Privacy and Protection of Personal Integrity in The Working Place
Privacy and Protection of Personal Integrity in The Working Place
Privacy and Protection of Personal Integrity in The Working Place
Gordana Dodig-Crnkovic
http://www.idt.mdh.se/~gdc
1
CONTENTS
INTRODUCTION
PRIVACY DEFINITIONS
MONITORING AND SURVEILLANCE
SURVEILLANCE TOOLS
LEGISLATION
WHOSE RESPONSIBILITY?
THE UNIVERSAL CORE VALUES FOUND ACROSS CULTURES
TRUST AND WORKPLACE PRIVACY
INVENTING SOCIALLY DANGEROUS TECHNOLOGY
ETHICS OF TRUST
LEGITIMACY BY DESIGN AND TRUSTWORTHY COMPUTING
CONCLUSIONS
2
PRIVACY
3
WHAT I LEARNED THUS FAR?
Nadia: radical translation? ”privacy” its meaning in post 9/11, balancing or managing
priorities
Charles Raab: public policy perspective – need for more academic research
alongside action research – privacy as a public good, essential for society at large,
not only for an individual
4
PRIVACY
5
INTRODUCTION
6
MONITORING AND SURVEILLANCE TOOLS
7
COMPUTERS AS TOOLS FOR MONITORING
AND SURVEILLANCE
Storage
Searching,
Sorting,
Simulation
8
Face
Fingerprint / Palm Print
Hand and Finger Geometry
Handwriting
Iris
Voice/Speaker
Retinal
Multimodal
9
SPECIFIC METHODS OF WORKER SURVEILLANCE
10
SPECIFIC METHODS OF WORKER SURVEILLANCE
11
SPECIFIC METHODS OF WORKER SURVEILLANCE
12
SPECIFIC METHODS OF WORKER SURVEILLANCE
Telecommuting
http://www.epic.org/privacy/workplace/
13
LEGISLATION
14
LEGISLATION
15
LEGISLATION
16
FAIR INFORMATION PRACTICES APPLIED BY
INTERNATIONAL LABOUR ORGANIZATION
18
WORKPLACE PRIVACY ISSUES
19
WHOSE RESPONSIBILITY?
AGENCY AND SURROGATE AGENCY
20
WHY VALUE PRIVACY?
PRIVACY AND DEMOCRACY
21
THE UNIVERSAL CORE VALUES
FOUND ACROSS CULTURES
22
TRUSTWORTHINESS AND WORKPLACE PRIVACY
23
THE DESIGN OF COMPUTER SYSTEMS
24
THE DESIGN OF COMPUTER SYSTEMS
25
THE DESIGN OF COMPUTER SYSTEMS
26
THE DESIGN OF COMPUTER SYSTEMS
Deborah Pierce
27
INVENTING SOCIALLY DANGEROUS
TECHNOLOGY
28
CODES OF ETHICS
(Primarily Targeting Designers)
29
A PRIVACY CULTURE
30
LEGITIMACY BY DESIGN AND
TRUSTWORTHY COMPUTING
31
LAYERS OF TRUSTWORTHINESS
32
ETHICS OF TRUST
33
CONCLUSIONS
34
References
In recent years, new and more intrusive surveillance technology has found its way into workplaces. New
medical tests provide detailed information about workers' biology that was previously unthinkable. An
increasing number of employees work under camera surveillance. At the same time, computers allow for a
detailed monitoring of our interactions with machines, and all this information can be electronically stored
in an easily accessible format. What is happening in our workplaces? Has the trend towards more humane
workplaces been broken? From an ethical point of view, which types and degrees of surveillance are
acceptable, and which are not? From a policy point of view, what methods can be used to regulate the use
of surveillance technology in workplaces?
These are some of the questions that have driven the research reported in this book. Written by an
interdisciplinary group of researchers in Computer Ethics, Medical Ethics and Moral Philosophy, this book
provides a broad overview that covers both empirical and normative aspects of workplace privacy.
36