ETHICS - Chapter 6
ETHICS - Chapter 6
CHAPTER 6 - Privacy
INTRODUCTION
Employers today would scarcely dare to intrude so openly into the private lives of their
employees. Among the tools available to present-day employers are quick and inexpensive drug
tests, pencil-and-paper tests for assessing honesty and other personality traits of employees,
extensive computer networks for storing and retrieving information about employees, and
sophisticated telecommunication systems and concealed cameras and microphones for
supervising employees’ work activities.
Consumers have joined employees as targets for information gathering by American
corporations. The same surveillance techniques that are used to monitor employees are now used
to detect theft by store customers. Video cameras are commonplace in retail stores, and some
retailers have installed hidden microphones as well. The main threat to consumer privacy comes
from the explosive growth of database marketing. The countless bits of information that
consumers generate in each transaction can now be combined in vast databases to generate lists
for direct-mail and telemarketing solicitations. Public records, such as automobile registrations
and real-estate transfers, are also readily available sources of information for the creation of
specialized lists. The collection of information about users of the Internet, which is in its infancy,
has immense potential for marketers.
CHALLENGES TO PRIVACY
Privacy has become a major issue in government and business in recent years for many reasons.
One is simply the vast amount of personal information that is collected by government agencies.
The need to protect this information became especially acute after the passage of the Freedom of
Information Act (FOIA) in 1966.
Employee Privacy
Government is not the only collector of information. Great amounts of data are required
by corporations for the hiring and placement of workers, for the evaluation of their
performance, and for the administration of fringe-benefit packages, including health
insurance and pensions. Private employers also need to compile personal information about
race, sex, age, and handicap status in order to document compliance with the law on
discrimination. In addition, workers’ compensation law and occupational health and safety
law require employers to maintain extensive medical records. Alan F. Westin, an expert on
privacy issues, observes that greater concern with employee rights in matters of discrimina-
tion and occupational health and safety has had the ironic effect of creating greater dangers to
employees’ right of privacy.
WORKPLACE MONITORING.
Monitoring the work of employees is an essential part of the supervisory role of management,
and new technologies enable employers to watch more closely than ever before, especially when
the work is done on telephones or computer terminals. Supervisors can eavesdrop on the
telephone conversations of employees, for example, and call up on their own screens the input
and output that appear on the terminals of the operators. Hidden cameras and microphones can
also be used to observe workers without their knowledge. A computer record can be made of the
number of telephone calls, their duration, and their destination. The number of keystrokes made
by a data processor, the number of errors and corrections made, and the amount of time spent
away from the desk can also be recorded for use by management. Even the activities of truck
drivers can be monitored by a small computerized device attached to a vehicle that registers
speed, shifting, and the time spent idling or stopped.
Companies claim that they are forced to increase the monitoring of employees with these
new technologies as a result of the changing nature of work. More complex and dangerous
manufacturing processes require a greater degree of oversight by employers.
Although the information gained is generally held in confidence, it is available for company use
when an employee files a workplace injury claim or sues for discrimination, wrongful discharge,
or any other wrong. In some instances, employers have used the threat of revealing unrelated
embarrassing information in court to dissuade employees from pressing a suit.
PSYCHOLOGICAL TESTING.
One particular area of concern has been psychological testing. Tests that measure job-related
abilities and aptitudes have raised little opposition. However, employers have increasingly come
to recognize that an employee’s psychological traits are important, not only for predicting
successful job performance but also for identifying potentially dishonest and troublesome
employees.
This latter goal is the appeal of integrity tests. Large numbers of honest people are denied jobs
and suffer a stigma because of faulty testing, and a few rogues slip through. One benefit of
integrity tests, therefore, may be to enable employers to recruit a work force that will tolerate
shabby treatment without retaliating.
Consumer Privacy
Concern about consumer privacy has focused primarily on the gathering and use of information
in database marketing. Businesses have discovered that it pays to know their customers.
However, the main value of a database of consumer information lies in the capacity to generate
customized mailing lists. If a company can identify the characteristics of potential customers by
age, income, lifestyle, or other measures, then a mailing list of people with these characteristics
would enable the seller to reach these customers at relatively low cost. Such targeted selling,
known as direct mail, is also potentially beneficial to consumers, because a customized mailing
list is more likely to produce offers of interest to consumers than is a random mailing.
The growth in database marketing has been facilitated by computer technology, which is
able to combine data from many sources and assemble them in usable form. For example, by
merging information about an individual with census data for that person’s zip-code-plus-four
area, it is possible to make reliable inferences about income, lifestyle, and other personal charac-
teristics.
ISSUES IN CONSUMER PRIVACY.
One issue in the use of databases to generate mailing lists is
the right of control over information. If we reveal some information about ourselves to a
company, does that company “own” the information? For example, does a magazine have a right
to sell a list of its subscribers to a direct marketer? We voluntarily provide our name and address
to the magazine for the purpose of obtaining a subscription, just as we reveal our annual income
to a bank in order to obtain a loan. These are examples of the primary use of information. The
use of information for some other purpose is labeled secondary.
Other issues concern access to information and potential misuse. Although an individual’s
annual income is generally regarded as personal; people may not be upset to learn that this infor-
mation is used to generate a mailing list—as long as no one has access to the information itself.
Ethical questions about employee and consumer privacy are unavoidable because obtaining and
using personal information is essential in both employment and marketing.
But everyone has a legitimate interest in maintaining a private life that is free from unwarranted
intrusion by business.
Utilitarian Arguments
Why do we value privacy so highly and hold that it ought to be protected as a right? Certainly,
we desire to have a sphere of our life in which others do not possess certain information about
us. But the mere fact that we have this desire does not entail our having a right of privacy; nor
does it tell us how far a right of privacy extends. Some arguments are needed, therefore, to
establish the value of privacy and the claim that we have a right to it.
One of the consequences cited by utilitarians is that great harm is done to individuals when
inaccurate or incomplete information collected by an employer is used as the basis for making
important personnel decisions. The lives of many employees have been tragically disrupted by
groundless accusations in their personnel records, for example, and the results of improperly
administered polygraph and drug tests. The harm from these kinds of practices is more likely to
occur and to be repeated when employees are unable to examine their files and challenge the
information (or misinformation) in them.
A drawback to this argument is that it rests on an unproved assumption that could turn
out to be false. It assumes that on balance more harm than good will result when employers
amass files of personal information, use polygraph machines, conduct drug tests, and so on.
Furthermore, the argument considers only the possible harmful consequences of privacy
invasions. However, some practices, such as observing workers with hidden cameras and
eavesdropping on business conducted over the telephone, are generally considered to be morally
objectionable in themselves, regardless of their consequences. Honest workers, for example,
have nothing to fear from surveillance that is designed to protect against employee theft, and
indeed the use of hidden cameras in a warehouse can even benefit those who are honest by
reducing the possibility of false accusations.
Kantian Arguments
Two Kantian themes that figure prominently in defense of a right to privacy are those of
autonomy and respect for persons. Stanley I. Benn, for example, notes that utilitarian arguments
for a right of privacy are not able to show what is morally wrong when a person is secretly
observed without any actual harm being done. “But respect for persons,” Benn claims, “will
sustain an objection even to secret watching, which may do no actual harm at all.” Benn’s
argument thus appeals to both Kantian themes by arguing that invading a person’s privacy
violates the principle of respect for persons and prevents a person from making a rational choice
as an autonomous being.
The Role of Privacy in Socialization
Several philosophers have suggested that the key to a more satisfactory theory of privacy can be
constructed by understanding the way in which individuals are socialized in our culture.34
Privacy, in the view of these philosophers, is neither a necessary means for realizing certain ends
nor conceptually a part of these ends. People at different times and places have been socialized
differently with regard to what belongs to the sphere of the private, and we might even be better
off if we had been socialized differently.
Both utilitarian and Kantian arguments point to a key insight: Privacy is important in some
way to dignity and well-being.
Both utilitarian and Kantian arguments point to a key insight: Privacy is important in some
way to dignity and well-being.
Employers are justified in seeking information about drug use by employees in the workplace,
for example, but such means as searches of lockers and desks, hidden cameras in rest rooms,
random drug tests, and the like are not justified when sufficient information could be gathered by
less intrusive means, such as closer observation of work performance and testing only for cause.
An objection to constant monitoring, personality tests, and the use of polygraph machines is that
they collect more information than is necessary and that they collect it indiscriminately. As a
person, one can shape how one appears to others and create an identity for oneself. A machine
that registers involuntary responses denies people the power to do that.
Finding the right means is a great challenge to business firms which must meet employee
and consumer expectations as they utilize new technologies. More than many business ethics
problems, protecting privacy requires a coordinated solution involving many parties. Until a
solution is found, though, the focus of businesses will remain on developing and implementing
privacy policies.