Preview

She Snoops to Conquer - Case Analysis Business Ethics

Better Essays
Open Document
Open Document
1417 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
She Snoops to Conquer - Case Analysis Business Ethics
Employee privacy is a very controversial topic. The first issue at hand is whether or not the employer in Case 9.3 has the right to invade her employees’ privacy. It can be argued that employers don’t have the right to invade their employees’ privacy. It is one thing for an employer to monitor their employees in the workplace to make sure they are not doing something that will affect the company’s profits, but it is a much more egregious issue for the employer to go beyond his or her interest to invade his or her employees’ privacy when they are not working. The Washington State Constitution Article I, Section 7 states that “no person shall be disturbed in his private affairs.” Essentially, privacy is widely acknowledged to be a fundamental right of every person. In Case 9.3, Jean Fanuchi, the manager of the jewelry department, resorts to invading her employees’ privacy in order to catch the culprit who is responsible for her deflating profit in the jewelry department. Fanuchi sets up a video camera to catch the culprit, but her interest in protecting the department store are highly outweighed by the employees’ privacy interest. The manager deliberately invades her employees’ privacy by installing microphones in the restroom, stockroom, and employee lounge. The microphones are an invasion of privacy because Fanuchi’s actions begin to cross the line that constitutes personal privacy, and this becomes unfairly prejudicial to the employee when they are caught saying something that inculpates themselves. For example, the book states on page 347, “employees want to control intimate or personal information about ourselves and not permit it to be freely available to everyone.” It can be inferred that if the employees knew that the microphone was there they would not have divulged their personal information about their selling marijuana and perhaps hard drugs, plans for future or ongoing employment, and food stamp fraudulences. As stated on pg. 12, “An action can

You May Also Find These Documents Helpful

  • Powerful Essays

    Affirmative actions plans are used to benefit society, it is a management tool designed to ensure equal employment opportunity. It includes the policies, practices and procedures the University implements to address underutilization in its workforce and to ensure that all qualified applicants and employees receive an equal opportunity for recruitment, retention, selection, advancement, training, development and every other condition and privilege of employment. Affirmative action goes beyond non-discrimination. Whereas equal opportunity is passive, affirmative action is positive, constructive action. The general premise underlying affirmative action is that absent discrimination, over time an employer's workforce, generally, will reflect the gender, racial, and national origin/ethnicity profile of the labor pools from which the employer recruits and hires its employees. Affirmative action attempts to compensate for past discriminatory practices by requiring federal contractors to engage in "good faith efforts" to expand outreach and recruitment of women, minorities, persons with disabilities and certain protected veterans, thereby making them aware of employment opportunities and providing access to be able to pursue such opportunities. I believe that this would be illegal as the university has a right to actively seek to recruit minorities to the school but it cannot discriminate against the non-minority students who would be discriminated by eliminating the remaining spots if the quota of 20 was not fulfilled. some employers voluntarily adopt affirmative action policies and will make an extra effort to hire a diverse workforce. Once a company adopts an affirmative action policy, they should follow it to avoid lawsuits from potential employees. There was a case in July 2013 which was called Fisher v Texas. In 2008, several high school seniors who had been denied admission at the University of Texas-Austin filed a lawsuit. The…

    • 2357 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    I believe what this is saying is that companies will have the right to monitor their employees as long as they have just cause to suspect the employee is not abiding by the company policy on private internet and phone call usage.…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The author makes a good point in his article by explaining that the violation of privacy due to technology is not something new. He backs that point up by evidence of two Boston lawyers at the Harvard Law Review who argued that privacy was under attack by inventions and also business methods in 1890.…

    • 760 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    References: McGhee, T. (2014, November 11). Denver veterans file discrimination complaint, say housing is dangerous. Denver Post. Retrieved from http://www.denverpost.com/news/ci_26911272/denver-vets-file-discrimination-complaint-say-housing-is…

    • 817 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Business Ethics Ch. 10

    • 1198 Words
    • 5 Pages

    Abandoned minors are no longer protected from liability on their contracts, merchants are still reluctant to deal with them on a credit basis, fearing that they may still attempt to disaffirm, or repudiate, their contracted debts.…

    • 1198 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Privacy is a topic that is now on the hot plate more than ever. With the U.S. government’s recent violations in the name of national security many are starting to ask where the line is. There is a reasonable expectation of privacy as we go about our daily lives. From work to personal time, we each expect a certain amount of privacy. Employees expect to give up some of this privacy while in the work place to meet their obligations. Examples of such would be fewer phone calls and less social time to allow for a higher production yield. Companies however, believe they are within their right to control what their employees do outside of work as well. Especially if these actions have an effect on the company’s production, safety and reputation.…

    • 926 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Xcom/285 Privacy Laws

    • 321 Words
    • 2 Pages

    Upon viewing this weeks reading as well as going through other student arguments about why they are against communication privacy laws and policies, I feel even more strongly about them being crucial for success. Those who fear being watched are the ones who know they are doing wrong. Companies have the right to see what is going on, they pay the salaries of each employee.…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Crime Data Comparison

    • 1096 Words
    • 5 Pages

    In the late 1920’s the idea was recognized by the International Association of Chiefs of Police or most commonly known as the (IACP), that there needed to be a more reliable and accurate way to keep track of all of the crime data and statistics. This information was needed to determine the crimes that were changing from year to year as well as the sources of what could be changing these statistics such as population changes, poverty changes, and so on and so forth. After a few years of deliberation over the record-keeping practices being used at the time, planning for a system called the Uniform Crime Report program (UCR) in which it came in to working effect in 1929. It was in 1930 a year later, in January that the United States Congress enacted a Code that gave the UCR the authority by the attorney general to gather information about crimes. The attorney general then delegated the responsibility to the Federal Bureau of Investigation to act as the bookkeepers for collecting all the crime data for the UCR. In 1930 the FBI became the first agency to start a resource to do just that. Since the beginning of the UCR program every year new data has been collected and published in order to crime statistics for each area across the United States. Information stored would include numbers of different crimes such as murders, arson, burglary, property crimes, rapes, larceny, etc. The UCR program started in January 1930 with data gathered from law enforcement agencies in 400 cities from 43 states submitting information and currently includes approximately 17,000 law enforcement agencies nationwide that voluntarily contribute their crime statistics.…

    • 1096 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Employee monitoring has emerged as a necessity and yet as a very controversial issue due to the widespread use of technology. Employee monitoring is the act of watching and monitoring employees' actions during working hours using employer equipment/property. This phrase can be a little scary as an employee, where is the line? The restroom is their property; thankfully there are employers who know their boundaries. Legally employers are continuing to monitor their employees. The only issue that seems to be addressed is how much they can monitor them.…

    • 1403 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Syllabus

    • 1217 Words
    • 5 Pages

    In recent history, there has been an influx in controversy regarding e-mail, Internet usage, and overall privacy policies in the workplace. Because of the extensive increase of personal e-mail, smartphones, social media, and other Internet-based communications, the need for laws that govern privacy for the users of these communications is crucial. These policies are usually implemented to ensure security and to reduce liability. This report will show examples of privacy issues, laws, and experiences in the workplace.…

    • 1217 Words
    • 5 Pages
    Better Essays
  • Good Essays

    There is much debate over what employers should and should not be able to do when it comes to monitoring the communications of individuals under their employment. There are those who feel that the rights of the individual are not limited to protection from the Government and employers have limited rights in regards to employee communication. There those that feel that the employer should have very little to no restraint in monitoring those under their employment. Going too far in either the employers or employee position can create an unproductive and unrealistic standard for a working environment. Employers must be able to create and maintain both a productive and safe working environment from their employees. However this does not mean employees should be subject to unreasonable and intrusive monitoring practices by their employer. Communication privacy laws and workplace policies should be carefully crafted to provided balanced protection both the interest of employer and employee.…

    • 735 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Patriot Act

    • 1920 Words
    • 8 Pages

    References: Clare, M. S. (2003). The effect of the USA patriot act on workplace privacy. Practical Lawyer, 49(1), 35-45. Retrieved on November 30, 2012 from http://search.proquest.com/docview/274316503?accountid=32521.…

    • 1920 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    This policy fell short with the use of a personal email. This finding circulated many rumors about Clinton ranging from conspires theories to leaking of pertinent information. To silence all the allegations Clinton had her legal team turn over anything that looked work related. Work place privacy should be limited to personal devices if allowed any. Anything dealing with company information or practice should be followed by set guidelines of your employer; this would allow for complete work place transparency. You have to look at all the factors specifically when looking at work place privacy. Your employer has virtually unrestricted access to your use of any business owned property (i.e. electronics). However, your belief of privacy in say a closed door meeting will be different from your expectation of privacy on the phone in an office-cubicle layout. There may be ethical/moral limits, but the legal boundaries may be less restrictive than you think. For instance, contrary to belief, the employer normally does not need a warrant to search your locker, it's their…

    • 540 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    “Drug testing has become one of the most effective techniques in promoting a drug-free workplace in America” (Carroll, 2000). Various types of drug testing…

    • 1584 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Monitoring Employees

    • 914 Words
    • 3 Pages

    I wanted to discuss the technology used to monitor employees. Whether it be at the computer/workstation or on the cameras set around the workplace. More and more companies and corporations are implementing monitoring software such as Spector, Sonar, Spytech, and iSafe. All used in order to keep track of employees on what they are looking at, what they are working on, and how much time they do it. You start to wonder when it becomes too much. Or when does it wonder into invasion of privacy? Granted that while on the clock you are on your employers time and you are expected to perform what you where hired for. In this day and age there is always up and down time. And a ten minute break in between work may bring you to checking a status or looking up a curiosity that passed in your mind, or checking some new that has been floating around the office. But this sometimes is all it takes to lose your job.…

    • 914 Words
    • 3 Pages
    Satisfactory Essays