Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
DECISION
MAKING:
TECHNOLOGY
AND
PRIVACY
IN
THE
WORKPLACE
Chapter
7
Dr.
Pepey
RiawaA
Kurnia,
MM.,
CPM
• The
value
of
privacy
to
civilized
society
is
as
great
as
the
value
of
the
various
hypernorms
to
civilized
existence.
– The
failure
to
protect
privacy
may
lead
to
an
inability
to
protect
personal
freedom
and
autonomy.
Ethical
Sources
of
a
Right
to
Privacy
• Legal
analysis
of
privacy
using
property
rights
perspec*ve.
– “Property”
is
an
individual’s
life
and
all
non-‐procrea*ve
deriva*ves.
• May
include
thoughts
and
ideas,
as
well
as
personal
informa*on.
• Why
do
we
assume
an
individual
has
unfeIered
rights
to
their
personal
informa*on?
– Private
property
rights
depend
on
the
existence
and
enforcement
of
a
set
of
rules.
– The
legal
rules
remain
vague.
Legal
Sources
of
a
Right
to
Privacy
• Privacy
can
be
legally
• The
Electronic
protected
in
three
ways:
Communica*ons
Privacy
Act
– by
the
cons7tu7on,
(ECPA)
of
1986
prohibits
– by
statutes,
and
– unauthorized
access
of
stored
communica*ons.
– by
the
common
law.
• Some
states
use
statutes
• The
Cons*tu*on’s
Fourth
but
applica*on
to
private-‐
Amendment
protec*on
sector
organiza*ons
is
against
unreasonable
limited
and
uncertain.
search
and
seizure
• Case
law
developed
the
– applies
only
to
the
public-‐
sector
workplace.
intrusion
into
seclusion
when
one
person
intrudes
into
private
affairs
of
another.
Table
7.1
Legal
Status
of
Employee
Monitoring
• The
U.S.
did
not
qualify
as
having
“adequate
protec*ons”
and
nego*ated
a
Safe
Harbor
excep*on
for
some
secure
firms.
– They
now
act
under
an
agreement
called
the
Data
Privacy
Accord
with
a
“Privacy
Shield”
of
principles
firms
must
abide
by.
Table
7.2
The
European
Union
Privacy
Shield
David Meyer, “Here’s What U.S. Firms Will Have to Do under the EU Privacy Shield Deal” (February 29, 2016), hIp://fortune.com/2016/02/29/privacy-‐shield-‐details/ (accessed March 8, 2016).
• In
summary.
– Employee
privacy
is
violated
whenever
• employers
infringe
upon
personal
decisions
that
are
not
relevant
to
the
employment
contract
–
whether
the
contract
is
implied
or
explicit;
• or
if
personal
informa*on
that
is
not
relevant
to
that
contract
is
collected,
stored,
or
used
without
the
informed
consent
of
the
employee.
– Further,
since
consent
plays
a
pivotal
role,
the
burden
of
proof
rests
with
the
employer
to
establish
the
relevancy
of
personal
decisions
and
informa*on
at
issue.
Ethical
Decision
Making
• The
company
was
previously
in
trouble
over
their
use
of
“cookies.”
– SeIling
for
$22.5
million
for
viola*ng
terms
of
consumer
privacy.
• The
legaliza*on
of
marijuana
in
some
places
has
made
for
complicated
workplace
dilemmas.
Monitoring
Employees
Through
Drug
Tes*ng
• Consider
the
possibili*es
of
incorrect
presump*ons.
– For
instance,
there
are
warning
signs
of
drug
use.
– But
is
it
ethical
to
test
based
on
signs
when
there
could
be
other
jus*fica*ons?
• Where
public
safety
is
at
risk,
there
is
a
compelling
public
interest
to
mandate
drug
tes*ng.
– But
what
about
jobs
in
which
public
safety
is
not
at
risk?
Other
Forms
of
Monitoring
• Employers
are
limited
in
their
collec*on
of
informa*on
through
other
forms
of
tes*ng
such
as
polygraphs
or
medical
tests.
• Medical
informa*on
is
protected
by
the
Americans
with
Disabili*es
Act
but
also
by
the
Health
Insurance
Portability
and
Accountability
Act
(HIPAA).
– HIPPA
s*pulates
that
employers
cannot
use
“protected
health
informa*on”
without
prior
consent.
• Polygraphs
and
drug
tes*ng,
physical
and
electronic
surveillance,
third-‐party
background
checks,
and
psychological
tes*ng
have
all
been
used
to
gain
employee
informa*on.
– Recently
electronic
monitoring
and
surveillance
is
increasing.
– Where
might
this
prac*ce
develop
in
the
future?
Other
Forms
of
Monitoring
– Employees
claim
that
monitoring
is
an
inherent
invasion
of
privacy
that
violates
their
fundamental
human
right
to
privacy.
Balancing
Interests
• Perhaps
the
most
effec*ve
means
to
achieve
monitoring
objec*ves
while
remaining
sensi*ve
to
employee
concerns
– is
to
strive
toward
a
balance
that
respects
individual
dignity
while
also
holding
individuals
accountable
for
their
roles
in
the
organiza*on.
– A
monitoring
program
developed
according
to
the
mission,
– then
implemented
in
a
manner
that
remains
accountable
to
the
impacted
employees,
approaches
that
balance.
Parameters
for
a
Monitoring
Policy
– A
majority
of
states
protect
against
discrimina*on
on
the
basis
of
poli*cal
involvement,
which
vary
on
the
type
and
extent
of
protec*on.
Regula*on
of
Off-‐Work
Acts
• Most
statutes
provide
for
• The
ques*on
of
monitoring
employer
defense
for
rules
employee
online
that
communica*on
while
off
– are
reasonably
and
ra*onally
work
is
relevant
to
related
to
the
employment
technology
monitoring.
ac*vi*es
of
a
par*cular
– No
legal
guidance.
employee;
– Demands
sensi*ve
ethical
– cons*tute
a
“bona
fide
decision
making.
occupa*onal
requirement,”
• meaning
a
rule
that
is
reasonably
• Is
it
ethical
to
seek
out
online
related
to
that
par*cular
informa*on
prohibited
from
posi*on;
or
a
job
interview,
such
as
– are
necessary
to
avoid
a
conflict
religion?
of
interest
or
the
appearance
of
– Laws
vary
by
country
and
state.
conflict
of
interest.
Privacy
Rights
since
September
11,
2001
• 9/11
had
a
major
impact
on
privacy
within
the
U.S.
and
on
the
employment
environment
in
par*cular.
• The
most
public
and
publicized
modifica*on
was
the
adop*on
and
implementa*on
of
the
Uni*ng
and
Strengthening
America
by
Providing
Appropriate
Tools
Required
to
Intercept
and
Obstruct
Terrorism
(USA
PATRIOT)
Act
of
2001.
– Expanded
states
rights
with
regard
to
Internet
surveillance,
including
workplace
surveillance,
and
amended
the
Electronic
Communica*on
Privacy
Act.
– Grants
access
to
sensi*ve
data
with
only
a
court
order
rather
than
a
warrant
and
imposes
criminal
penal*es
for
aiding
terrorists.
– New
disclosure
clauses
allow
increased
sharing
of
informa*on
between
government
agencies
to
increase
protec*on.
Privacy
Rights
since
September
11,
2001
• Title
II
of
the
PATRIOT
Act
– Broadens
the
types
of
provides:
electronic
communica*ons
records
that
law
enforcement
– Expanded
authority
to
may
obtain.
intercept
wire,
oral,
and
electronic
communica*ons
– Permits
emergency
disclosure
of
electronic
communica*ons
related
to
terrorism,
to
protect
life
and
limb.
computer
fraud,
and
abuse
offenses.
– Provides
na*onwide
service
– Provides
roving
surveillance
of
search
warrants
for
electronic
evidence.
authority
to
track
individuals.
– Allows
na*onwide
seizure
of
• These
provisions
allow
the
voice-‐mail
messages
pursuant
government
to
monitor
to
warrants
–
no
wiretap
anyone
on
the
Internet
by
order
needed.
contending
it
is
“relevant”
to
a
criminal
inves*ga*on.
Privacy
Rights
since
September
11,
2001
• The
PATRIOT
Act
combats
money
laundering
ac*vity.
– Financial
ins*tu*ons
must
now
report
suspicious
ac*vi*es
and
keep
record
of
foreign
na*onal
employees.
• The
PATRIOT
Act
allows
for
and
relies
on
requests
from
businesses
to
gather
informa*on.
– However,
it
was
revealed
that
the
Na*onal
Security
Agency
(NSA)
was
harves*ng
contact
lists,
searching
e-‐mail
content,
and
tracking
and
mapping
cell
phone
loca*ons.
– Many
organiza*ons
now
no*fy
users
of
requests
for
informa*on
prior
to
disclosure
unless
prohibited
by
statute
or
court
order.
Table
7.1
Monitoring
of
telephone
calls
is
permiIed
in
connec*on
with
quality
control.
No*ce
to
the
par*es
on
the
call
is
oHen
required
by
state
law,
though
federal
law
allows
employers
to
monitor
work
calls
without
no*ce.
If
the
employer
realizes
the
call
is
personal,
monitoring
must
cease
immediately.
Monitoring
of
e-‐mail
messages
is
permiIed
under
most
circumstances.
Even
in
situa*ons
where
the
employer
claims
that
it
will
not,
it's
right
to
monitor
has
been
upheld.
However,
where
the
employee's
reasonable
expecta*on
of
privacy
is
increased
-‐
such
as
a
password-‐protected
account
-‐
may
impact
the
court's
decision.
Though
not
yet
completely
seIled,
the
law
on
voice-‐mail
system
messages
appears
to
be
similar
to
the
analysis
of
e-‐mail
messages.
When
it
comes
to
Internet
use,
where
the
employer
has
provided
the
equipment
and,
or,
access
to
the
Internet,
the
employer
may
track,
block,
or
review
Internet
use.