chapter 7 smart book assignment
true or false: new technology necessarily impacts people's value judgement regarding privacy
false
__________ __________ refers to the maintenance and either periodic or random review of e-mail communications of employees or others for a variety of business purposes.
e-mail monitoring
_____ are the values that are fundamental across culture and theory
hypernorms
which of the following is true values that are determined within moral free space?
they are not hypernorms
True or false: One of the reasons that employee advocates argue against monitoring in the workplace is that monitoring is an inherent invasion of privacy.
true
many recent court decisions regarding workplace monitoring seem to depend specifically on _______
whether the employee had notice that the monitoring might occur
In the context of companies' attempts to encourage nonsmoking among employees, which of the following is true of the Health Insurance Portability and Accountability Act (HIPAA)?
HIPAA requires firms to offer alternatives for their employees who are smokers to avoid a surcharge for a health insurance policy.
Employers' decisions regarding medical information are restricted in the United States by the _____.
Health Insurance Portability and Accountability Act (HIPAA)
Recently, it was discovered that the _____ was harvesting millions of e-mail and instant messaging contact lists, searching e-mail content, and tracking and mapping the location of cell phones, often with the help of telecommunications companies.
National Security Agency (NSA)
It was recently revealed that the National Security Agency (NSA) was tapping into the data centers of companies like Yahoo! and Google to collect information from account holders worldwide based on court-approved explicit access through its _____ program.
PRISM
the ________ _____ ______ act (ECPA) of 1986 is the U.S. statute that established the provisions for access, use, disclosure, interception, and privacy protections relating to electronic communications
electronic communications privacy
true or false: drug testing is the latest way of employers monitoring employees in the workplace
false
the _________ _______ ________-______ Act (GINA) came into effect in November 2009 and prohibits discriminatory treatment in employment on the basis of genetic information.
genetic information non-discrimination
its courts were the first to recognize a common-law--or court-created---right to privacy (georgia or north dakota)
georgia
why is privacy important?
it defines one's individuality by establishing the boundary between individuals
__________ ________ ______________is that environment where hypernorms or universal rules do not govern or apply to ethical decisions, but instead culture or other influences govern decisions, as long as they are not in conflict with hypernorms.
moral free space
its courts do not recognize any privacy claims that are usually accepted by other courts (georgia or north dakota)
north dakota
while an employee has an obligation to respect the goals and property of employer, the employer also has an obligation to respect the rights of the employee, including the employees right to privacy. This concept is called a(n) ________ ________
reciprocal obligation
True or false: According to economist Antonio Argandoña, significant moral requirements should be imposed on the information and data on which new technology is dependent.
true
In the context of companies' attempts to encourage nonsmoking among employees, which of the following is true of the Affordable Care Act (ACA)?
under ACA, insurance companies are allowed to charge smokers more than nonsmokers for a health insurance policy
Which of the following are true of the definitions laid out by the Genetic Information Non-Discrimination Act (GINA)? (Check all that apply.)
- the term family member includes one's dependents and relatives all the way to the fourth degree of kinship - under GINA, one's genetic information includes one's family's medical history
identify the ways in which privacy can be legally protected (check all that apply)
-by federal and/or state statutes -by common law -by the constitution
which of the following U.S. states require employers to notify employees when they are being monitored?
-connecticut -delaware
which of the following are true of drug testing in the workplace? (check all that apply)
-employers are in favor of drug testing because they can be held responsible for legal violations committed by employees in the course of their jobs -employees can argue that unless their drug affects their job performance, employers have no basis for drug testing
Identify the enhanced surveillance procedures provided for by Title II of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001 that have a significant effect on individual privacy and may impact an employer's effort to maintain employee privacy. (Check all that apply.)
-expanding authority to intercept wide, oral, and electronic communications that are related to terrorism, computer fraud, and abuse offenses -allowing nationwide seizure of voice-mail messages in accordance with warrants -broadening the types of records that law enforcement can obtain from electronic communications service providers pursuant to a subpoena
Identify the conditions under which decisions or workplace rules used by employers are allowed by most U.S. statutes or common-law decisions. (Check all that apply.)
-if those rules are reasonably and rationally related to en employee's employment activities -if those rules constitute a bona fide occupational requirement
Identify the true statements about the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001. (Check all that apply.)
-it increased civil and criminal penalties for intentionally or knowingly aiding terrorists -it expanded states' rights with regard to internet surveillance technology
What are the reasons given by employee advocates for limiting monitoring in the workplace? (Check all that apply.)
-monitoring may create a mistrustful and hostile workplace -monitoring may arguably constrain effective performance as it can lead to increased stress and pressure
Identify the parameters that a workplace monitoring policy should ideally follow. (Check all that apply.)
-monitoring should only result in gaining some business interest -monitoring should be restricted to within the workplace -there should be no monitoring in private areas
Identify the related senses of privacy. (Check all that apply.)
-privacy as the right to regulate information about oneself -privacy as a right to remain within personal zone of solitude
The legal and ethical sources of protection for privacy in personal data are called
-privacy rights
Identify the necessary elements suggested by economist Antonio Argandoña in imposing moral requirements on the information and data on which new technology is dependent. (Check all that apply.)
-respect for privacy -truthfulness and accuracy -accountability -respect for property and safety rights
in telephone calls monitoring, notice to the parties on the call is often required by ______ law, though ________ laws allows employers to monitor work calls without notice
-state -federal
identify the true statements about the impact of new technology on the issue of privacy. (check all that apply)
-technology allows for in-home offices, and this raises issues of safety and privacy concerns -the advent of new technology has implications on employee and employer expectations regarding privacy interests
According to ethicists Thomas Donaldson and Thomas Dunfee, which of the following are examples of hypernorms? (Check all that apply.)
-the right to physical movement -the right to personal freedom -freedom of speech
Identify the true statements about the parameters are ideally considered while developing a workplace monitoring policy. (Check all that apply.)
-they permit employers to effectively and ethically oversee the work employees do -they permit employers to protect against abuse of resources
Identify the reasons why employers monitor employees' technology usage. (Check all that apply.)
-to place employees in suitable positions and to ensure their workplaces are in compliance with affirmative action requirements -to ensure productive performance
Identify the reasons why employers monitor employees' technology usage beyond the management of their human resources. (Check all that apply.) Multiple select question.
-to prevent theft -to secure proprietary information -to protect their investment in bandwidth and equipment
identify a true statements about the approach to privacy around the world. (check all that apply)
-uncertainty concerning the nature, extent, and value of privacy is widespread - significant disagreement about privacy exists within the united states
identify the true statements about electronic communications privacy act (ECPA) of 1986 (check all that apply)
-under it, employers are allowed to intercept email messages as long as they have a valid business reason for doing so -it permits the interception of messages where consent has been granted
identify the true statements about the legal status of employees monitoring the United states (check all that apply)
-under most circumstances, employers are allowed to monitor employees emails -as of 2019, employers are prohibited from obtaining social media passwords from prospective or current employees in 26 states
Which of the following is a condition under which decisions or workplace rules used by employers are allowed by most U.S. statutes or common-law decisions?
If those rules are essential to avoid a conflict of interest or the appearance of a conflict of interest
Workers are found to be more productive based on the psychological stimulus of being singled out or when they are informed that they are being monitored. This effect of employer monitoring is termed the " ______ _______"
hawthorne effect
__________ __________ _________ refers to the maintenance and either periodic or random review of the use of the Internet by employees or others based on time spent or content accessed for a variety of business purposes.
internet use monitoring
___________ _________ ___________ occurs when someone intentionally intrudes on the private affairs of another when the intrusion would be "highly offensive to a reasonable person."
intrusion into seclusion
identify a true statement about the U.S. constitutions Fourth Amendment protection against an unreasonable search and seizure.
it is only applicable in the public-sector workplace
The Health Insurance Portability and Accountability Act (HIPAA) stipulates that employers cannot use " _____ _____ ______" which refers to all medical records or other individually identifiable health information, in making employment decisions without prior consent.
protected health information
In the context of workplace monitoring, a suggestion for balancing employer and employee interests is to _____.
provide due notice to employees that they will be monitored
Philosopher and academic Patricia Werhane has stated that a bill of rights for the workplace would include both the right of employees to privacy and confidentiality and the right of employers to privacy regarding confidentiality of trade secrets and so on. This highlights the concept of _____.
reciprocal obligation