How Privacy Issues Affect Businesses

In: Computers and Technology

Submitted By KMSnyder05
Words 2173
Pages 9
CONTEMPORARY BUSINESS ISSUES – PRIVACY IN THE WORKPLACE

How Privacy Issues Affect Businesses

How Privacy Issues Affect Businesses
The existing economic and business setting implies on-going efforts towards better understanding and dealing with the challenges of the modern era, which are characterized by the crucial need for making changes due to intense competition and ongoing global crisis’.
As a rule, privacy rights are established by explicit regulations, laws or rules. Some privacy rights are relevant in the workplace and some don't. And even if there is no particular law, a right to privacy can be based on the legal common law notion of having a "reasonable expectation of privacy”, (Lippke, 1998). For employers and employees in the business industry, privacy concerns have become progressively more widespread in the workplace, and with the increased use of electronic resources, privacy at work is even more compound. Consequently, it is imperative that both supervisors and managers have a fundamental understanding of some of the more common privacy rights and issues that can arise, as well as the restrictions that may apply. Some of the more prevalent privacy issues that employees face are drug testing, email monitoring, personnel records, social security numbers, monitoring and eavesdropping, back-ground screening, and medical records. Because of these issues, there are quite a few areas of human capital management in which privacy rights are recognized. Whether these laws put in place by state, federal or local authorities, both employers and employees should be attentive to the issues and how to protect themselves from infringing on other’s rights to privacy or having their rights to privacy being infringed upon (Gross).
The use of email by employees during business hours is a normal occurrence in the 21st century American workplace. A recent…...

Similar Documents

Privacy Issue at Bingo Bank

...The ethical issue identified questions if it is right for BB to implement the 8-minute rule and surveillance system to limit employees’ personal break time in order to reduce customer waiting time, when doing so infringes upon the employees’ rights to fairness and privacy? Kantian ethics is the most relevant here as the tension results from conflicting rights and duties. This 8 minutes policy promotes the rights of BB, its shareholders and customers. However, even though employees have a duty to adhere to this policy, doing so would be incongruent with their moral rights to fairness and privacy. The employees are not being respected as equal and autonomous persons capable of making decisions in their own life, and physical privacy is violated when they are no longer able to have private personal time as and when required, without being monitored. This perspective identifies which rights and duties are in conflict, to be be addressed in the recommendations. Rawlsian ethics is also relevant as it helps to prioritize the conflicting rights and duties. Under the veil of ignorance, no rational and self-interested employer who could now be at the receiving end of the policy would want to risk having his privacy infringed upon. Hence, this perspective helps to decide which rights cannot be sacrificed for others. Lastly, the Utilitarian perspective here helps to analyze and weigh the consequences of each decision made. The analysis shows that short term benefits of a......

Words: 604 - Pages: 3

How to Market with Businesses

... How To Market Facebook With Businesses Harry Pruitt Benedictine University Author Note Harry Pruitt, Student in Business, Benedictine University. Abstract We normally judge a book by its cover, so visuals can be very important. Online marketing through Facebook is no different. Most of our influences are through social media and more people are turning to social media to gain more business for their companies. Facebook has been successful in helping with business marketing, spending as little or as much as you want or need to. Facebook is the social platform for web based businesses near and far. Even though Facebook has its different problems, marketing within Facebook has been very successful thus far .Using different strategies and building creative profiles makes for a better business outcome. Bigger dreams become bigger goals, by staying on the right path you accomplish you objective and achieve your marketing goals as a business owner. How To Market Facebook With Businesses Facebook is an online social networking service. Facebook was founded in February 2004, by Mark Zuckerberg and some of his friends at Harvard University. The website was first used for Harvard University students only, but then it gradually excelled to various universities, high schools, and even 13 year old children. Before entering Facebook, the user must register and create a personal profile. The use of this social network is to add other users as friends, exchange messages, and receive......

Words: 2954 - Pages: 12

How Business Affects the Economy

...How Business Affects the Economy In most countries, business is the primary section of its economy. Businesses are what drive an economy up or down. A key component of how well businesses help the economy are the entrepreneurs. These brave risk takers put it all out on the line: time, money, and other resources in hopes to start a business and make a living. As they make money, they spend it helping other businesses blossom. This creates a prosperous cycle for all involved. Since these businesses flourish, this creates the needs to jobs for those who need them. All in all, the standard of living increases across a wide span area, as well as the quality of life due to many families now being able to provide for themselves. But businesses also contribute to social awareness by advocating for the well-being of its members. For-profit and nonprofit organizations are similar as they are different. It is true that they both can make a profit. But the key difference is how those profits are used. For-profit organizations are generally are out make a profit and distribute profits between owners, employees, shareholders and the business itself. But nonprofit organizations use all their profits for programs and services aimed at meeting peoples unmet or under-met needs, such as food, water, shelter and education. Nonprofit organizations are more concerned with providing a service or goods that help with environmental or human needs. Most nonprofit organizations are......

Words: 1046 - Pages: 5

Privacy Issues

...unauthorized access. The first law is the Privacy Act of 1974 (PA74). This requires an agency to obtain written permission from the individual providing the information before sharing it with another agency. It is also the right of an individual to access their own information for review and changes, and they may also determine what records pertaining to them are collected, maintained, used or distributed. There are exceptions that allow access to personal records and include law enforcement with a need to know, investigations, or administrative purposes just to name a few. An organization that may use the PA74 would be medical personnel when collecting medical information that will be recorded in a system of records. Another law enacted in 1986 is the Electronic Communications Privacy Act (ECPA). This applies more directly with electronic storage including protection of communications during transport from sender to receiver, electronically stored information, and restricting how the government is allowed to collect information during investigations. When law officials record by phone, collect computer data or monitor any other electronic device, they must first have permission via a warrant. Everyone has been on the phone with a bank or large corporation and the representative with whom they are speaking will often tell the caller that the “conversation is being recorded for training purposes” this is the Electronic Communications Privacy Act. This is one law that......

Words: 872 - Pages: 4

Affect of Vat Increase on Small Businesses

...Affect of VAT Increase on Small Businesses in the North East of Scotland John Elrick Submission Date 08/12/10 Report Requested By: The North East Representative of the Federation of Small Businesses in Scotland (FSB) Executive Summary The purpose of this report is to provide first hand information and second hand information on what VAT is, the function of VAT, the government’s decision to increase the VAT by 2.5% and the history of VAT. Also an interview and questionnaire will be carried out to help provide this information. This report was required for the North Representative of the Federation of Small Businesses (FSB) on how this VAT increase will affect small businesses in the North East of Scotland. To find the first hand information the internet was used to research value added tax. The second hand information was gathered from owners of small businesses by interviewing them and also handing out questionnaires. From the internet research value added tax is a form of consumption tax that is charged on most goods and the VAT collected goes to the government. There are three at which VAT is charged, standard rate of 17.5%, reduced rate of 5% or zero rate of 0%. VAT was first introduced on April 10 1954 my Maurice Laurié although it was originally proposed in 1918 by Dr. Willhelm. When VAT was first introduced the standard rate was 10% and was just charged to large businesses but was introduced to all businesses. The decision to increase VAT was made by......

Words: 1690 - Pages: 7

Cloud Hooks: Security and Privacy Issues in Cloud Computing

...Proceedings of the 44th Hawaii International Conference on System Sciences - 2011 Cloud Hooks: Security and Privacy Issues in Cloud Computing Wayne A. Jansen, NIST Abstract In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that completely encircles a pocket of warm air with colder air. The most damaging winds occur near the tip of the hook. The cloud hook formation provides a useful analogy for cloud computing, in which the most acute obstacles with outsourced services (i.e., the cloud hook) are security and privacy issues. This paper identifies key issues, which are believed to have long-term significance in cloud computing security and privacy, based on documented problems and exhibited weaknesses. • applications can be developed upon and deployed. It can reduce the cost and complexity of buying, housing, and managing hardware and software components of the platform. Infrastructure-as-a-Service (IaaS) enables a software deployment model in which the basic computing infrastructure of servers, software, and network equipment is provided as an on-demand service upon which a platform to develop and execute applications can be founded. It can be used to avoid buying, housing, and managing the basic hardware and software infrastructure components. 1. Introduction Cloud computing has been defined by NIST as a model for enabling convenient,......

Words: 7808 - Pages: 32

How Businesses Use Information Systems

...How Businesses Use Information Systems Objectives: * Identify the features of a business that are important for an information system * Describe the way in which information systems support business operations * Explain how the information systems improve organizational performance * Assess the role of the information system within a business Defining the Features of a Business Four Basic Business Functions * Manufacturing and production – an arrangement of people, machines, and business processes (procedures) that will produce the product * Business Process * Assembling the product * Checking for quality * Producing bills of materials * Sales and marketing – who will attract customers, sell the product and keep track of after sale issues, such as warranties and maintenance * Business Process * Identifying customers * Making customers aware of the product * Selling the product * Finance and accounting – once you generate sales, to keep track of financial transactions, such as orders, invoices, disbursements, and payroll. This group will see out sources of credit and finances. * Business Process * Paying creditors * Creating financial statements * Managing cash accounts * * Human resources – group of people to focus on recruiting, hiring training, and retaining employees * Business Process * Hiring......

Words: 2545 - Pages: 11

Cyberbullying and How Internet Privacy Is Involved

...Cyberbullying and How Internet Privacy is Involved Abstract This paper is going to be about how cyberbullying and internet privacy go hand-in-hand with each other. Cyberbullying is the use of electronic communication, like the internet and social media websites and cell phones, to bully a person, usually sending hurtful or embarrassing messages to them (Helen Cowie, 2013). Many of the articles that are going to be using for this paper talk about the different ways cyberbullying affects teens and young adults and also how internet privacy plays a role in cyberbullying. There is an article from Bob Sullivan (2013) that talks about how internet privacy is a complicated issue and there are criminals who break into websites to steal personal information. Since people can get someone else’s personal information, that makes it easier for a cyberbully to create a fake profile on a social media site, and make fun of and belittle someone else. Keywords: Cyberbullying, electronic communication, Cyberbullying and How Internet Privacy is Involved Traditional face-to-face bullying has been identified as a risk factor for the social and emotional adjustment of perpetrators, targets, and bully victims during childhood and adolescence. Bullies have now found a new way to reach their targets, by cyberbullying. They now can go on the internet and social media websites or use their cell phone. With the bully being able to do this they have the power to reach their targets at any......

Words: 2676 - Pages: 11

How Social Media Can Affect Privacy and Employment

...How Social Media Can Affect Privacy and Employment The right to privacy is a value in American culture; however there is no Constitutional right that protects an individual’s privacy. Everyone has an opinion to what privacy means to them; personally I feel that privacy is the information about myself or my family that I do not want others to know. When individuals choose to expand their space or allow things to become public on the internet or digital media, they are allowing themselves to be viewed by others, and therefore relinquishing privacy. When individuals post images and opinions online they are unaware that the post may limit future employment opportunities. People need to be conscious of the possible impact that social and digital media may have. I agree that privacy should be a personal choice to determine. It is our responsibility to post information about ourselves that represents who we are as a whole person. How an individual portrays themselves should be the same online as it is off. When applying for a new job you are prepared for the drug testing, and the background check; however it never crossed your mind that this potential employer may also run a check on your Facebook page, Twitter page or any social media groups you may be associated with, “75% of recruiters are required by their companies to do online research of candidates, and some 70% of recruiters in the United States report that they have rejected candidates because of information online”......

Words: 1697 - Pages: 7

How Culture Affects Quality

...culture has distinctive norms and values which have shaped the perception of customers for years. Nowadays, the concept of perceived product quality is increasingly becoming more important on the minds. Although there are a lot of definitions, each of them are defined as common meaning; that is, quality is basically ability to meet the customer’s needs and expectations. Perception of quality varies from person to person and even from culture to culture. Therefore, the national identity and cultural values and norms might have an important role on the customers’ quality perception. Even if all the features and the prices of the product are same, it can create different opinions and perceptions in different countries and cultures. How may culture affect the ‘product quality perception’ of consumers? 1.1 Culture ‘Without culture, and the relative freedom it implies, society, even when perfect, is but a jungle. This is why any authentic creation is a gift to the future’ - Albert Camus Culture is a fundamental part of every society and can be defined as the learned pattern of behavior and everything which makes up a person’s entire way of living. Another very well-known definition for culture is written by Hofstede (Hollensen, 2004, p. 193) which says “the collective programming of the mind which distinguishes the members of one human group from another”. Culture is essential to provide an order and discipline within the society. It is the most necessary tool of......

Words: 3355 - Pages: 14

Ethical Issues on Confidentiality and Privacy of Patients

...Ethical issues on confidentiality and privacy of patients According to American nursing association article regarding patients medical information’s privacy and confidentiality shows us “Advances in technology, including Computerized Medical Databases, The Internet and Tele-Health, have opened the door to potential, unintentional breaches of private /confidential information of patients, so nurses and other health professionals who regularly work with patients and their confidential medical records should contribute the development of standards ,policies and laws that protect patient privacy and confidentiality of health records .” Due to the fast advancement of technology, it is very hard to protect our privacy in the areas of medical sectors. Many people have access to patient’s medical records including the attending physician, house staff, student, consultant, nurses, social workers, pharmacists, billing staffs and insurance company employees. Although computerized medical records have vital roles to improve the access to medical information efficiently, they allow more serious breaches of confidentiality. For example, confidentiality can be violated at any computer station, and fax and e-mail also present opportunities for confidentiality to be broken. I think in my opinion, keeping medical information confidentially shows respect for patents that except physician to maintain confidentiality, and it plays a vital role in improving employees ethics at work. Furthermore,...

Words: 610 - Pages: 3

Economic Policies and How the Affect Businesses

...Economic policies and how they affect businesses Economic policy: refers to the actions that governments take in the economic field. It covers the systems for setting levels of taxation, government budgets, the money supply and interest rates as well as the labor market, national ownership, and many other areas of government interventions into the economy. Most factors of economic policy can be divided into either fiscal policy, which deals with government actions regarding taxation and spending, or monetary policy, which deals with central banking actions regarding the money supply and interest rates. Fiscal policies: refers to the government's spending and taxation practices and impacts essentially every individual and business in the nation. Fiscal policy influences the, the size of your tax bill, the amount of money the average consumer can afford to spend via taxation. These fiscal policies can be divided into expansionary policies and tight policies * Expansionary policies: Refer to when businesses spend more than they take in from taxes and this is good for businesses because more government spending leads to more jobs for consumers or increased infrastructural investment e.g building roads. This is good for businesses because more individuals can afford their goods and services. Businesses would have greater sales while paying lesser taxes to government resulting in better net profits * contractionary policies: Refer to when government spends less and......

Words: 448 - Pages: 2

Cell Phone Privacy Issue

...are constantly gathering data on their customers' whereabouts in order to efficiently route calls through nearby towers. But U.S. law doesn't require these providers to report the information they collect. Law enforcement agencies actually encourage companies to keep close tabs on consumers, since cell phone data is often critical to criminal investigations. That information could also be of interest to many marketers, but some U.S. cell phone companies have been less than forthcoming about how they use our personal data. In a statement provided to the Times, Verizon acknowledged that "information such as call records, service usage, traffic data," could be used in targeted marketing campaigns, "based on your use of the products and services you already have, subject to any restrictions required by law." AT&T, meanwhile, confirmed that it works with a company called Sense Networks in order to analyze geographic data and "to better understand aggregate human activity." Regardless of how our personal information is used, the fact remains that cell phone companies are constantly following us whether we like it or not. "We are all walking around with little tags, and our tag has a phone number associated with it, who we called and what we do with the phone," Sarah Williams, a graphic information expert at Columbia University, told the Times. "We don't even know we are giving up that......

Words: 382 - Pages: 2

Google and Privacy Issues

...[Type the company name] | Google and Privacy Issues | | | Google is the highest used internet search engine and is free for international use. Good and bad exists with everything and although Google provides people all over the world with tons of information, it is constantly being overlooked and controlled by the people who created it and who control it which can be seen as a huge downside for many individuals. There are many critisms of Google such as manipulation of search results, violating people’s privacy and censorship of search results such as page ranking. Although Google provides services that play a large part in many people’s lives for free, it does come at the price of an individual’s personal information and privacy. Google, Facebook and every browser ever created have always gathered data and used that data, but never have these companies created a compilation of personal information based on years of our trusting them. Google has been attempting and has begun to succeed in taking over all of our digital media, from the top used search engine as well as Gmail and Google news which have become the number one news source for many people. People are taking information that they want to hear and Google has been trapping society in a box by finding out our major interests and purely basing everything else off of that rather than incorporating new ideas. Google has the power to control us without us even realizing it and “because Google is so......

Words: 1655 - Pages: 7

Rfid Tags in Stores and Their Privacy Issues

...RFID Tags in Stores and Their Privacy Issues RFID tags in stores and the privacy issues that arise from their use are that they can be read from a distance. These tags are able to store personal information about the consumer. The RFID tags can be placed on an item without the consumer even knowing that it is there. RFID stands for Radio Frequency Identification. RFID tags are a technology that uses very small computer chips about the size of a grain of sand. They are used to keep track of items from a distance. Each chip has a unique identification number that is paired to an antenna that transmits information between it and a reader device. Some of these chips can transmit information to a reader that is up to 30 feet away. RFID tags can be programmed to store personal information about how a person shops, what they buy most often, how often they go to a certain store. Some chips could even store what credit card was used to make a purchase. RFID tags can be hidden from the consumer. These chips can be put between layers of cardboard. RFID tags can be placed in plastic or they can be in the design of the package. Privacy issues for RFID tags are that they can be read from a large distance by anyone with a reader. RFID chips can lead to theft of personal information by criminals. The consumer may not know that the chip has stored their personal information or that it can be read by anyone with a reader. The RFID tags can be hidden many different ways......

Words: 297 - Pages: 2