Sunday, November 10, 2019
Ethics, Privacy in the Workplace Essay
Introduction The aim of this essay is to provide a supportive argument ââ¬â ââ¬Å"forâ⬠the notion that an individualââ¬â¢s privacy is more important than any other considerations in the workplace. Workplace scenarios will be outlined including job applications, storage of personal information, Internet and email, information technology effects on privacy, workplace policies and procedures and medical privacy. Differing ethical theories will be applied to both sides of the argument. The Individualââ¬â¢s Privacy in the workplace Getting the job. The story is often heard in Australia how easy it was for people to gain employment in the economically booming 1960ââ¬â¢s and early 1970ââ¬â¢s; of how people would walk into a workplace in the morning and get a job straight away or within a couple of days jobseeking. Resumes, application letters and application forms were unheard of unless you were applying for a professional level position. As competition for jobs increased in the mid 1970ââ¬â¢s and early 1980ââ¬â¢s more and more selection tools were required when hiring new staff. Resumeââ¬â¢s detailing training, past employment and referees assisted in the selection or rejection of new staff. Applicants are not required to list information in their Resume such as marital status, gender, political leanings, religion, date of birth and number of children as part of equal employment opportunity legislation. In government based agencies in particular, merit based recruitment is stressed. Whilst in small privately owned businesses, employers still prefer to recruit new staff who are known to them or who are recommended friends of existing staff members. With current federal legislative requirements regarding unfair dismissal rules, employers must use care when employing new staff. A job seeker expects their private information to be handled with trust and discretion. The employer expects information to be relevant so they can make an accurate assessment of the job seeker. When it comes to ethics, both parties are acting in their own best interests. The seeker wants a job which is rewarding and lucrative in return for their effort. The employer wants the most skilled person for the least financial outlay possible so that business goals and healthy profits can be achieved. By applying the ethical consequential theory of Egoism regarding privacy, both parties are acting out of self-interest which best serves their own long term goals. According to psychological egoism, humans are by nature ââ¬â selfish. The jobseeker will divulge only enough personal information which will enable them to get and keep the job. The employer seeks to find out as much information as possible about the jobseeker so that their business is not damaged in the long run by selecting an inappropriate candidate. Shaw (2009) Page 59 Stored Information Traditionally an employeeââ¬â¢s basic personal information such as their resume, emergency contact details, and bank details would usually be kept on hard file in a locked personnel filing cabinet. Personal information shared amongst work colleagues was up to the discretion of the employee and staff encouraged to leave personal problems or beliefs at home. With the advent of information technology systems becoming more commonplace, communications though shared databases, email, intranet, internet and even social media have largely replaced paper files in storing company and personal information. Besides conducting simple one to one personal communication in the workplace, our personal and private information is shared in cyberspace with and without our express permission and may be accessed off site by internal staff or external IT support contractors with administrative access. Websites visited and programs/files accessed on work computers in work time can be logged and monitored . This database of information needs to be protected from improper use and access by unauthorised people. The employee expects that the privacy of their information is protected. Monitoring IT usage at work by the employer may be seen as an action in the interests of the business but it can also be seen as an erosion of trust in the employer/worker contract relationship. The Fair Work Australia Ombudsman recommends that employers ââ¬Å"implement best practice when maintaining privacy in the workplace. Employers, employees and their representatives need to know what information may be collected and retained and if it can be passed on to others. This best practice creates certainty and security for both employers and employees.â⬠Fair Work Australia(2010) Page 1 If the non-consequentialist ethical theory of Kantism is applied to this scenario, employers are expected to do the right thing as an act out of duty and by these moral principles the employee information is protected. Under Kantism if an employer was to mishandle this private information by for example selling it to third parties, this action would be morally wrong. Employers may justify their actions in logging internet and computer activity as a means to reduce ââ¬Å"goldbrickingâ⬠or ââ¬Å"cyber-slackingâ⬠which is defined as employeeââ¬â¢s using company internet accounts for personal / inappropriate use whilst giving the outward appearance of being busy with their work. Employees may see this as an invasion of privacy if they have not been informed or consented in their employment contract of this monitoring occurring. With Kantââ¬â¢s theory an employeeââ¬â¢s actions of cyber-slacking would be considered morally wrong as they are not doing the right thing by their employer. By the same token the action of monitoring a workers use of the internet or email without their consent would also be considered immoral under Kantââ¬â¢s theory of ethics. Shaw (2009) Page 452 Fair Work Australia also says that ââ¬Å"Password and login codes may give employees the impression that their email and web browsing activities during work hours are private and not aware that their activities can be scrutinised by their employer.â⬠Fair Work Australia (2010) Page 3 Employers should provide clear workplace policies and procedures to ensure all parties understand the rights and responsibilities that apply to email and internet usage. Prescriptive guidance would detail the amount of appropriate personal email and internet usage within and outside the workplace that is allowable; prohibited activities and repercussions; legislation; how usage is logged and audited; and who has access to this information. Similar rules would apply to workplace landline and mobile phone usage. Fair Work Australia (2010) Page 4-5 By applying the consequentialist ethical theory of Utilitarianism to IT usage monitoring, the morally right action provides for the greatest happiness for all those affected, e.g., workload is shared evenly amongst staff; secret, divisive conversations are less likely to occur online and it is also a potential way to avoid potential conflicts in the workplace. Employers would use Utilitarianism to justify their actions in monitoring staff IT practices. An employee applying Egoism in this instance could argue that logging staffââ¬â¢s IT usage is an invasion of privacy and not in their interest, therefore mo rally wrong. Shaw (2009) Page 92 Privacy beyond the workplace Most people believe that what they do and the opinions they have in the privacy of their own home is private, however social media sites such as Facebook and Twitter can sometimes be viewed by third parties depending on privacy settings. It is believed that employers have viewed the social media sites of potential new workers to assess their suitability to the job. In an article in the Daily Mail newspaper (UK) the story claims that one in five bosses have rejected job applicants after viewing their social media sites. According to a survey by public relations company Eurocom Worldwide, ââ¬Å"ââ¬â¢The 21st-century human is learning that every action leaves an indelible digital trail,ââ¬â¢ said Mads Christensen, Network Director at Eurocom ââ¬Å" Reynolds (2012) In Australia, Telstra conducted a business survey which resulted in similar figures of more than 12.5% of bosses checking job applicants Facebook pages and turning away potential employees based on things they have seen on Facebook. ââ¬Å"Top social media behaviours cited by bosses as leading to a candidate being ruled out are: â⬠¢Posting negative comments about their workplace with 44% saying this could rule out an applicant â⬠¢Posts/comments which are discriminatory (37%) â⬠¢Inappropriate pictures posted on their profile (32%) â⬠¢Posts/comments which contain confidential information (32%)â⬠and 10% of employers use Facebook and other social networking sites to keep an eye on employeeââ¬â¢s productivity. Symons (2011) Page 1 Employers say the biggest mistakes their current employees make on social networking sites are: ââ¬Å"1. Posting negative comments about their workplace, with 26% saying this is the biggest mistake. 2. Posting confidential information (16%) 3. They post or are tagged in inappropriate pictures on their profile (14%) 4. Posting discriminatory comments (11%) 5. Posting comments/photos/links during work hours (10%) ââ¬Å" Symons (2011) Page 2 Part of the key argument regarding personal privacy is: Do employers have the right to make judgements about potential or current employees based on information in social media sites? Surely this is not an accurate indication of their work skills and loyalty to a business as these social media sites are (usually) created when staff are not at work. It is tantamount to spying on a person in their private hours where their opinions are not necessarily those of their employer. The bosses may also have dubious moral and ethical behaviours outside of work hours, however the employerââ¬â¢s position of authority and power gives an unfair advantage over the worker. David W. Ewing devised an employeesââ¬â¢ bill of rights where ââ¬Å"No employee shall be penalized for engaging in outside activities of his or her choice after working hoursâ⬠¦nor for expressing views contrary to top management.â⬠Shaw (2009) Page 488 The employer would argue that viewing the content on an employeeââ¬â¢s social media site is indicative of that individualââ¬â¢s moral standards which may in turn be detrimental to the companyââ¬â¢s reputation, e.g. a primary school teacher with sexually provocative images of themselves may be deemed inappropriate behaviour and detrimental to the reputation and public perception of the school. Employers could justify their actions of looking into the private lives of their employeeââ¬â¢s with Egoism and Kantism. It is in the employerââ¬â¢s interest to monitor the integrity of their staff ââ¬â on and off the job. And inappropriate behaviour even if it is outside the workplace is detrimental to the reputation of the organisation they work for. The employee could take the moral stance using Virtue Ethics of which they consider themselves to be a moral and virtuous person by their routine behaviour whilst working and that they shouldnââ¬â¢t be ju dge by the actions they take outside of work. Shaw (2009) Page 88 Employee Medical Privacy Most recently there has been a report that Employers have been going along with employees to medical appointments and in some cases asking for medical certificates to be altered so that their employees can return to work earlier. The ACTU (Australian Council of Trade Unions) assistant secretary Michael Borowick has revealed that ââ¬Å"the privacy of ill workers has been eroded, Employers, insurers and employer representatives are increasingly attending actual medical appointments with injured workers and, in some cases, forcing workers to attend company doctors. Weââ¬â¢ve also had reports of doctors being pressured to change medical certificates and return-to-work plans.â⬠In May 2012, construction materials supplier Boral was warned by Fair Work Australia against allowing supervisors to accompany injured staff into doctorsââ¬â¢ consulting rooms, with the workplace umpire saying it had the potential to operate unfairly. The Fair Work Ombudsman said that the ââ¬Å"Fair Work Act does not contain express provisions regarding whether an employer can accompany an employee to a medical appointment or have a private conversation with a doctor regarding the employeeââ¬â¢s medical condition.â⬠Wilkins (2012) It is incredible to imagine that such an intrusion of intimate personal privacy is occurring in the workplace let alone that there is scant legislation to prevent it. An employer could argue that it is in the interest of the company to ensure that employees are acting honestly in relation to the true nature of their illness as sick days cost the company money in delays and decreased productivity. Marketplace competitiveness is affected and workers compensation costs may also increase. By applying Utilitarianism theory, an employer may justify this action as it promotes the general welfare of the company and is result orientated. Whereas the employee may argue that utilitarianism is focused on the results of the action not whether the action is morally right or wrong for the privacy of the individual worker. In conclusion ââ¬â on balance the argument of the notion that an individualââ¬â¢s privacy is more important than any other consideration in the workplace is affirmed. We now live in a society where we think we are in control of our personal and private details when in reality our opinions, movements, interests and affiliations are being monitored constantly without our knowledge. An individualââ¬â¢s right to privacy is dependent largely on the amount of information they share face to face, in writing or on the internet. It seems unfair that personal privacy should be sacrificed for corporate gain. Bibliography Books Shaw, W., Barry, V., & Sansbury, G. (2009) Moral Issues in Business (1st Asia-Pacific ed.), Cengage Learning. Melbourne, Australia Journals Andrejevic, M. Commercial surveillance in the digital era, Living Ethics: issue 87 (autumn 2012) Heersmink, R., van den Hoven, J., Jan van Eck, N., van den Berg, J. Bibliometric mapping of computer and information ethics (2011) Springerlink.com Legislation Privacy Act (1988) Commonwealth of Australia Privacy and Personal Information Protection Act (1998) NSW Web Articles ââ¬Å"A quarter of bosses head to Facebook to vet CVââ¬â¢sâ⬠http://www.news.com.au/technology/a-quarter-of-bosses-head-to-facebook-to-vet-cvs/story-e6frfro0-1226208260693 THE VECCI BLOG, ââ¬Å"Bosses heading online to screen job candidatesâ⬠, The Victorian Employerââ¬â¢s Chamber of Commerce and Industry (VECCI) 2011 http://blog.vecci.org.au/2011/11/30/bosses-heading-online-to-screen-job-candidates/ Fair Work Australia, 2010 www.fairwork.gov.au/BestPracticeGuides/08-Workplace-privacy.doc Symons, P., Telstra Corporation Australia 2011 http://www.telstra.com.au/abouttelstra/download/document/telstra-cyber-cv-fact-sheet.pdf Newspaper Articles Reynolds, E., The Daily Mirror (UK) 2012 http://www.dailymail.co.uk/news/article-2115927/How-Facebook-cost-job-One-applicants-rejected-bosses-check-profiles-social-media-sites.html Wilkins, G., ââ¬Å"Bosses intruding on workersââ¬â¢ doctor visitsâ⬠Sydney Morning Herald, September 26, 2012 http://www.smh.com.au/opinion/political-news/bosses-intruding-on-workers-doctor-visits-20120925-26jh6.html?skin=text-only
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.