Exam 7: Ethical Decision Making: Technology and Privacy in the Workplace

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Discrimination laws do not necessarily protect workers against adverse action based on the identity of the person they married.

Free
(True/False)
4.9/5
(45)
Correct Answer:
Verified

True

Summarize how the definition of privacy gives rise to two streams of thought about rights?

Free
(Essay)
4.9/5
(36)
Correct Answer:
Verified

Two general and connected understandings of privacy can be found in the legal and philosophical literature on this topic: privacy as a right to be "let alone" within a personal zone of solitude,and privacy as the right to control information about oneself.
It is valuable to consider the connection between these two senses of privacy.Certain decisions that we make about how we live our lives,as well as the control of personal information,play a crucial role in defining our own personal identity.Privacy is important because it serves to establish the boundary between individuals and thereby serves to define one's individuality.To the degree that we value the inherent dignity of each individual and the right of each person to be treated with respect,we must recognize that certain personal decisions and information is rightfully the exclusive domain of the individual.
Many people believe that a right to be let alone is much too broad to be recognized as a moral right.This has led some people to conclude that a better understanding focuses on privacy as involving the control of personal information.From this perspective,the clearest case of an invasion of privacy occurs when others come to know personal information about us,as when a stranger reads your e-mail or eavesdrops on a personal conversation.Yet,the claim that a right of privacy implies a right to control all personal information might also be too broad.There are many occasions when others,particularly within an employment context,can legitimately know or need to know even quite personal information about us.

The Constitution's Fourth Amendment protection against an unreasonable search and seizure governs only the public sector workplace because:

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

C

Discuss the nuances associated with drug testing,and outline the arguments for and against it.

(Essay)
4.8/5
(39)

Which of the following is an advantage of monitoring?

(Multiple Choice)
4.7/5
(43)

Health Insurance Portability and Accountability Act (HIPAA)stipulates that employers can use "protected health information" in making employment decisions without prior consent.

(True/False)
4.7/5
(41)

Explain the concept of hypernorms,and moral free space.

(Essay)
4.7/5
(30)

Internet use monitoring is evolving with the rise of social media and social networking use in recent years.

(True/False)
4.9/5
(41)

Values that are fundamental across culture and theory are not hypernorms.

(True/False)
4.8/5
(34)

Title II of the USA PATRIOT Act provides roving surveillance authority under the:

(Multiple Choice)
4.9/5
(31)

Which of the following acts grants access to sensitive data with only a court order rather than a judicial warrant and imposes or enhances civil and criminal penalties for knowingly or intentionally aiding terrorists?

(Multiple Choice)
4.7/5
(36)

The advent of new _____ challenges privacy in ways that people could never before imagine.

(Short Answer)
4.9/5
(36)

Which of the following prohibits the "interception" or unauthorized access of stored communications?

(Multiple Choice)
4.9/5
(28)

The impact of ECPA is to punish electronic monitoring only by _____ and not by employers.

(Short Answer)
4.8/5
(34)

An employer can resolve the concerns related to the "Hawthorne Effect" through:

(Multiple Choice)
4.8/5
(41)

Briefly discuss the circumstances which violate an employee's privacy rights?

(Essay)
4.8/5
(36)

The value of privacy to civilized society is as great as the value of hypernorms to civilized existence.

(True/False)
4.7/5
(37)

Briefly outline the challenges of technology discussed in the text.

(Essay)
4.7/5
(40)

Explain the ethical source of privacy using the perspective of property rights.

(Essay)
4.8/5
(31)

Identify the policy under which an employer refuses to hire or terminates a worker whose spouse works at a competing firm.

(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)