Chapter 8Ethics & TechnologyMcGraw-Hill
8-2“Big Brother is Watching You”George Orwell, ‘1984’, Part 1, Chapter 1
Ethics & TechnologyAdvantages of technology in the workplace:Intranet – company’s internal website containing information for employee access onlyExtranet – private piece of a company’s internet network available to customers and/or vendor partners on the basis of secured passwordTelecommuting – ability to work outside of the office and log in to your company network8-3
Ethics & TechnologyLoss of privacyCompanies have ability to send customers’ personal data anywhere in the worldEmployee monitoring – every email sent and every website visited8-4
The Promise of Increased Worker ProductivityThe Employer Position:As an employee of the organization, your allotted shift or normal work period are at the discretion of the company. Other than lunch and any scheduled breaks, all your activity should be work-related, and any monitoring of that activity should not be regarded as an infringement of your privacy. If you want to do something in private don’t do it at work.It is part of the organization’s obligation to its stakeholders to operate as efficiently as possible.8-5
The Promise of Increased Worker ProductivityThe Employee Position:My agreement should not intrude upon my civil rights as an individual – I am an employee, not a servant. I should be notified of any electronic surveillance and the purpose of that surveillance. The actions of a small number of employees in breaking company rules should not be used as a justification to take away everyone’s civil rights. Electronic monitoring implies that we can’t be trusted to do our jobs – and if you can’t trust us, why are you employing us in the first place?8-6
When Are You “at Work”?Computer technology allows the capability of telecommuting – working from anywhere by logging into your company’s network remotelyComputer and Smartphone (iPhone/Blackberry)Availability now being defined as accessibilitySo, does this flexibility apply to employees “at work”?8-7
Employee ConsentTHIN CONSENT    If an employee receives formal notification that the company will be monitoring all email and web activity – either at the time of hire or during employment – and it is made clear in that notification that his or her continued employment with the company will be dependent on the employee’s agreement to abide by that monitoring, then the employee may be said to have given ‘thin’ consent. In other words, there are two options – agree to the monitoring or ‘pursue other employment opportunities’. 8-8
Employee ConsentTHICK CONSENTIf employment conditions are at the other end of the scale – i.e. jobs are plentiful and the employee would have no difficulty in finding another position – then the consent given to the monitoring policy could be classified as ‘thick’ since the employee has a realistic alternative if he or she finds the policy to be unacceptable.8-9
The Dangers of Leaving a Paper TrailEmployers may be able to monitor every keystroke on computers, but the documents written on the machines do the most harm“Offensive” email postingsViewing inappropriate Web sitesInternet communication:Damage from electronic trail of emails8-10
Vicarious Liability“…a legal concept that means that a party may be held responsible for injury or damage, when in reality they were not actively involved in the incident. Parties that may be charged with vicarious liability are generally in a supervisory role over the person or parties personally responsible for the injury/damage. The implications of vicarious liability are that the party charged is responsible for the actions of their subordinates.”8-11
“A legal concept that employers can be held liable for the actions of their employees in their Internet communications to the same degree as if those employers had written those communications on company letterhead.Cyberliability
Ten Commandments of Computer Ethics8-13
Big Brother is in the House!    "It was terribly dangerous to let your thoughts wander when you were in any public place or within range of a telescreen. The smallest thing could give you away. A nervous tic, an unconscious look of anxiety, a habit of muttering to yourself—anything that carried with it the suggestion of abnormality, of having something to hide. In any case, to wear an improper expression on your face… was itself a punishable offense. There was even a word for it in Newspeak: facecrime…" 		George Orwell, Nineteen Eighty-Four, Book 	One,Chapter 58-14

Chapter 8 review

  • 1.
    Chapter 8Ethics &TechnologyMcGraw-Hill
  • 2.
    8-2“Big Brother isWatching You”George Orwell, ‘1984’, Part 1, Chapter 1
  • 3.
    Ethics & TechnologyAdvantagesof technology in the workplace:Intranet – company’s internal website containing information for employee access onlyExtranet – private piece of a company’s internet network available to customers and/or vendor partners on the basis of secured passwordTelecommuting – ability to work outside of the office and log in to your company network8-3
  • 4.
    Ethics & TechnologyLossof privacyCompanies have ability to send customers’ personal data anywhere in the worldEmployee monitoring – every email sent and every website visited8-4
  • 5.
    The Promise ofIncreased Worker ProductivityThe Employer Position:As an employee of the organization, your allotted shift or normal work period are at the discretion of the company. Other than lunch and any scheduled breaks, all your activity should be work-related, and any monitoring of that activity should not be regarded as an infringement of your privacy. If you want to do something in private don’t do it at work.It is part of the organization’s obligation to its stakeholders to operate as efficiently as possible.8-5
  • 6.
    The Promise ofIncreased Worker ProductivityThe Employee Position:My agreement should not intrude upon my civil rights as an individual – I am an employee, not a servant. I should be notified of any electronic surveillance and the purpose of that surveillance. The actions of a small number of employees in breaking company rules should not be used as a justification to take away everyone’s civil rights. Electronic monitoring implies that we can’t be trusted to do our jobs – and if you can’t trust us, why are you employing us in the first place?8-6
  • 7.
    When Are You“at Work”?Computer technology allows the capability of telecommuting – working from anywhere by logging into your company’s network remotelyComputer and Smartphone (iPhone/Blackberry)Availability now being defined as accessibilitySo, does this flexibility apply to employees “at work”?8-7
  • 8.
    Employee ConsentTHIN CONSENT If an employee receives formal notification that the company will be monitoring all email and web activity – either at the time of hire or during employment – and it is made clear in that notification that his or her continued employment with the company will be dependent on the employee’s agreement to abide by that monitoring, then the employee may be said to have given ‘thin’ consent. In other words, there are two options – agree to the monitoring or ‘pursue other employment opportunities’. 8-8
  • 9.
    Employee ConsentTHICK CONSENTIfemployment conditions are at the other end of the scale – i.e. jobs are plentiful and the employee would have no difficulty in finding another position – then the consent given to the monitoring policy could be classified as ‘thick’ since the employee has a realistic alternative if he or she finds the policy to be unacceptable.8-9
  • 10.
    The Dangers ofLeaving a Paper TrailEmployers may be able to monitor every keystroke on computers, but the documents written on the machines do the most harm“Offensive” email postingsViewing inappropriate Web sitesInternet communication:Damage from electronic trail of emails8-10
  • 11.
    Vicarious Liability“…a legalconcept that means that a party may be held responsible for injury or damage, when in reality they were not actively involved in the incident. Parties that may be charged with vicarious liability are generally in a supervisory role over the person or parties personally responsible for the injury/damage. The implications of vicarious liability are that the party charged is responsible for the actions of their subordinates.”8-11
  • 12.
    “A legal conceptthat employers can be held liable for the actions of their employees in their Internet communications to the same degree as if those employers had written those communications on company letterhead.Cyberliability
  • 13.
    Ten Commandments ofComputer Ethics8-13
  • 14.
    Big Brother isin the House! "It was terribly dangerous to let your thoughts wander when you were in any public place or within range of a telescreen. The smallest thing could give you away. A nervous tic, an unconscious look of anxiety, a habit of muttering to yourself—anything that carried with it the suggestion of abnormality, of having something to hide. In any case, to wear an improper expression on your face… was itself a punishable offense. There was even a word for it in Newspeak: facecrime…"  George Orwell, Nineteen Eighty-Four, Book One,Chapter 58-14