The reasons why technology is the cause of privacy issues in the workplace

Managers are responsible for creating and sharing the systems that a business relies on to spread key information. They also play a lead role in shaping and maintaining workplace culture, providing an environment in which it can be safe or unsafe to share ideas and concerns. Ineffective communication is both expensive and destructive to morale, so it is important to address communication breakdown in the specific instances where it occurs and also in your systems as a whole.

The reasons why technology is the cause of privacy issues in the workplace

Conceptions of privacy and the value of privacy Discussions about privacy are intertwined with the use of technology. The publication that began the debate about privacy in the Western world was occasioned by the introduction of the newspaper printing press and photography.

Since the publication of that article, the debate about privacy has been fueled by claims for the right of individuals to determine the extent to which others have access to them Westin and claims for the right of society to know about individuals. The privacy debate has co-evolved with the development of information technology.

It is therefore difficult to conceive of the notions of privacy and discussions about data protection as separate from the way computers, the Internet, mobile computing and the many applications of these basic technologies have evolved.

The first refers to the freedom to make one's own decisions without interference by others in regard to matters seen as intimate and personal, such as the decision to use contraceptives or to have an abortion.

Think here, for instance, about information disclosed on Facebook or other social media. All too easily, such information might be beyond the control of the individual.

Statements about privacy can be either descriptive or normative, depending on whether they are used to describe the way people define situations and conditions of privacy and the way they value them, or are used to indicate that there ought to be constraints on the use of information or information processing.

Informational privacy in a normative sense refers typically to a non-absolute moral right of persons to have direct or indirect control over access to 1 information about oneself, 2 situations in which others could acquire information about oneself, and 3 technology that can be used to generate, process or disseminate information about oneself.

There are basically two reactions to the flood of new technology and its impact on personal information and privacy: The other reaction is that our privacy is more important than ever and that we can and we must attempt to protect it.

In the literature on privacy, there are many competing accounts of the nature and value of privacy. On one end of the spectrum, reductionist accounts argue that privacy claims are really about other values and other things that matter from a moral point of view.

According to these views the value of privacy is reducible to these other values or sources of value Thomson Proposals that have been defended along these lines mention property rights, security, autonomy, intimacy or friendship, democracy, liberty, dignity, or utility and economic value.

Reductionist accounts hold that the importance of privacy should be explained and its meaning clarified in terms of those other values and sources of value Westin Views that construe privacy and the personal sphere of life as a human right would be an example of this non-reductionist conception.

More recently a type of privacy account has been proposed in relation to new information technology, that acknowledges that there is a cluster of related moral claims cluster accounts underlying appeals to privacy DeCew ; Solove ; van den Hoven ; Allen ; Nissenbaumbut maintains that there is no single essential core of privacy concerns.

A recent final addition to the body of privacy accounts are epistemic accounts, where the notion of privacy is analyzed primarily in terms of knowledge or other epistemic states. Having privacy means that others don't know certain private propositions; lacking privacy means that others do know certain private propositions Blaauw An important aspect of this conception of having privacy is that it is seen as a relation Rubel ; Matheson ; Blaauw with three argument places: Here S is the subject who has a certain degree of privacy.

Another distinction that is useful to make is the one between a European and a US American approach. A bibliometric study suggests that the two approaches are separate in the literature. In discussing the relationship of privacy matters with technology, the notion of data protection is most helpful, since it leads to a relatively clear picture of what the object of protection is and by which technical means the data can be protected.

At the same time it invites answers to the question why the data ought to be protected.

The reasons why technology is the cause of privacy issues in the workplace

Informational privacy is thus recast in terms of the protection of personal data van den Hoven Examples include date of birth, sexual preference, whereabouts, religion, but also the IP address of your computer or metadata pertaining to these kinds of information.

Personal data can be contrasted with data that is considered sensitive, valuable or important for other reasons, such as secret recipes, financial data, or military intelligence.

Data that is used to secure other information, such as passwords, are not considered here.

Privacy and Information Technology (Stanford Encyclopedia of Philosophy)

Although such security measures may contribute to privacy, their protection is only instrumental to the protection of other information, and the quality of such security measures is therefore out of the scope of our considerations here.

A relevant distinction that has been made in philosophical semantics is that between the referential and the attributive use of descriptive labels of persons van den Hoven Personal data is defined in the law as data that can be linked with a natural person.

There are two ways in which this link can be made; a referential mode and a non-referential mode. In this case, the user of the description is not—and may never be—acquainted with the person he is talking about or wants to refer to. If the legal definition of personal data is interpreted referentially, much of the data about persons would be unprotected; that is the processing of this data would not be constrained on moral grounds related to privacy or personal sphere of life.

Unrestricted access by others to one's passwords, characteristics, and whereabouts can be used to harm the data subject in a variety of ways. Personal data have become commodities. Individuals are usually not in a good position to negotiate contracts about the use of their data and do not have the means to check whether partners live up to the terms of the contract.The Advantages and Disadvantages of Technology in the Workplace.

By. Karehka Ramey-February 25, Facebook. Twitter. Google+.

The Adverse Effects of Technology in the Workplace |

Disadvantages of Technology in the Workplace: 6. Causes Distraction at Work: because it can be very difficult to monitor the usage and privacy of this information. Many employees come with flash. I will be arguing that people have a right to privacy in the work place, but also that there may be both explicit and implicit moral principles which limit the extent of their privacy.

Technology is one major reason why there are privacy issues in the work place. Technology in the Workplace Pros and Cons. By. Chitra Reddy. 0.

Facebook. Twitter. This is because the work load has increased and that work load can only be catered on time with the help of advanced technology. The technology in the workplace is important due to the following reasons: these are some of the reasons why is.

Many State Agencies deal with workplace issues.

The reasons why technology is the cause of privacy issues in the workplace

You can find an attorney who specializes in employment law via the National Employment Lawyers Association. The (most recent available) Electronic Monitoring & Surveillance Survey from American Management Association and The ePolicy Institute shows the pervasiveness of employee monitoring.

Any time one party misunderstands or misconstrues the words or actions of another, it has the potential to create conflict. Poor communication is frustrating in the workplace and can lead to poor.

Whereas information technology is typically seen as the cause of privacy problems, there are also several ways in which information technology can help to solve these problems.

There are rules, guidelines or best practices that can be used for designing privacy-preserving systems.