Tuesday, May 21, 2019

Ethics, Privacy in the Workplace Essay

IntroductionThe aim of this essay is to provide a auxiliary argument for the notion that an individuals secrecy is more important than every other considerations in the clearplace. unravelplace scenarios w minacious be outlined including prank applications, storage of personal nurture, Internet and email, training technology effects on concealing, workplace policies and procedures and medical privacy. Differing ethical theories will be applied to both sides of the argument.The individuals Privacy in the workplaceGetting the job.The story is often heard in Australia how wanton it was for raft to gain betrothal in the economically booming 1960s and early 1970s of how people would walk into a workplace in the morning and get a job straight away(p) or within a couple of days jobseeking. Resumes, application letters and application forms were unheard of unless you were applying for a professional level position. As competition for jobs increased in the mid 1970s and early 1 980s more and more selection tools were required when hiring new cater. Resumes detailing training, past employment and referees assisted in the selection or rejection of new staff. Appli give the bouncets are not required to list nurture in their Resume such as marital status, gender, political leanings, religion, date of birth and number of children as part of equal employment opportunity command. In government found agencies in particular, merit based recruitment is stressed.Whilst in small privately owned backupes, employers still prefer to recruit new staff who are known to them or who are recommended friends of existing staff members. With current federal legislative requirements regarding raw dismissal rules, employers must use care when employing new staff. A job seeker expects their private selective instruction to be handled with trust and discretion. The employer expects instruction to be relevant so they raise make an accurate judging of the job seeker. When i t comes to ethics, both parties are acting in their own crush interests. The seeker wants a job which is rewarding and lucrative in re routine for their effort.The employer wants the most skilled person for the least financial cost possible so that business goals and healthy profits can be achieved. By applying the ethical as yettful theory of Egoism regarding privacy, both parties are acting out of self-interest which best serves their own ache term goals. According to psychological egoism, humans are by temper selfish. The jobseeker will divulge hardly enough personal information which will enable them to get and advance the job. The employer seeks to find out as much information as possible most the jobseeker so that their business is not damaged in the long run by selecting an in separate candidate. Shaw (2009) Page 59Stored InformationTraditionally an employees prefatorial personal information such as their resume, emergency contact details, and bank details would us ually be kept on hard file in a locked personnel filing cabinet. Personal information shared amongst work colleagues was up to the discretion of the employee and staff encouraged to leave personal problems or beliefs at domicile. With the advent of information technology systems becoming more commonplace, communications though shared databases, email, intranet, internet and even kind media pretend largely replaced paper files in storing go with and personal information. Besides conducting simple champion to one personal communication in the workplace, our personal and private information is shared in internet with and without our express permission and may be accessed off site by internal staff or external IT support contractors with administrative access. Websites visited and programs/files accessed on work ready reckoners in work time can be logged and monitored.This database of information compulsions to be protected from improper use and access by unauthorised people. The employee expects that the privacy of their information is protected. Monitoring IT system at work by the employer may be seen as an live up to in the interests of the business but it can also be seen as an erosion of trust in the employer/worker contract relationship. The honest conk out Australia Ombudsman recommends that employers implement best practice when maintaining privacy in the workplace. Employers, employees and their representatives need to know what information may be collected and retained and if it can be passed on to others.This best practice creates certainty and security for both employers and employees. sensible Work Australia(2010) Page 1 If the non-consequentialist ethical theory of Kantism is applied to this scenario, employers are expected to do the right thing as an act out of handicraft and by these moralistic principles the employee information is protected. Under Kantism if an employer was to mishandle this private information by for example sell it to troika parties, this treat would be morally defame. Employers may justify their follow outs in logging internet and computer activity as a means to reduce goldbricking or cyber-slacking which is defined as employees using company internet accounts for personal / inappropriate use whilst giving the outward appearance of macrocosmness busy with their work. Employees may see this as an invasion of privacy if they have not been informed or consented in their employment contract of this monitoring issue forthring.With Kants theory an employees pull throughs of cyber-slacking would be considered morally wrong as they are not doing the right thing by their employer. By the same token the action of monitoring a workers use of the internet or email without their consent would also be considered unlawful under Kants theory of ethics. Shaw (2009) Page 452 Fair Work Australia also says that Password and login codes may pull employees the impression that their email and web brows ing activities during work hours are private and not aware that their activities can be scrutinised by their employer. Fair Work Australia (2010) Page 3 Employers should provide clear workplace policies and procedures to get a line all parties understand the rights and responsibilities that apply to email and internet usage.Prescriptive guidance would detail the amount of appropriate personal email and internet usage within and outside the workplace that is allowable prohibited activities and repercussions legislation how usage is logged and audited and who has access to this information. Similar rules would apply to workplace landline and mobile phone usage. Fair Work Australia (2010) Page 4-5 By applying the consequentialist ethical theory of Utilitarianism to IT usage monitoring, the morally right action provides for the greatest felicity for all those affected, e.g., workload is shared evenly amongst staff secret, divisive conversations are less likely to occur online and it i s also a potential way to avoid potential conflicts in the workplace. Employers would use Utilitarianism to justify their actions in monitoring staff IT practices. An employee applying Egoism in this instance could argue that logging staffs IT usage is an invasion of privacy and not in their interest, therefore morally wrong. Shaw (2009) Page 92Privacy beyond the workplaceMost people believe that what they do and the opinions they have in the privacy of their own home is private, however social media sites such as Facebook and Twitter can sometimes be viewed by third parties depending on privacy settings. It is believed that employers have viewed the social media sites of potential new workers to assess their suitability to the job. In an denomination in the Daily Mail newspaper (UK) the story claims that one in five bosses have spurned job applicants after viewing their social media sites.According to a survey by public relations company Eurocom Worldwide, The 21st-century human is learning that every action leaves an indelible digital trail, said Mads Christensen, Network handler at Eurocom Reynolds (2012) In Australia, Telstra conducted a business survey which resulted in similar figures of more than 12.5% of bosses checking job applicants Facebook pages and number away potential employees based on things they have seen on Facebook. Top social media behaviours cited by bosses as leading to a candidate being ruled out are carte negative comments about their workplace with 44% saying this could rule out an applicant Posts/comments which are discriminatory (37%)Inappropriate pictures stick on on their profile (32%) Posts/comments which contain confidential information (32%) and 10% of employers use Facebook and other social networking sites to keep an eye on employees productivity. Symons (2011) Page 1 Employers say the biggest mistakes their current employees make on social networking sites are 1. Posting negative comments about their workplace, with 2 6% saying this is the biggest mistake. 2. Posting confidential information (16%)3. They persuade or are tagged in inappropriate pictures on their profile (14%) 4. Posting discriminatory comments (11%)5. Posting comments/photos/links during work hours (10%) Symons (2011) Page 2Part of the key argument regarding personal privacy isDo employers have the right to make judgements about potential or current employees based on information in social media sites? Surely this is not an accurate indication of their work skills and loyalty to a business as these social media sites are (usually) created when staff are not at work. It is tantamount to spying on a person in their private hours where their opinions are not necessarily those of their employer. The bosses may also have dubious moral and ethical behaviours outside of work hours, however the employers position of authority and agent gives an unfair advantage over the worker. David W. Ewing devised an employees bill of rights where N o employee shall be penalized for engaging in outside activities of his or her choice after working hoursnor for expressing views contrary to top management.Shaw (2009) Page 488 The employer would argue that viewing the content on an employees social media site is indicative of that individuals moral standards which may in turn be detrimental to the companys reputation, e.g. a primary school teacher with sexually agitative images of themselves may be deemed inappropriate behaviour and detrimental to the reputation and public perception of the school. Employers could justify their actions of facial expression into the private lives of their employees with Egoism and Kantism. It is in the employers interest to monitor the integrity of their staff on and off the job. And inappropriate behaviour even if it is outside the workplace is detrimental to the reputation of the organisation they work for. The employee could take the moral stance using Virtue morals of which they consider the mselves to be a moral and virtuous person by their routine behaviour whilst working and that they shouldnt be judge by the actions they take outside of work. Shaw (2009) Page 88Employee Medical PrivacyMost recently there has been a report that Employers have been going along with employees to medical appointments and in some cases asking for medical certificates to be altered so that their employees can return to work earlier. The ACTU (Australian Council of Trade Unions) assistant secretary Michael Borowick has revealed that the privacy of ill workers has been eroded, Employers, insurers and employer representatives are increasingly attending actual medical appointments with injured workers and, in some cases, forcing workers to attend company reinstates. Weve also had reports of doctors being pressured to change medical certificates and return-to-work plans.In May 2012, construction materials supplier Boral was warned by Fair Work Australia against allowing supervisors to accompa ny injured staff into doctors consulting rooms, with the workplace umpire saying it had the potential to operate unfairly. The Fair Work Ombudsman said that the Fair Work operation does not contain express provisions regarding whether an employer can accompany an employee to a medical appointment or have a private conversation with a doctor regarding the employees medical condition. Wilkins (2012) It is incredible to imagine that such an intrusion of intimate personal privacy is occurring in the workplace let alone that there is scant legislation to prevent it.An employer could argue that it is in the interest of the company to ensure that employees are acting honestly in relation to the true nature of their illness as sick days cost the company money in delays and decreased productivity. grocery store competitiveness is affected and workers compensation costs may also increase. By applying Utilitarianism theory, an employer may justify this action as it promotes the general welfa re of the company and is result orientated.Whereas the employee may argue that utilitarianism is focused on the results of the action not whether the action is morally right or wrong for the privacy of the individual worker. In shutting on balance the argument of the notion that an individuals privacy is more important than any other consideration in the workplace is affirmed. We now live in a society where we intend we are in control of our personal and private details when in reality our opinions, movements, interests and affiliations are being monitored constantly without our knowledge. An individuals right to privacy is dependent largely on the amount of information they share face to face, in writing or on the internet. It seems unfair that personal privacy should be sacrificed for corporate gain.BibliographyBooksShaw, W., Barry, V., & Sansbury, G. (2009) Moral Issues in Business (1st Asia-Pacific ed.), Cengage Learning. Melbourne, AustraliaJournalsAndrejevic, M. Commercial surveillance in the digital era, Living Ethics issue 87 (autumn 2012) Heersmink, R., van den Hoven, J., Jan van Eck, N.,van den Berg, J. Bibliometric mapping of computer and information ethics (2011) Springerlink.com LegislationPrivacy Act (1988) Commonwealth of AustraliaPrivacy and Personal Information Protection Act (1998) NSWWeb ArticlesA quarter of bosses head to Facebook to vet CVs http//www.news.com.au/technology/a-quarter-of-bosses-head-to-facebook-to-vet-cvs/story-e6frfro0-1226208260693 THE VECCI BLOG, Bosses heading online to inter job candidates, The Victorian Employers Chamber of Commerce and Industry (VECCI) 2011 http//blog.vecci.org.au/2011/11/30/bosses-heading-online-to-screen-job-candidates/Fair Work Australia, 2010 www.fairwork.gov.au/BestPracticeGuides/08-Workplace-privacy.doc Symons, P., Telstra Corporation Australia 2011 http//www.telstra.com.au/abouttelstra/download/document/telstra-cyber-cv-fact-sheet.pdf Newspaper ArticlesReynolds, E., The Daily Mirror (UK) 20 12 http//www.dailymail.co.uk/news/article-2115927/How-Facebook-cost-job-One-applicants-rejected-bosses-check-profiles-social-media-sites.html Wilkins, G., Bosses intruding on workers doctor visits Sydney Morning Herald, September 26, 2012 http//www.smh.com.au/opinion/political-news/bosses-intruding-on-workers-doctor-visits-20120925-26jh6.html?skin=text-only

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.