Humanyze And How Employers Take Your Privacy For Granted

824 words, 4 pages

Intro Sample...

It would be pretty scary if someone kept track of our daily life. Our habits, interactions, secrets, and anything in between would be known by this person. He or she may even know more about us then we know about ourselves. With the advent of new technology, employers have seemingly gained this ability of surveillance. Current and prospective employees are screened through public social media. Some workplaces use devices that keep track of location, speed, and even tone of voice. While some of these developments are worrying, they are actually beneficial to use as long as employees’ privacy is not breached. As these new technologies create a policy vacuum, unrestricted use of them should not be allowed. However, if they are used... View More »

Body Sample...

Employees don’t feel violated by the surveillance, and companies are able to create a better environment for workers as seen in Cowan’s Bank of America example. As long employees give consent, a violation of appropriateness does not occur. Distribution, on the other hand, has issues when the data is released. There is an issue of the collected data being mined. Data of certain employees can be pattern matched to show where they worked before if a previous workplace uses the same technology. If the data wasn’t anonymous, anonymity can be broken as well. Due to this, employers should tell employees that this can occur when giving consent. As long as this is followed, there isn’t as much of a violation of distribution. Releasing data to the public creates more issues than simply gathering it in the office, and employees should be wary of that. On the flip side, having this data be public allows other companies get a head start on how to organize office space. If everyone agrees to only use this data to improve workplaces, I would advocate for every company to release their data. However, this isn’t possible. In the end, as long as employees give consent and know the implications, monitoring them creates a better workplace for everyone.
Being watched at every minute of the day is still creepy. Being watched only during work hours after giving consent, not so much. Especially so if someone knows every detail of the surveillance. This data is extremely beneficial to a company, and the more employees that agree to data collection the better it is for employers and employees. ...

Read More

Related Essays on Humanyze and how Employers Take Your Privacy for Granted

  • Employee Privacy Rights In The Workplace

    2148 words, 9 pages

    Employees must have the right to phone security, application confidentiality, the right to no sexual harassment, and the right to not have any personal questions asked that do not pertain to work. Employee privacy laws are limited, which makes it easy for employers to invade the privacy of its employees. Some things are personal and should remain that way. In today's working environment, employers need to reevaluate their techniques, approach this ongoing situation, and find alternative solutions to this problem. There are limits to everything in life, and there needs to be limits set on e

    View Document »


    1247 words, 5 pages

    The Issue of Privacy As time progresses, every culture in humanity has devised some kind of a system, be it one of government or ethics or religion. All of these organizations have culminated into the world as we know it today, which faces many of the same problems these age old societies have encountered. Among the most prominent of these existing problems is privacy, a dilemma which faces challenges the likes of which it has never seen before. The advent of technology has led to the invasion of homes and lives, all within the law. Government has deemed that which was

    View Document »

    Ethical Analysis Of Case Studies

    9248 words, 37 pages

    Ethical Analysis of Case Studies The Case Studies appear in Ethics and the Conduct of Business by John Boatwright J. N. Hooker Carnegie Mellon University Case 5.1 Two Whistle-Blowers Synopsis1 A quality control inspector, Chuck Atkinson, tried to get his superiors at Brown & Root to observe safety regulations in the construction of a nuclear power plant. Frustrated, he finally reported the problem to government regulators. At this point he lost his job and comfortable salary, and he was blacklisted. He was forced at one point to support his family by gathering

    View Document »

    Online Social Media

    1255 words, 6 pages

    Whenever my father sees me that I utilize my computer to access Facebook, he always say “Stop using social networks, it can adversely affect your privacy, even your mental “ . Is it right? Throughout recent history, there is no doubt that social media has made a huge impact on people’s lives. Social networking services are designed to support users working, thinking and acting together. However, the issue of whether social media is our biggest privacy risk has been widely debated in our community. It is a controversial issue but with practical measures, supported by technology and an incr

    View Document »

    Patient Rights Requirements In Health Information Management

    1787 words, 8 pages

    It is known that today, with the growth of computerized health information systems, there is a potential threat to the patients’ confidentiality. Easy and rapid access makes it possible to get any information concerning the patient’s medical records which can cause damage to the patient’s life and psychological state. Some patients are not aware of the fact that the details of their treatment can be put into the database accessible to any physicians, and their staffs only but as well medical laboratories, employees of insurance companies, researchers, public health insurance and a lot of othe

    View Document »

    Social Media

    14063 words, 57 pages

    Let's taLk Social Media for Small Business Version Two Written by John Jantsch of Duct Tape Marketing Sponsored by A note from the sponsor... When used properly, social media can be a great tool to help your business reach untapped, potential customers and stay connected to current ones. But there are a few things you’ll need to know to help you get the most out of social media as well as your online presence in its entirety. Microsoft Office Live Small Business sponsored the creation of this eBook in an effort to help break social media down into easy-to-und

    View Document »

    Securing Privacy Today

    1259 words, 6 pages

    In today’s world keeping your personal information that you do not want others to know is next to impossible, and with the world revolving around technology nothing that is shared is private. Everybody has looked on the Internet at some point for information about someone else, and they were probably amazed at what all they did find about them. Not too many people realize how individual privacy is invaded every day. From those simple purchases made at the grocery store to the more intimate things we may do. What can be seen is that each person views their privacy dif

    View Document »

    Experimental Security Analysis Of A Modern Automobile

    13806 words, 56 pages

    Abstract— Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular networks. While this transformation has driven major advancements in ef?ciency and safety, it has also introduced a range of new potential risks. In this paper we experimentally evaluate these issues on a modern automobile and demonstrate the fragility of the underlying system structure. We demonstrate that an attacker who is able to in?ltrate virtually any Electronic Control Unit (ECU) can leverage this ability to

    View Document »

    Personal Security Vs National Security

    1788 words, 8 pages

    On April 15, 1995, terrorists (Terry Nichols and Timothy McVeigh) parked a Ryder truck filled with explosives in front of the Alfred P. Murrah Federal Building in Oklahoma City, Oklahoma. These terrorists detonated a bomb killing 168 people including 19 children under the age of six. It also injured more than 680 people. Before 911, the Oklahoma City bombing was the most destructive act of terrorism committed on American soil. This bombing caused 652 million dollars worth of damage. As a result of the bombing the United States government passed the Antiterrorism and Effective Death Penalt

    View Document »

    Business Society

    2604 words, 11 pages

    Stringent or Accommodating? A debate on employer sensitivity regarding employees' personal issues. Introduction Today's work place has become a highly diverse environment. Diversity issues ranges from, but not limited to, race, sex, cultures, age, disability, and sexual orientation. Employers today are often faced with different type employee issues, more so, than in previous decades. Organizational culture and hierarchal relationships are constantly changing, and, thus comes the question of whether employers in this age, are sensitive enough to their employees' needs. Should we con

    View Document »

More Popular Essays

Research help is just moments away!