their
own decisions may seem risky from management’s point of view, but evidence suggests
that this increased responsibility has increased morale and improved employer-employee
relationships. In fact, employees subject to surveillance have exhibited feelings of
decreased employer trust, increased stress, and subsequently decreased productivity.
(Bassick, McNamara & Sullivan, n.d., Monitoring Employee Internet Use: Philosophical
Models Section)
Elements of virtue ethics can be recognized in the modern trends some very famous
employers implement in their working environment, such as freedom for the employees to
organize their own time and activities, meaning they can even engage in a “leisure”, company
ETHICS RESEARCH PAPER 10
sponsored activities, while on the clock. This is with an intention of “unleashing” creativity, so
that not only the employee, but ultimately the company will benefit from that. Some of the
employers along this line are proven successful companies: Google, Facebook, SAA and others.
So, we not only speak of absence of classical surveillance, but total discretion for the employee
and their workplace activities. This would be in accordance with the Kantian reasoning, but is
not in conflict with the Utilitarian one as well, as we all know that many people, on many levels,
obviously benefit from successful companies like the ones stated above.
Recommended policy
A solution which would be a compromise is: a surveillance in place, but well thought out,
so that the workers can give up the exact portion of their privacy to account for the benefits of
being an employee of that certain company. Another aspect is fairness and honesty on the side of
the company, which will inspire same kind of response on the part of the workers. Any over-
excessive or too personal surveillance will directly violate workers’ rights as per the Kantian
theory and it is subject to debate whether it can still be justified under the Utilitarian approach.
The most popular and efficient approach would be the one under “virtue ethics” and more and
more companies decide to follow that line. It is an unconventional approach and is strongly
related to motivation (motivation is introduced as a prerequisite to releasing creativity).
Motivation itself is induced through self-determination and autonomy and this is one of the basic
rules in psychology. Given the fact that motivation further leads to creativity, makes it clear why
lack of motivation is one of the biggest problems, especially for companies producing
“sophisticated” and intangible goods. Surveillance and monitoring could never mitigate this nor
can a financial satisfaction always work. This moreover makes the approach under “virtue
ethics” justified not only in terms of privacy rights and good ethical standards, but all these and
ETHICS RESEARCH PAPER 11
then - an increased productivity. Of course this might not make sense in all kinds of
environments and job positions, but is certainly worth considering; we tend to behave much
better when we apply our own moral judgements then when we are simply asked for or even
forced to follow the rules.
ETHICS RESEARCH PAPER 12
References
Bassick, M.., McNamara, T., & Sullivan, D. (n.d.). Employee Surveillance: An Ethical
Consideration. Retrieved from http://www.ethicapublishing.com/ethical/3CH6.pdf
Ghoshray, S. (2013). EMPLOYER SURVEILLANCE VERSUS EMPLOYEE PRIVACY: THE
NEW REALITY OF SOCIAL MEDIA AND WORKPLACE PRIVACY. Northern
Kentucky Law Review, 40(3), 593-626.
Morrison, C. D., & Bailey, R. L. (2011). Employee Privacy Rights: Employer Monitoring and
Investigating Employees' Electronic Activities and Communications. Energy & Mineral
Law Institute, (32), 66-173.
Sanders, D. E., Ross, J. K., & Pattison, P. (2013). ELECTRONIC SNOOPS, SPIES, AND
SUPERVISORY SURVEILLANCE IN THE WORKPLACE. Southern Law Journal,
23(1), 1-27.
Schulman, M. (2014). LittleBrother is watching you. Retrieved from
http://www.scu.edu/ethics/publications/iie/v9n2/brother.html
Van Camp, J.C. (2013). Ethics (1st ed). Boston, MA: Cengage Learning.

More Related Content

What's hot

Case study presentation
Case study presentationCase study presentation
Case study presentationenglettk
 
Social Media and Litigation are Outlining eDiscovery Issues
Social Media and Litigation are Outlining eDiscovery IssuesSocial Media and Litigation are Outlining eDiscovery Issues
Social Media and Litigation are Outlining eDiscovery IssuesActiance, Inc.
 
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINALSM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINALJohn Kostak
 
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawPrivacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawCharles Mudd
 
Online Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachOnline Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachIJECEIAES
 
LAW 531 Effective Communication - snaptutorial.com
LAW 531 Effective Communication - snaptutorial.comLAW 531 Effective Communication - snaptutorial.com
LAW 531 Effective Communication - snaptutorial.comdonaldzs23
 
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCERIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCEVARUN KESAVAN
 
Why it's so hard for users to control their data
Why it's so hard for users to control their dataWhy it's so hard for users to control their data
Why it's so hard for users to control their dataGiuliadeNicolellis
 
The AI Now Report The Social and Economic Implications of Artificial Intelli...
The AI Now Report  The Social and Economic Implications of Artificial Intelli...The AI Now Report  The Social and Economic Implications of Artificial Intelli...
The AI Now Report The Social and Economic Implications of Artificial Intelli...Willy Marroquin (WillyDevNET)
 
Life skills
Life skillsLife skills
Life skillsDhanya G
 
Junyan Wu Healthcare information security control on insider threat proposal
Junyan Wu Healthcare information security control on insider threat proposalJunyan Wu Healthcare information security control on insider threat proposal
Junyan Wu Healthcare information security control on insider threat proposalJunyan Wu
 
Is employer monitoring of employee email justified
Is employer monitoring of employee email justifiedIs employer monitoring of employee email justified
Is employer monitoring of employee email justifiedParker Donat
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its useNoriha Nori
 
Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsEnergy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsAmy Shriner
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationArmstrong Teasdale
 
Reining in outsourcing risk
Reining in outsourcing riskReining in outsourcing risk
Reining in outsourcing riskTang Tan Dung
 
Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Matthew Lease
 
A lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesA lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesErrol A. Adams, J.D., M.L.S.
 

What's hot (20)

Case study presentation
Case study presentationCase study presentation
Case study presentation
 
Social Media and Litigation are Outlining eDiscovery Issues
Social Media and Litigation are Outlining eDiscovery IssuesSocial Media and Litigation are Outlining eDiscovery Issues
Social Media and Litigation are Outlining eDiscovery Issues
 
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINALSM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
SM Impact and Ethics in Workplace_Atansuyi, Kostak and Manhanga_073012_FINAL
 
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal LawPrivacy in the Workplace: Electronic Surveillance under State and Federal Law
Privacy in the Workplace: Electronic Surveillance under State and Federal Law
 
Online Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachOnline Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study Approach
 
LAW 531 Effective Communication - snaptutorial.com
LAW 531 Effective Communication - snaptutorial.comLAW 531 Effective Communication - snaptutorial.com
LAW 531 Effective Communication - snaptutorial.com
 
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCERIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
RIGHT PRACTICES IN DATA MANAGEMENT AND GOVERNANCE
 
Why it's so hard for users to control their data
Why it's so hard for users to control their dataWhy it's so hard for users to control their data
Why it's so hard for users to control their data
 
The AI Now Report The Social and Economic Implications of Artificial Intelli...
The AI Now Report  The Social and Economic Implications of Artificial Intelli...The AI Now Report  The Social and Economic Implications of Artificial Intelli...
The AI Now Report The Social and Economic Implications of Artificial Intelli...
 
Life skills
Life skillsLife skills
Life skills
 
Junyan Wu Healthcare information security control on insider threat proposal
Junyan Wu Healthcare information security control on insider threat proposalJunyan Wu Healthcare information security control on insider threat proposal
Junyan Wu Healthcare information security control on insider threat proposal
 
Is employer monitoring of employee email justified
Is employer monitoring of employee email justifiedIs employer monitoring of employee email justified
Is employer monitoring of employee email justified
 
Ethical issues related to is design and its use
Ethical  issues  related  to  is  design  and its useEthical  issues  related  to  is  design  and its use
Ethical issues related to is design and its use
 
Energy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities PittfallsEnergy Audit Retrofit Contract Legalities Pittfalls
Energy Audit Retrofit Contract Legalities Pittfalls
 
Digital Ethics
Digital EthicsDigital Ethics
Digital Ethics
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
USLFG Corporate & Securities Presentation
USLFG Corporate & Securities PresentationUSLFG Corporate & Securities Presentation
USLFG Corporate & Securities Presentation
 
Reining in outsourcing risk
Reining in outsourcing riskReining in outsourcing risk
Reining in outsourcing risk
 
Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences. Crowdsourcing & ethics: a few thoughts and refences.
Crowdsourcing & ethics: a few thoughts and refences.
 
A lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issuesA lawyer's guide to the top 13 social media issues
A lawyer's guide to the top 13 social media issues
 

Viewers also liked

Moč in odgovornost države in civilne družbe (uvod, delo v skupinah), Konferen...
Moč in odgovornost države in civilne družbe (uvod, delo v skupinah), Konferen...Moč in odgovornost države in civilne družbe (uvod, delo v skupinah), Konferen...
Moč in odgovornost države in civilne družbe (uvod, delo v skupinah), Konferen...AndragoskiCenterSlovenije
 
Manali Article Buffalo WW
Manali Article Buffalo WWManali Article Buffalo WW
Manali Article Buffalo WWManali Shah
 
ePlatforma za izobraževanje odraslih - EPALE, Ajda Turk, Konferenca Gradimo m...
ePlatforma za izobraževanje odraslih - EPALE, Ajda Turk, Konferenca Gradimo m...ePlatforma za izobraževanje odraslih - EPALE, Ajda Turk, Konferenca Gradimo m...
ePlatforma za izobraževanje odraslih - EPALE, Ajda Turk, Konferenca Gradimo m...AndragoskiCenterSlovenije
 
Ln daily automatic fish feeder
Ln daily automatic fish feederLn daily automatic fish feeder
Ln daily automatic fish feederNancySpahr
 
Il clown - Disegni da colorare - Sabbiarelli
Il clown - Disegni da colorare - SabbiarelliIl clown - Disegni da colorare - Sabbiarelli
Il clown - Disegni da colorare - SabbiarelliSabbiarelli
 
触发机制 罗伊摇篮等
触发机制  罗伊摇篮等触发机制  罗伊摇篮等
触发机制 罗伊摇篮等Jin Song
 
Emad Gaafar - Resume 27 Aug 2016
Emad Gaafar - Resume 27 Aug 2016Emad Gaafar - Resume 27 Aug 2016
Emad Gaafar - Resume 27 Aug 2016Emad Gaafar
 
Хвостаті
ХвостатіХвостаті
Хвостатіnikolzh822
 
Creacion de gráficas
Creacion de gráficasCreacion de gráficas
Creacion de gráficasfont Fawn
 
EPWTS Project Saudiarabia
EPWTS Project SaudiarabiaEPWTS Project Saudiarabia
EPWTS Project SaudiarabiaTaner HAZAR
 

Viewers also liked (12)

Moč in odgovornost države in civilne družbe (uvod, delo v skupinah), Konferen...
Moč in odgovornost države in civilne družbe (uvod, delo v skupinah), Konferen...Moč in odgovornost države in civilne družbe (uvod, delo v skupinah), Konferen...
Moč in odgovornost države in civilne družbe (uvod, delo v skupinah), Konferen...
 
Saucepolis news
Saucepolis newsSaucepolis news
Saucepolis news
 
Unidad 2 virus informáticos ii
Unidad 2 virus informáticos iiUnidad 2 virus informáticos ii
Unidad 2 virus informáticos ii
 
Manali Article Buffalo WW
Manali Article Buffalo WWManali Article Buffalo WW
Manali Article Buffalo WW
 
ePlatforma za izobraževanje odraslih - EPALE, Ajda Turk, Konferenca Gradimo m...
ePlatforma za izobraževanje odraslih - EPALE, Ajda Turk, Konferenca Gradimo m...ePlatforma za izobraževanje odraslih - EPALE, Ajda Turk, Konferenca Gradimo m...
ePlatforma za izobraževanje odraslih - EPALE, Ajda Turk, Konferenca Gradimo m...
 
Ln daily automatic fish feeder
Ln daily automatic fish feederLn daily automatic fish feeder
Ln daily automatic fish feeder
 
Il clown - Disegni da colorare - Sabbiarelli
Il clown - Disegni da colorare - SabbiarelliIl clown - Disegni da colorare - Sabbiarelli
Il clown - Disegni da colorare - Sabbiarelli
 
触发机制 罗伊摇篮等
触发机制  罗伊摇篮等触发机制  罗伊摇篮等
触发机制 罗伊摇篮等
 
Emad Gaafar - Resume 27 Aug 2016
Emad Gaafar - Resume 27 Aug 2016Emad Gaafar - Resume 27 Aug 2016
Emad Gaafar - Resume 27 Aug 2016
 
Хвостаті
ХвостатіХвостаті
Хвостаті
 
Creacion de gráficas
Creacion de gráficasCreacion de gráficas
Creacion de gráficas
 
EPWTS Project Saudiarabia
EPWTS Project SaudiarabiaEPWTS Project Saudiarabia
EPWTS Project Saudiarabia
 

Similar to Ethics Research Paper-Employee Surveillance

‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...eraser Juan José Calderón
 
Privacy tool osha comments
Privacy tool osha commentsPrivacy tool osha comments
Privacy tool osha commentsMicah Altman
 
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docx
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docxRunning head EMPLOYEE WORKPLACE PRIVACY 1 .docx
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docxjeanettehully
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksHarshitha Reddy
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadashibrah76
 
255229705-Electronic-Monitoring-Privacy-and-Trust
255229705-Electronic-Monitoring-Privacy-and-Trust255229705-Electronic-Monitoring-Privacy-and-Trust
255229705-Electronic-Monitoring-Privacy-and-TrustOr Schiro
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Fullgloriakt
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Designgloriakt
 
Answer the Below Question. APA format. 300 words.Textbook .docx
Answer the Below Question. APA format. 300 words.Textbook  .docxAnswer the Below Question. APA format. 300 words.Textbook  .docx
Answer the Below Question. APA format. 300 words.Textbook .docxnolanalgernon
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docxLoudymerTimagos1
 
Profiling employees online shifting public–privateboundar.docx
Profiling employees online shifting public–privateboundar.docxProfiling employees online shifting public–privateboundar.docx
Profiling employees online shifting public–privateboundar.docxbriancrawford30935
 
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docxPaper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docxsmile790243
 
Toward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisToward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisSherif Zahran
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?IJCNCJournal
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Editor IJCATR
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and BeyondAlexNemiroff
 
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEHUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEeraser Juan José Calderón
 
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxWeek 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxphilipnelson29183
 

Similar to Ethics Research Paper-Employee Surveillance (20)

‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...‘Personal data literacies’: A critical literacies approach to enhancing under...
‘Personal data literacies’: A critical literacies approach to enhancing under...
 
Privacy tool osha comments
Privacy tool osha commentsPrivacy tool osha comments
Privacy tool osha comments
 
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docx
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docxRunning head EMPLOYEE WORKPLACE PRIVACY 1 .docx
Running head EMPLOYEE WORKPLACE PRIVACY 1 .docx
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
Actiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canadaActiance whitepaper-social-media-legal-issues-canada
Actiance whitepaper-social-media-legal-issues-canada
 
255229705-Electronic-Monitoring-Privacy-and-Trust
255229705-Electronic-Monitoring-Privacy-and-Trust255229705-Electronic-Monitoring-Privacy-and-Trust
255229705-Electronic-Monitoring-Privacy-and-Trust
 
A Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - FullA Case for Expectation Informed Design - Full
A Case for Expectation Informed Design - Full
 
A Case for Expectation Informed Design
A Case for Expectation Informed DesignA Case for Expectation Informed Design
A Case for Expectation Informed Design
 
Answer the Below Question. APA format. 300 words.Textbook .docx
Answer the Below Question. APA format. 300 words.Textbook  .docxAnswer the Below Question. APA format. 300 words.Textbook  .docx
Answer the Below Question. APA format. 300 words.Textbook .docx
 
Internet Research Ethics.docx
Internet Research Ethics.docxInternet Research Ethics.docx
Internet Research Ethics.docx
 
Profiling employees online shifting public–privateboundar.docx
Profiling employees online shifting public–privateboundar.docxProfiling employees online shifting public–privateboundar.docx
Profiling employees online shifting public–privateboundar.docx
 
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docxPaper #1Reasonable Expectation of PrivacyIn this discussion,.docx
Paper #1Reasonable Expectation of PrivacyIn this discussion,.docx
 
Review questions
Review questionsReview questions
Review questions
 
Toward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive AnalysisToward Automated Reduction of Human Errors based on Cognitive Analysis
Toward Automated Reduction of Human Errors based on Cognitive Analysis
 
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
DOES DIGITAL NATIVE STATUS IMPACT END-USER ANTIVIRUS USAGE?
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
 
Social Media in the Workplace and Beyond
Social Media in the Workplace and BeyondSocial Media in the Workplace and Beyond
Social Media in the Workplace and Beyond
 
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCEHUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
HUMAN RIGHTS IN THE AGE OF ARTIFICIAL INTELLIGENCE
 
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docxWeek 8 Quantitative Research DesignPrevious Next Instructio.docx
Week 8 Quantitative Research DesignPrevious Next Instructio.docx
 

Ethics Research Paper-Employee Surveillance

  • 1. Running head: ETHICS RESEARCH PAPER 1 Employee Surveillance – how elastic can rights be? Irena Tsikaris Baker College
  • 2. ETHICS RESEARCH PAPER 2 Employee Surveillance – how elastic can rights be? Introduction According to an Academic article, retrieved from the ProQuest database, the statistics about how employees manage their time while working “on the clock” is not very much in their favor. “A recent survey of over 4,600 human resource managers and over 4,000 employees indicates that approximately 65% of employees spend at least some work time on non-work related Internet activity” (Sanders, Ross, & Patison, 2014, p. 1). The article further gives more information about the kind of activity they perform: “Of those employees using social networks sites, some 56% check their profiles during their typical workdays and 15% of this group spends at least one hour a day browsing (Sanders et al., 2014, p. 1). With respect to the previous facts, this paper further researches the issue, engaging relevant sources to elaborate on both opposed approaches; on the side of the employers – they have all the rights to preserve company’s profits and to protect it from any attempts to discredit and on the side of the employees – it’s a violation of their privacy and the fact that they are on the pay roll does not give the company rights to put them under surveillance. How elastic can really employees’ rights be and would they allow for the employers to “squeeze in” regulation for random acts of surveillance? Business interests vs worker privacy With respect to the problem introduced above, most of the employers take two basic steps: they monitor the email accounts of their employees and they block certain web- sites from accessing. According to the following information published online: “Looking just at e-mail, a 1996 survey by the Society for Human Resource Management found that 36 percent of responding companies searched employee messages regularly and 70 percent said employers should reserve the right to do so” (Schulman, 2014 , para. 5). There is statistics available for the
  • 3. ETHICS RESEARCH PAPER 3 other step as well: “In 2007 employers seemed to be highly concerned with inappropriate web surfing and cyberloafing; 65% of the companies monitoring employees used software to block inappropriate websites, up 27% from 2001. Inappropriate sites that are blocked by companies include those sites with adult content (96%), games (61%), social networking (50%), entertainment (40%), shopping (27%) and sports (21%)” (Sanders et al., 2014, p. 2). In addition to this a company might decide to opt for a more radical option, called “behavioral monitoring” thus monitoring all kinds of activity connected to the workplace. This will not necessarily be implemented only for the lower level of employees, but also for the technical and managing staff. In the era when there is video surveillance everywhere, it is not that hard to implement it; and again there are two approaches to this, it can be done openly or secretively. It is debatable exactly what portion of his/her privacy, if any, an individual should give up upon entering a certain workplace. Some would argue that the right to privacy is a part of the “respectful” treatment they are entitled to, given the fact that one of every company’s greatest assets is – the human capital. Monitoring software, privacy & law The use of the Internet for private research or engaging in social media poses a huge problem to most businesses. One concept would be that the company is allowed to acquire some monitoring programs: “the number of ways these programs can monitor an employee is astonishing and now that the monitoring software product market is maturing, it is possible for any company to cheaply and easily use software to monitor their employees” (Bassick, McNamara & Sullivan, n.d., Monitoring Employee Internet Use: The Rights Approach Section). The concept of privacy is also strictly related to the topic and the notion is that Internet means – “end of privacy”. As stated in the following citation: “There are two differences
  • 4. ETHICS RESEARCH PAPER 4 between the Internet and the “real world.” First, unlike its physical counterpart, the Internet records everything. Second, it allows for far easier, remote, access to what is going on and the record thereof — either by the person-of-interest’s design, with her permission, or (unfortunately frequently) otherwise (Morrison & Bailey, 2011, p. 91). Another concept is the legal one, and this is where “employees have little recourse; the most relevant federal law, the 1986 Electronic Communications Privacy Act, prohibits unauthorized interception of various electronic communications, including e-mail” (Schulman, 2014 , para. 6). The legal concept is very well covered in the following citation: Because of constitutional considerations public employers have a greater burden to protect employee privacy. The Fourth Amendment’s protection against unreasonable search and seizure may include employee privacy of messages sent electronically on the employer’s equipment. The Fourth Amendment, as applied to the states and municipalities through the Fourteenth Amendment, protects the “right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures . . . .” Employees have Fourth Amendment rights only when they have “an expectation of privacy that society is prepared to consider reasonable. (Sanders et al., 2014, p. 3) Solutions One of the possible solutions that would take both standpoints into consideration is an approach in which there will be some kind of surveillance in place, but the extent to which it will cover the workplace activities will be “loosely” defined, allowing for consideration for the needs of the employees. This kind of approach has already been implemented in Saratoga Systems in California, where “Employees know they are being monitored, but they also know the company
  • 5. ETHICS RESEARCH PAPER 5 respects their occasional need to take care of personal business from the workplace” (Bassick, McNamara & Sullivan, n.d., Monitoring Employee Internet Use: The Rights Approach Section). Another proposed solution would be, the company can implement any kind of monitoring, as long as the employees are well-informed about this; thus being able to exercise their “right to be told the truth”. This also means that every employee will be given some kind of list of the websites that are allowed to visit during working on company time and those that are not, unless self-explanatory. Many employers have found ways to protect themselves from possible lawsuits for invasion of privacy by making signing a policy that entitles them this rights part of the employment package. There are lately many cases in the “case law” in favor of the employers, provided there is a signed policy in place. Such is the case ruled out by the Supreme Court in favor of the employer Ontario, California police department. The employer had a policy, “Computer Usage, Internet and E-Mail Policy” and the plaintiff, their lieutenant had signed it. Sources Bassick, M.., McNamara, T., & Sullivan, D. (n.d.). Employee Surveillance: An Ethical Consideration. Retrieved from http://www.ethicapublishing.com/ethical/3CH6.pdf This is a research paper published on the website of Ethica Publishing, which is owned by Leeds School of Business at the University of Colorado, Boulder. The research is based on a number of scholarly articles and publicatons, including journals and other sources from established authorities in the field of Ethics. Ghoshray, S. (2013). EMPLOYER SURVEILLANCE VERSUS EMPLOYEE PRIVACY: THE NEW REALITY OF SOCIAL MEDIA AND WORKPLACE PRIVACY. Northern Kentucky Law Review, 40(3), 593-626.
  • 6. ETHICS RESEARCH PAPER 6 This is an article by Ghoshray Saby, published in 2013, in the Northern Kentucky Law Review Academic Journal, focusing on the surveillance as opposed to employee’s privacy, which is exactly what this paper will be dealing with. It examines the “privacy” zone of the employees and discusses the applicability of the First Amendment. Morrison, C. D., & Bailey, R. L. (2011). Employee Privacy Rights: Employer Monitoring and Investigating Employees' Electronic Activities and Communications. Energy & Mineral Law Institute, (32), 66-173. The article by David C. Morrison and Robert L. Bailey was published in 2011 in Energy & Mineral Law Institute Academic Journal and focuses on the electronic activities and communications in the place of employment. It brings about the restrictions imposed on the employers by regulation in the field of intellectual property. Sanders, D. E., Ross, J. K., & Pattison, P. (2013). ELECTRONIC SNOOPS, SPIES, AND SUPERVISORY SURVEILLANCE IN THE WORKPLACE. Southern Law Journal, 23(1), 1-27. Another article published in Southern Law Journal, in 2013; its authors are Donald E. Sanders, John K. Ross and Patricia Pattison. The article examines federal and state legislation regulating electronic monitoring of employees in the U.S with respect to U.S. Constitution Fourth Amendment rights. It also offers guidance for the employers for successful implementation of a surveillance system. Schulman, M. (2014). LittleBrother is watching you. Retrieved from http://www.scu.edu/ethics/publications/iie/v9n2/brother.html Meriam Schulman is an associate director of the Ethics Center at Santa Clara University. She manages the communication, operations, and administrative activities of the Center and serves
  • 7. ETHICS RESEARCH PAPER 7 on the Center's Management Committee. She also facilitates the Emerging Issues Group, which brings Ethics Center staff and scholars together to discuss the ethical issues behind the news. Discussing the arguments Employers’ arguments in favor of the surveillance go anywhere from - they have to make sure they get maximum productivity and high level of quality of their services, provided through an undivided attention of their employees, to - an employee will use the social media to discredit the company or a coworker and all that on company’s expense. It is a valid argument; moreover, “such violations of compliance related to social media communication may not be easily apparent to a supervisor, as it may only be identified either through tracking or through third- party reporting” (Ghoshray, 2013, p. 602). Another very important argument on the side of the employers is, they have to protect their stakeholders or the interest of protecting a third party. Under stakeholders we would consider the customers, shareholders, suppliers, creditors, neighbors to the workplace and others. Corporations are generally liable for their employee’s behavior which kind of gives them the rights to monitor the workplace behavior. Any kind of indiscretion on the part of the employees might directly affect some, if not all of the entities stated above. These arguments are valid in favor of some surveillance being necessary to regulate business activities. Employees’ argument about invasion of privacy in the workplace is equally valid; “Monitoring employee’s Internet use invades both physical and personal privacy. Regardless of location or ownership of equipment, employees still possess these rights and by being placed under such extreme scrutiny, they are being treated in an unethical manner” (Bassick, McNamara & Sullivan, n.d., Monitoring Employee Internet Use: The Rights Approach Section). Some employees argue that the whole idea is counter- productive because they spend time and energy
  • 8. ETHICS RESEARCH PAPER 8 on finding a way to get around the surveillance procedures and take care of their personal business, which is more time-consuming than if the resources were readily available to them. It would be far more productive for the company to implement some kind of coaching approach and train the employees on how to make ethical decision in the light on unrestricted personal freedom on the workplace, instead of making them respond to rules and regulations. Some kind of appreciation or reward system for their performance and an increased productivity might also be more effective than simply applying restrictions. Ethical theories applied An application of Utilitarianism in search for the best solution would mean that we should sacrifice the benefit of few for the benefit of many. In this case, the “invasion” of privacy imposed on the employees will mean that they will be more productive in the workplace and they will use more effectively their working hours. This is an input in the company’s overall success that will benefit the whole society, as better products/services will be brought out to the market. The enhancement of the company’s financial record will bring additional benefit not only to the owners, but ultimately to the employees themselves. This will give a Paternalistic “touch” to the applied Utilitarian theory, as the workers will be protected from themselves and their apparently wrongful actions. Kantian theory consists of two important points, as stated in our textbook. The first one would be the “Golden rule”: “Kant says that we should follow those maxims (or ethical rules) and only those maxims that we would want all persons to follow. This sounds a bit like the “Golden Rule,” but it is intended as a test for universalizing, that is, for applying universally” (Van Camp, 2013, p. 25). The second point “says that we should always treat all other persons with dignity and respect in themselves and not as a mere thing to use for our own advantage”
  • 9. ETHICS RESEARCH PAPER 9 (Van Camp, 2013, p. 25). If we make a discussion about his first point, the employers probably should ask themselves how would they like the surveillance applied on themselves and someone monitoring closely their activities in the workplace, and the second principle applied, will bring about questions such as: “Are employees just a means for a company’s success or deserve to be treated as ends themselves? This makes no surveillance justified under this approach, unless some kind of individual rationale is in question or the employer really has a reason to suspect that some of the employees is behaving unethically in the workplace, to the point that it really interferes with the overall performance of the company. Virtue ethics theory can also be applied, since privacy seems of little significance in the eye of employers: A company implementing this framework would rely on employees to conduct themselves in an ethical manner. Based on character development, virtue ethics gives employees the freedom to make their own decisions with the faith that their choices will represent those made by a “good” person. Giving employees the ability to make their own decisions may seem risky from management’s point of view, but evidence suggests that this increased responsibility has increased morale and improved employer-employee relationships. In fact, employees subject to surveillance have exhibited feelings of decreased employer trust, increased stress, and subsequently decreased productivity. (Bassick, McNamara & Sullivan, n.d., Monitoring Employee Internet Use: Philosophical Models Section) Elements of virtue ethics can be recognized in the modern trends some very famous employers implement in their working environment, such as freedom for the employees to organize their own time and activities, meaning they can even engage in a “leisure”, company
  • 10. ETHICS RESEARCH PAPER 10 sponsored activities, while on the clock. This is with an intention of “unleashing” creativity, so that not only the employee, but ultimately the company will benefit from that. Some of the employers along this line are proven successful companies: Google, Facebook, SAA and others. So, we not only speak of absence of classical surveillance, but total discretion for the employee and their workplace activities. This would be in accordance with the Kantian reasoning, but is not in conflict with the Utilitarian one as well, as we all know that many people, on many levels, obviously benefit from successful companies like the ones stated above. Recommended policy A solution which would be a compromise is: a surveillance in place, but well thought out, so that the workers can give up the exact portion of their privacy to account for the benefits of being an employee of that certain company. Another aspect is fairness and honesty on the side of the company, which will inspire same kind of response on the part of the workers. Any over- excessive or too personal surveillance will directly violate workers’ rights as per the Kantian theory and it is subject to debate whether it can still be justified under the Utilitarian approach. The most popular and efficient approach would be the one under “virtue ethics” and more and more companies decide to follow that line. It is an unconventional approach and is strongly related to motivation (motivation is introduced as a prerequisite to releasing creativity). Motivation itself is induced through self-determination and autonomy and this is one of the basic rules in psychology. Given the fact that motivation further leads to creativity, makes it clear why lack of motivation is one of the biggest problems, especially for companies producing “sophisticated” and intangible goods. Surveillance and monitoring could never mitigate this nor can a financial satisfaction always work. This moreover makes the approach under “virtue ethics” justified not only in terms of privacy rights and good ethical standards, but all these and
  • 11. ETHICS RESEARCH PAPER 11 then - an increased productivity. Of course this might not make sense in all kinds of environments and job positions, but is certainly worth considering; we tend to behave much better when we apply our own moral judgements then when we are simply asked for or even forced to follow the rules.
  • 12. ETHICS RESEARCH PAPER 12 References Bassick, M.., McNamara, T., & Sullivan, D. (n.d.). Employee Surveillance: An Ethical Consideration. Retrieved from http://www.ethicapublishing.com/ethical/3CH6.pdf Ghoshray, S. (2013). EMPLOYER SURVEILLANCE VERSUS EMPLOYEE PRIVACY: THE NEW REALITY OF SOCIAL MEDIA AND WORKPLACE PRIVACY. Northern Kentucky Law Review, 40(3), 593-626. Morrison, C. D., & Bailey, R. L. (2011). Employee Privacy Rights: Employer Monitoring and Investigating Employees' Electronic Activities and Communications. Energy & Mineral Law Institute, (32), 66-173. Sanders, D. E., Ross, J. K., & Pattison, P. (2013). ELECTRONIC SNOOPS, SPIES, AND SUPERVISORY SURVEILLANCE IN THE WORKPLACE. Southern Law Journal, 23(1), 1-27. Schulman, M. (2014). LittleBrother is watching you. Retrieved from http://www.scu.edu/ethics/publications/iie/v9n2/brother.html Van Camp, J.C. (2013). Ethics (1st ed). Boston, MA: Cengage Learning.