Corporate Ethics and Responsibility chapter 8
Employee viewpoints on the issue of monitoring the workplace for increased work productivity
An employee should be notified of any electronic surveillance and the intent of that surveillance.
Which of the following is an example of an employee telecommuting?
Arun logs in to work from home by accessing his company's network via VPN.
A legal concept that employers can be held accountable for the conduct of their employees through Internet communications to the same level as if those employers had written those communications officially on company letterhead is referred to as
Cyberliability
In the context of cyberliability, identify the top categories of litigation as recorded by Elron Software.
Discrimination harassment
Which of the following is a concern over loss of privacy that has arisen from the increased use of technology in the work environment?
Employers have the ability to monitor all e-mails sent by employees to ensure that they are fulfilling the promise of increased worker productivity.
A private portion of a company's Internet network that is accessible to customers and/or vendor partners on the basis of secured entry by a unique password is referred to as ___
Extranet
T or F: According to Adam Moore, consent given by employees with little choice is referred to as thick consent.
False
T or F: Advances in technology make it harder for employers to assign work to their employees outside the workplace.
False
T or F: Copying and distributing unpaid proprietary software is not a violation of computer ethics.
False
T or F: Customer service call centers and computer tech support are examples of services that cannot be outsourced to another country.
False
T or F: Keystroke loggers can only capture information that is not deleted.
False
T or F: Parties charged with vicarious liability are never in a supervisory role over the person or parties personally responsible for the injury or damage.
False
T or F: Telecommuting does not allow employees any degree of flexibility in terms of the location from which they work.
False
T or F: The extranet is a part of a company's website which can only be accessed by its senior executives.
False
T or F: The intranet is a private piece of a company's Internet network that is made available to customers and/or vendor partners on the basis of secured access by a unique password.
False
T or F: Thin consent is based on the assumption that the employee can easily find another job.
False
T or F: Using a computer to appropriate the intellectual output of another person is an example of ethical employee behavior.
False
T or F: When jobs are plentiful and an employee would have no difficulty finding another position, then the consent given to the monitoring policy of a company is referred to as thin consent.
False
Which of the following are examples of cyberliability?
GGH Inc. is held accountable for the actions of two of its employees who sent obscene messages to customers. WE98 Inc., a news agency, is held liable for the leaking of confidential information by its employees.
A company's internal website, containing information for employee access only, is referred to as
Intranet
Identify the top categories of litigation related to Internet communications as recorded by Elron Software.
Obscenity and pornography Spam Defamation and libel Information leaks
examples of vicarious liability
RTY Inc. is held responsible for the fraud committed by two of its employees. William, a manager, is held accountable for the discriminatory actions of his subordinate toward another employee.
Which of the following is a violation of the "10 Commandments of Computer Ethics" provided by Computer Professionals for Social Responsibility?
Richard uses proprietary software for which he has not paid.
The ability to work outside of one's office (from home or anywhere else) by logging in to one's company network (usually via a secure gateway such as a virtual private network, or VPN) is referred to as _____.
Telecommuting
Employer viewpoints on the issue of monitoring the workplace for increased work productivity
The conduct of an employee during regular work hours is at the discretion of the company.
Which of the following is an example of intranet?
The internal website of CVB Inc., which can be accessed only by the employees
CVB Inc. is an American electronic commerce company. It has a popular website that is used by customers to shop for clothes. Which of the following is an example of extranet of CVB Inc.?
The private portion of CVB Inc.'s Internet network that can be accessed by clients using a unique password
Consent in which an employee has an alternative to unacceptable monitoring is known as _ _
Thick Consent
Veronica accepts a job as a senior executive at EUA7 Inc. She has multiple employment offers for the same role from other companies. Upon joining, EAU7 Inc. informs Veronica that her online activities will be tracked and monitored during work hours. Despite having other job opportunities, Veronica gives consent to the monitoring by the firm. This consent can be classified as _____
Thick Consent
If an employee of a firm receives official notification that the firm will be monitoring all e-mail and online activity—either at the time of hire or during the course of employment—and it is made apparent in that notification that the employee's continued employment with the firm will be contingent on the employee's agreement to accept that monitoring, then the employee may be said to have given ____
Thin Consent
Yelena joins RV14 Inc. and receives formal notification that the firm will be monitoring all her online activities during work hours. It is made clear that her continued employment with the firm will be dependent on her agreement to abide by the monitoring. Yelena gives her consent to the monitoring as she lacks other employment opportunities. This consent can be classified as _____
Thin Consent
the "10 Commandments of Computer Ethics" provided by Computer Professionals for Social Responsibility.
Thou shalt not use a computer to harm other people Thou shalt not interfere with other peoples computer work Thou shalt not snoop around in other peoples computer files Thou shalt not use a computer to steal Thou shalt not use a computer to bear false witness Thou shalt not copy or use proprietary software for which you have not paid Thou shalt not appropriate other peoples intellectual output Thou shalt think about the social consequences of the program you are writing or the system you are designing Thou shalt always use a computer in ways to ensure consideration and respect for you fellow humans
T or F: According to the legal concept of cyberliability, employers can be held liable for the actions of their employees through Internet communications to the same degree as if they had written those communications on company letterhead.
True
T or F: Employers feel it necessary to monitor employees at the workplace because they have an obligation to their stakeholders to operate as efficiently as possible.
True
T or F: From an employee's viewpoint, electronic monitoring at the workplace by employers implies that employers do not trust their employees.
True
T or F: Meddling with a person's computer work without their knowledge is considered unethical behavior.
True
T or F: One of the arguments cited by employers for the use of web-monitoring at the workplace is the concept of vicarious liability.
True
T or F: One of the ways in which multinational corporations lower their expenses is by shipping work to countries with lower labor costs.
True
T or F: Packet-sniffing software can be used to monitor employees' private accounts, as long as they are accessed on workplace networks or phone lines.
True
T or F: Parents can be charged with vicarious liability for the actions of their children
True
T or F: The argument over privacy at work traditionally centered on the amount of time that employees were on-site.
True
T or F: The categories of litigation for cyberliability extend to defamation and libel.
True
T or F: Thin consent leaves employees with little choice regarding the monitoring of their web activity at the workplace.
True
T or F: Video surveillance, under federal law, is acceptable where the camera focuses on publicly accessible areas.
True
_ _ is a legal concept that means that a party may be held accountable for injury or damage even when the party was not actively involved in an incident.
Vicarious liability
The ability to work outside of one's office (from home or anywhere else) by logging in to one's company network (usually via a secure gateway such as a virtual private network, or VPN) is referred to as ___
telecommuting
In the context of the concerns over loss of privacy due to technological advancement, customers must be aware that organizations now have ____
the technical expertise to send their personal information to any part of the world to benefit from lower labor costs
If there are ample jobs in the market and an employee would have no difficulty in finding another job, then consent to the monitoring policy of the employer could be classified as _____ since the employee has other realistic options if he or she finds the policy to be objectionable.
thick consent
Consent to an employer in which the employee has little choice is referred to as
thin consent
T or F: Some of the advances in workplace technology over the last two decades include desktop computing, the Internet, and the growth of e-mail and instant messaging (IM).
true