Академический Документы
Профессиональный Документы
Культура Документы
LEARNING OBJECTIVES
After the completion of this module, student will
know the:
• The right of privacy and the basis for protecting
personal privacy under the law.
• The laws that provide protection for the
privacy of personal data and its associated
PROFESSIONAL •
ethical issues
The various strategies for consumer profiling
and its associated ethical issues
• The reason why and how are employers
ETHICS IN IT •
increasingly using workplace monitoring
The capabilities of advanced surveillance
technologies and its ethical issues.
“The right of the people to be secure in their persons, houses, papers, and
effects, against unreasonable searches and seizures, shall not be violated, and no
Warrants shall issue, but upon probable cause, supported by Oath or affirmation,
and particularly describing the place to be searched, and the persons or things to be
seized. “
Information Privacy
A broad definition of the right of privacy is “the right to be left alone—the most
comprehensive of rights, and the right most valued by a free people.”
The discussion is divided into the following topics: financial data, health
information, children’s personal data, electronic surveillance, fair information
practices, and access to government records.
Financial Data
Individuals must reveal much of their personal financial data in order to take
advantage of the wide range of financial products and services available, including
credit cards, checking and savings accounts, loans, payroll direct deposit, and
brokerage accounts. To access many of these financial products and services,
individuals must use a personal logon name, password, account number, or PIN. The
inadvertent loss or disclosure of this personal financial data carries a high risk of
loss of privacy and potential financial loss. Individuals should be concerned about
how this personal data is protected by businesses and other organizations and
whether or not it is shared with other people or companies.
The act only governs disclosures to the federal government; it does not cover
disclosures to private businesses or state and local governments. The definition of
financial institution has been expanded to include banks, thrifts, and credit unions;
money services businesses; money order issuers, sellers, and redeemers; the U.S.
Postal Service; securities and futures industries; futures commission merchants;
commodity trading advisors; and casinos and card clubs.
identity theft can place an alert on their credit files. The alert places potential
creditors on notice that they must proceed with caution when granting credit.
Health Information
The use of electronic medical records and the subsequent interlinking and
transferring of this electronic information among different organizations has
become widespread. Individuals are rightly concerned about the erosion of privacy
of data concerning their health. They fear intrusions into their health data by
employers, schools, insurance firms, law enforcement agencies, and even marketing
firms looking to promote their products and services. The primary law addressing
these issues is the Health Insurance Portability and Accountability Act.
Electronic Surveillance
This section covers laws that address government surveillance, including
various forms of electronic surveillance. New laws have been added and old laws
amended in recent years in reaction to worldwide terrorist activities and the
development of new communication technologies.
Fair information practices are important because they form the underlying basis for
many national laws addressing data privacy and data protection issues.
Data Breaches
An alarming number of identity theft incidents can be traced back to data
breaches involving large databases of personal information. Data breaches are
sometimes caused by hackers breaking into a database, but more often than one
might suspect, they are caused by carelessness or failure to follow proper security
procedures.
The number of data breach incidents is alarming (over 1,450 in 2012 alone),
as is the lack of initiative by some companies in informing the people whose data was
stolen. Organizations are reluctant to announce data breaches due to the ensuing
bad publicity and potential for lawsuits by angry customers. However, victims
whose personal data was compromised during a data breach need to be informed so
that they can take protective measures.
The cost to an organization that suffers a data breach can be quite high—by
some estimates nearly $200 for each record lost. Nearly half the cost is typically a
result of lost business opportunity associated with the customers whose patronage
has been lost due to the incident. Other costs include public-relations-related costs to
manage the firm’s reputation, and increased customer-support costs for information
hotlines and credit monitoring services for victims.
Electronic Discovery
Discovery is part of the pre-trial phase of a lawsuit in which each party can
obtain evidence from the other party by various means, including requests for the
production of documents. The purpose of discovery is to ensure that all parties will
go to trial with as much knowledge as possible. Under the rules of discovery, neither
party is able to keep secrets from the other. Should a discovery request be objected
to, the requesting party may file a motion to compel discovery with the court.
Consumer Profiling
Marketing firms aggregate the information they gather about consumers to
build databases that contain a huge amount of consumer data. They want to know
as much as possible about consumers—who they are, what they like, how they
behave, and what motivates them to buy. The marketing firms provide this data to
companies so that they can tailor their products and services to individual consumer
preferences. Advertisers use the data to more effectively target and attract customers
to their messages. Ideally, this means that buyers should be able to shop more
efficiently and find products that are well suited for them. Sellers should be better
able to tailor their products and services to meet their customers’ desires and to
increase sales. However, concerns about how this data is used prevent many
potential online shoppers from making purchases.
Consumer data privacy has grown into a major marketing issue. Companies
that can’t protect or don’t respect customer information often lose business, and some
become defendants in class action lawsuits stemming from privacy violations.
Workplace Monitoring
Plenty of data exists to support the conclusion that many workers waste large
portions of their work time doing non-work-related activity. One recent study
revealed that between 60 to 80 percent of workers’ time online has nothing to do with
work.61 Another source estimates that, on average, workers spend about four or five
hours per week on personal matters. In a recent survey by an IT staffing firm, 54
percent of companies reported they were banning the use of social networking sites
such as Facebook, Twitter, MySpace, and LinkedIn to help reduce waste at work.
The potential for decreased productivity and increased legal liabilities has led
many employers to monitor workers to ensure that corporate IT usage policies are
being followed. Many U.S. firms find it necessary to record and review employee
communications and activities on the job, including phone calls, email, and Web
surfing. Some are even videotaping employees on the job. In addition, some
companies employ random drug testing and psychological testing. With few
exceptions, these increasingly common (and many would say intrusive) practices are
perfectly legal.
Camera Surveillance
Surveillance cameras are used in major cities around the world in an effort to
deter crime and terrorist activities. Critics believe that such scrutiny is a violation of
civil liberties and are concerned about the cost of the equipment and people required
to monitor the video feeds. Surveillance camera supporters offer anecdotal data that
suggests the cameras are effective in preventing crime and terrorism. They can
provide examples in which cameras helped solve crimes by corroborating the
testimony of witnesses and helping to trace suspects.
Stalking Apps
Technology has made it easy for a person to track the whereabouts of someone
else at all times, without ever having to follow the person. Cell phone spy software
called a stalking app can be loaded onto someone’s cell phone or smartphone within
minutes, making it possible for the user to perform location tracking, record calls,
view every text message or picture sent or received, and record the URLs of any Web
site visited on the phone. A built-in microphone can be activated remotely to use as a
listening device even when the phone is turned off.74 All information gathered from
such apps can be sent to the user’s email account to be accessed live or at a later time.
Some of the most popular spy software includes Mobile Spy, ePhoneTracker,
FlexiSPY, and Mobile Nanny.
Discussion Questions
1. Are surveillance cameras worth the cost in terms of resources and loss of privacy,
given the role that they play in deterring or solving crimes?
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
__________________________
2. Why do employers monitor workers? Do you think they should be able to do so?
Why or why not?
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
__________________________
3. Do you think that law enforcement agencies should be able to use advanced
surveillance cameras and data from vehicle data recorders in a court of law?
Why or why not?
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
__________________________
4. Do you think that the installation of stalker software on suspects’ cell phones
should be authorized for law enforcement agencies? If so, under what
circumstances should such use be permitted? If not, why not.
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
_______________________________________________________
__________________________.