Deontological Ethical Theory: Invasion Of Privacy

Superior Essays
Table of Contents
Introduction 2
Case Study 2
Deontological Ethical Theory 2
Categorical Imperative 3
RIMS Strategy 3
STEP 1: Generate Moral points of view 3
Pro-monitoring: 3
Anti-monitoring: 4
STEP 2: Identify the implications 4
Positive Concerns: 4
Negative Concerns: 4
STEP 3: Final solutions 4
Abuse of computer storage 4
Invasion of privacy: 5
Ruins Trust 5
Conclusion 5
References 6
Books: 6
Internet Journals/Articles: 6

Introduction
Privacy is defined as ‘the state of being free from unwanted or undue intrusion or disturbance in one’s private life or affairs; freedom to be let alone’. (The Definition of Privacy) From the definitions, it is seen that privacy has the connotations of liberty and enjoyment whereas the lack of privacy
…show more content…
The school principal reported this to the police, and charges were laid. Given the comprehensive IT policy governing the use of school-owned technology, the Supreme Court of Canada found that Mr. Cole had a diminished expectation of privacy in the contents of his computer, and allowed the evidence to be admitted. This decision reinforces the importance of implementing, and following, a policy for use of employer-owned technology in the workplace. (Thomlinson, 2013)

Deontological Ethical Theory
There are certain objective ethical standards of behaviour that everyone should respect. Such as keeping business work at the business and all non-business related tasks should not be done at the place of business. This is a task in which many people fail to adhere to and therefore, privacy regulations, such as blocking certain websites, are put in place to prevent these occurrences in the workplace. The deontological theory is ‘the duty always to abide by those objective standards of ethical behaviour that we have discerned through our rational thinking’. (Kretzschmar et al., 2012)
The focus of this theory is not on the person who had the pornography at work, rather it is focusing on the behaviour and the quality of the action itself of having the pornography on a work computer which is a bad
…show more content…
The company/school should not go looking on the teachers computers to see what they have there as this is an invasion of privacy. However, it may be important to monitor the usage and downloads onto the computer in order to try and maintain protocol in the workplace. It is also noted that the incident in the case study was during routine maintenance which is

Related Documents

  • Decent Essays

    Analysis: Blown To Bits

    • 312 Words
    • 2 Pages

    Chapter two of Blown to Bits by Hal Abelson, Ken Ledeen, and Harry Lewis was about how technology affects our privacy. In this chapter, the authors discussed how our privacy is being stripped away, the willingness with which we give this privacy away, and privacy policies. As experts in technology, Abelson, Ledeen, and Lewis discuss how technology has aided this progression of human ideologies to lead increasingly more public lives. Our privacy is constantly being stripped away from us thanks to the technological innovations. As technology becomes more and more widely used, more and more personal information is being stored through technological means.…

    • 312 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    To oversimplify, matters surrounding privacy can be color coded. There are some issues that are very black and white related to the need to “violate” privacy. However, there are also quite a few gray areas where more research needs to be conducted and statistics gathered to formulate guidelines to determine when it is indeed necessary. Privacy in general needs to be treated in a way that is different from other rights and based on the serious consequences of not revealing facts that would be considered “private”.…

    • 1280 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Comfort Concept Analysis

    • 645 Words
    • 3 Pages

    A brief explanation of the comfort concept is when a person will feel mental or physical ease or relief from stress or pain. A sense of security and contentment. An example of comfort would be a child that knew their mother would read a story to them, when it was time to go to bed in the evening. A brief explanation of the privacy concept is having the freedom of others in their space or environment.…

    • 645 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Why Privacy Matter Even If You Have “Nothing to Hide” In the article “Why Privacy Matter Even If You Have ‘Nothing to Hide,”’ Daniel J. Solove, talking about the government governed the information to analyze without the permission. Many people didn’t realize how many problems by let the government take their information to analyze. Solove does a great job to persuade the readers that we deserve more the privacy by using the appeal to authority and anecdote.…

    • 704 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Inappropriate Violation

    • 556 Words
    • 3 Pages

    Inappropriate use as described below is a violation of the AUP. These violations may results in severe consequences. If you have questions regarding these violations of appropriate use please contact your school administrative team. INAPPROPRIATE/UNACCEPTABLE USE Tier 1: Inappropriate Use (includes but not limited to the following): Using any browser other than those approved by the district Making unapproved software installs to computers Using computers not assigned to you when not approved (Teachers may allow students to look on with another student for instructional purposes only) Videoing or recording on school property when not related to a school assignment Messaging or chatting during class when not expressly permitted by the teacher…

    • 556 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Metro High School System

    • 998 Words
    • 4 Pages

    In support of the Metro High school's mission of teaching, research, and public service, the Metro High school system provides computers, a network, and resources for the facility, students, faculty, and staff. Rights and Responsibilities While the school does provide some computers there may not be enough for all students/employees and therefore students/employees are encouraged to bring their own computers or tablets. The networks can provide access to resources both inside and outside within the area of school grounds. The network will have the ability to communicate with other users outside of the schools network. Such access is a privilege, and requires that users act accordingly.…

    • 998 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In Defense Of Distraction

    • 1246 Words
    • 5 Pages

    Authors Anderson, Goldberger, and Franzen address the audience about concerns within societies and the effect technology has disconnected the reality and everyday social lives of one another and how these distractions have invaded our privacy and the idea of it. They accomplish this argument by using sources with a variety of experts and interviews that give expertise to persuade the argument of technology and the distractions it creates among society’s ultimate connections and ideas of privacy. In this way Anderson, Goldberger, and Franzen convince the audience of the ultimate distraction technology creates in the attention society seems to diminish and invade the privacy we once had. In the essay “In Defense of Distraction” in Writing Analytically…

    • 1246 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Through this assessment it will be apparent that the arguments Thomson utilizes are not convincing. To accomplish this, the paper will delve into various aspects that show how her paper dilutes and simplifies complex concepts in order to justify her perspective of privacy rights. The critical analysis will also depict how there are various factors involved in her work which make the overall paper incoherent and hard to understand. To finish, this section will conclude by inspecting the ways in which Judith Thomson is biased and this is due to the ways in which she intentionally uses specific examples that will justify her notion of privacy and pays no consideration to the other aspects that may play a…

    • 1075 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    National security vs personal privacy has been a hot topic post-9/11. President Obama gave a speech on January 17, 2014 where he stated “in our rush to respond …. , the risk of government overreach – the possibility that we lose some of our core liberties in pursuit of security – also became more pronounced.” (Office of the Press Secretary) Due to the tragic event on September 11th, 2001, our government was placed under extraordinary pressures to find the terrorists and bring them to justice using whatever means possible. This brings around questions regarding ethical dilemmas as they relate to security and our right to privacy.…

    • 978 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    With the advancement of technology comes a startling decrease in privacy. Nothing is considered ‘personal’ by the internet, or private, or kept a secret. Anything put on the internet is forever immortalized. Technology like cellphones, laptops, and drones have invaded the sense of personal privacy and eliminated the prospects of privacy returning to those who possess technology.…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    In our daily lives, we relinquish some of our private information ignorantly. As human beings, many of us tend to simply hand out our information in exchange for other items or free services. Many times, online shopping offers better prices but at what cost? Sometimes, better prices means relinquishing your private information that could be obtained by anyone at anytime. In the article, The Convenience-Surveillance Tradeoff, the author makes compelling points on how our society is unaware of the repercussions that come with relinquishing our…

    • 1456 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    There has been much discussion on whether our school should take part in “Shut Down Your Screen Week.” While contemplating if this is a good idea or not it is important to take into consideration all the pros and cons of the situation. No great decision is made without going through all of the deciding factors that go into deciding if we should or should not take part in this. First, we are going to go over the good things that technology has provided for us. “Because of cellphones and social media, those we depend on are more accessible today than at any point since we lived in small, village-like settlements.”…

    • 1221 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    My first placement took place at a special educational needs (SEN) secondary school where I was employed as a teaching assistant. My duties were varied as I would often help children who struggled with the work because of their disabilities but also perform menial tasks such as photocopying. However by doing all of this I gained valuable experience of working in a school, knowledge of learning difficulties and improved upon many of my transferable skills. Communication skills Throughout my time at the school I improved on my communication skills by using different techniques for the children.…

    • 1515 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    For years, technology has molded our thinking, actions, and lives. Technology is a tool that never stops advancing as it grows with us. Many people use technology and its tools to help educate themselves and others in the workplace, home, and other various environments. So quite naturally, when school board officials and educators proposed that this technology should be incorporated into the school system many were eager to start the process. However, technology should not be integrated into the schools system because it creates problems such as academic dishonesty, possible layoffs, and technological malfunctions.…

    • 976 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Therefore, the choices that third, fourth and fifth grade teachers make with regard to technology integration have the potential to shape the way their students will begin to view and use technology as a tool for learning” (Pittman 550). If young children are educated on laptops early in life, then they will learn how to become more responsible users. One solution to the misuse of laptops includes acceptable use policies. Teachers need to set guidelines about how students use laptops. Then the teachers need to explain the polices to the students and the disciplinary action if students break the rules.…

    • 993 Words
    • 4 Pages
    Improved Essays