ETHICS OF AND COMPUTER MONITORING SURVEILLANCE INDEX 1. Index 3 2. Introduction 3. Ethical analysis of surveillance and computer monitoring 4 5 * Demonology * Social contract * Character based * ACS code of ethics 4. Conclusion Recommendations References 7. Appendices 9 7 * Utilitarianism 5. 6. 8 ABSTRACT: Education of the human source practitioners requires some cutting edge knowledge for the advancements of developments in the law. Some organizations face growing liability with regard to employee use of electronic resources. One such example is the usage of online social outworks in screening of Job applicants and also the current employees.
To reduce the risk companies should develop and implement a computer-use policy in outlining some proper use of organizational electronic resources. Most of the organizations inquire into some of off-duty behavior of their workers in this fashion and are not in violation of existing laws. In this we mainly examine critical aspects of computer use policies clearly explaining reasons for the policy, applying the policy to all employees and it indicates zero tolerance for some offensive, harassing or discriminating communications.
INTRODUCTION The cyberspace provided a good opportunity to people to meet one another and t share their details. Face book, Namespace, and numerous wobble providers are being utilized by a growing number of Recruiters and potential employers and some current employers who seek additional information regarding after-work behavior of employees (Roberts & Roach, 2009). HER at the university level, has been observed that realism is essential for being prepared to be a competent practitioner (Dogtrot, Steamboat, & Owen, 2009; Riding, Byrd, & Fleming, 2009).
Employee surveillance and email monitoring at the workplace present a number of conflicting issues regarding an employer’s deed to protect its property and itself against liability and an employee’s right to privacy (Adams, Scheming & Feely, 2000). Does private organizations have the right to monitor employee communications? The courts answer is yes, and with good reason. For example in the year 1996 an analysis by the nelson media Research Inc. Of employees at IBM Corporation and Apple Computer Inc. Mound that employees of both the companies have visited Penthouse Magazines’ Website almost 13,000 times in Just a single month. Here we discuss the legal liability and possible financial consequences specifically related to employee privacy and email monitoring. He development of an effective computer-use policy ,employee rights and employer interests and illustrating reasonable action” in light of the information availability on social networking web sites. The main two major categories of concern are in both the legal and ethical aspects of personnel screening practices and policies.
The main aim of this is making guidelines for formulating an appropriate computer-use policy. This one also identifies the implications of such a policy. By looking up at information on the internet, employers need to be aware of potential claims against them such as federal discrimination and invasion of privacy. Ethical analysis of surveillance and computer monitoring: Utilitarianism: Utilitarianism is a theory holding proper course of action that maximizes utility, maximize happiness and reduce suffering.
The basic idea of utilitarianism is based on the greatest happiness principle I. E. “Actions are right in proportion as they tend to promote happiness, wrong as they tend to produce the reverse of happiness”NH Stuart mill). According to that pleasure and freedom from pain are the only things desirable. All these desirable things are desirable either for pleasure inherent in themselves or as means of pleasure or relief from pain. John Stuart mill and Jeremy Beneath are the leading proponents for what is called classic utilitarianism. The ends that Justify the means” is a short word used for this utilitarianism. The business owner or manager looks at the end result mainly. They watch over their employee in any way since the employee directly reflects the company. If manager makes a decision to surveillance their employees using utilitarianism has two different aspects. In the positive way . Sing this way it reflects accurately on human motivation and it creates opportunities and possible promotions to the employers. Employers keep constant track on their employees during the business hours.
A negative aspect of this utilitarianism is that employees would not feel trusted by their employers. The employees may feel that it is compared to slavery. DEMONOLOGY: Another approach for using electronic surveillance and computer monitoring is that using demonology approach. This demonology is a bit different from utilitarianism because it is more focused on rues and principles rather than achieving total happiness. Using demonology on using an electronic device involves the actual employees know what is going to happen rather than being blindfolded.
The main aim of this demonology is to show that there is a particular reason for doing everything but not Just doing because one wants too. So having a company install with all types of devices for the benefit of all the employees, customers, as well as the executives to help improve the quality of business and the service is a good reason for to do something. Installing all equipment’s Just today that company has all types of surveillance devices remains as fear installer nit the minds of employees. This is not good idea because employees fear to do their daily work in case they are not done to par.
This demonology does have a negative approach when we consider employee surveillance. It allows managers for an opportunity to see if what the end results are will be worth the up heal of the business. They will also be able to slowly place different types of surveillance and computer monitoring at a time. Explanation to all of the employees will be a major factor and by having the ability to say to employees we are doing this, I. E. : reading specific emails, to help out this certain problem will certainly not be obeyed by employees.
There is some possibility for the management to keep an eye On the activities of the employees. There may be some reasons but when all these reasons are removed it is a must to take a back seat on the agenda. SOCIAL CONTRACT THEORY: According to this “Morality consist in the set of rules, governing how people treat one another, that rational people will agree to accept, for their mutual benefit, on the condition that others follow the rule as well”. Legal and moral contracts are mainly two social contracts present. They are based on rights of individuals and groups.
Everyone in the society should agree to two things set of rules to govern among individuals, and government capable of enabling these groups. This social contract is mainly helpful in maintaining good terms in the society. There are mainly three is social contract theory they are: *Individual consent. *agreement among moral agents. *A moral approach on which this agreement is made. Social networking online is a way technology in which it enables users stay in touch with one another, where Just a decade ago it was different, more on a person to person basis.
It is the responsibility of the professional to understand the uses of technology and also the issues surrounding tithe policymakers are obligated to draw on a mature and reasoned sense of fairness and honesty. This social contract is Just a fad and it is unlikely to disappear. Some of the issues related to privacy and vulnerability are some of growing concerns that need to be taken care of. CHARACTER BASED: This character based ethical theory is also called as “virtue ethics”. They mainly focus on the criteria having to do character development of individuals and some acquisition of character traits.
Virtue ethics refers to the collection of formative ethical philosophies. To act from virtue is to act from particular motivation, to say that virtues are a must for correct moral decisions to say that correct moral decisions squires a correct motive. This virtue theory provides a constant in which strategies, plans,policies,procedures can be developed to attain stated mission and relevant values. Virtuosity does not always relay on wealth satisfaction that they’ve done their Jobs well. These virtuoso employees organize their workweek ,work toward accomplishing their endeavors and set value added goals and strive to achieve them.
ACS CODE OF ETHICS: For a professional person to uphold and advance the honor ,dignity and effectiveness of the profession in keeping some high standards of competence and ethical conduct ill be honest and will serve the good employers,clients and the public and they also use some special knowledge and skill for the advancement of human welfare. So there are some standards to explain how the code of ethics applies to the members professional work. The standard of conduct is to explain the code of ethics in terms of some specific behaviors.
This ACS accepts that standards are real and they may not be true in all circumstances. The member may sometimes occasionally find one standard conflicting with other standards in that case in that case he must weight all the factors which are consistent with the code of ethics. Here delineation of ethical and unethical behavior requires element of objectivity. The member is expected to act all times in an informed and respected manner. CONCLUSION: Technology is a very good phenomenon by which employer’s I. E. He management depends on gadgets and electronic devices to make surveillance on the employees during their work time. With this invasion there has come a bigger threat of privacy. Simply these new technology has increased our potential it does not make new technologies ethical. The members or the employees have the right to keep certain things private. In present scenario the ambiguity that exits between employer surveillance programs and employee knowledge of that monitoring must be removed. It is important for the people to know what is being surveyed and what is not.
As by increase of our abilities day by day our ethical and moral thinking must accompany this growth. We should have sense of responsibility to maintain two important rights:privacy and autonomy. RECOMMENDATIONS: The code is intended to help each of us to understand our own responsibilities to make our own decisions. These also stimulate awareness of ethical issues in our daily business activities. Believe to make a step forward to promote ethics in our business organization. We should all be responsive to the concerns of our community in which we operate our honesty and integrity when dealing with others.
When developing this code of ethics the following steps must occur: *The corporate should review and accept the code as code of ethics for this corporation. *New employees should receive education regarding this code . *A reporting structure should be established so that employee,client,server may report some activities to the human resources for review. *Firstly to improve awareness among all the employees. Must provide a standard against on which others may review compliance. *The management should not at present must engage in regulations that are started on their imposition. The violators must be handled with fairness and equality. *They must establish a working group to implement recommendations and keep effects under review. REFERENCES: http://webconceptsunlimited. Com/Samples/CodeofEthicsRecommendation. PDF Burks, F. Ethical Issues & Employer Monitoring Internet Usage. Chronic. Com, 2010 Illicitly, Eric and Risen, James. “Top aide defends domestic spying. ” New York Times. 7 Feb. 2006 Marx, Gary. “An Ethics for The New Surveillance. The Information Society, Volvo. 14, No. 3, 1998. Morton, David. Recordings and the ‘Surveillance Society. ‘” History of Surveillance Recording. Http://www. Recording-history. Org/HTML/ surveillance . PH Shooing, Chris. “CLC Net Blob: Surveillance State”. CLC Net http:// news. Cent. Com/surveillance-state/ Garry. Marx 3,1998. Http://web. MIT. Deed/stigma/www/incline. HTML APPENDICES: A. Abstract B. Illumination C. Ethics Of Surveillance And Computer Monitoring. C. I. Utilitarianism c. 2. Demonology c. 3. Social contract c. 4. Character based c. 5. ACS code of ethics D. Conclusion E. Recommendations F. References.