Verified Document

Organizational Policy That Infringes On The Personal Essay

¶ … organizational policy that infringes on the personal liberty of employees. Be specific in terms of what liberties are infringed upon and how. Then explain the benefits of the policy to the organization in spite of the costs to employees in terms of their personal liberty. Organizational policies infringing upon liberty

In today's competitive job market, workers are often desperate to do whatever is necessary to get hired. However, some employers are taking advantage of this desperation in their 'vetting' of workers. It is well-known that employers may 'Google' a prospective employee's name before hiring. It is also common for an employer to access the public Facebook (or other social media) profile of the employee to screen him or her for possible personal problems or indiscretions before hiring. However, some employers are going a step farther. "Some have demanded applicants hand over their...

This means that even content that the user has posted privately -- including those marked only for trusted family and friends -- could be accessed by the employer, as a condition of being considered for employment. According to the ACLU, who was defending a man required to give his password as a condition of his job application: "It's an invasion of privacy for private employers to insist on looking at people's private Facebook pages as a condition of employment or consideration in an application process" (Stern 2012).
Imagine if, in the pre-online era, a prospective employer asked to see an employee's personal photo albums, diary, and other personal memorabilia as part of the hiring process. It should also be noted that these demands are not just made of candidates with high-security jobs whose private actions might be expected to…

Sources used in this document:
Imagine if, in the pre-online era, a prospective employer asked to see an employee's personal photo albums, diary, and other personal memorabilia as part of the hiring process. It should also be noted that these demands are not just made of candidates with high-security jobs whose private actions might be expected to be put under scrutiny if they could be potentially risky to national security. Even colleges are asking that prospective applicants give the admissions staff their passwords and the job interview in the suit brought forth by the ACLU was for a journalism job.

Even Facebook's own privacy officer was distressed at this development, pointing out that it not only compromised the privacy of the job-seeker, but also that of his or her friends, who may have shared private information with the owner of the profile page with the expectation that it was to remain confidential. "This practice undermines the privacy expectations and the security of both the user and the user's friends. It also potentially exposes the employer who seeks this access to unanticipated legal liability" (Stern 2012).

The reasons that employers wish to violate applicants' privacy are myriad -- they may want to find out if the employee drinks excessively; if he or she has (or is planning to have) children; if he or she has unpopular political affiliations; if he or she has a disability that might be concealed during the interview. In other words, the employer can find out all sorts of things that might make the person 'difficult' to employ, but which they are prohibited by law from using in hiring considerations. Given the different types of information available on Facebook, employers can use their access to social media in a very sneaky away to avoid the law. While it is true that the employer could use the applicant's password to find out information which it could use against the employee legitimately, such as lying about past job or educational experience, the possible legitimate uses does not justify the infringement of privacy. Employers
Cite this Document:
Copy Bibliography Citation

Related Documents

System Security Every Organization Which
Words: 2884 Length: 9 Document Type: Thesis

Attacks on the system security include password theft, back doors and bugs, social engineering, protocol failures, authentication failures, Denial of Service attacks, active attacks, botnets, exponential attacks including worms and viruses, and information leakage. (Fortify Software Inc., 2008); (Fortify Software, n. d.) Servers are targets of security attacks due to the fact that servers contain valuable data and services. For instance, if a server contains personal information about employees, it

Ethics and Professionalism Regarding the Dangers of Sweatshops
Words: 1239 Length: 3 Document Type: Term Paper

Ethical issues have a particular resonance in American society at the present time, given the perceived failure of many of our public institutions to live up to the ethical standards they espouse and considering the consequences diminishing of public confidence in political leaders, religious leaders, the business community, and so on. A problem the fashion industry must face is the degree to which the goods they sell have been produced

Improve Ethical Behavior of Those
Words: 3551 Length: 10 Document Type: Term Paper

From this broader perspective and in their planning and operations they have changed the term 'stockholder' to 'stakeholder' to cover employees, customers, suppliers and the community at large. With the growing complexity and dynamism brought about in business, organizations understood they required more guidance to guarantee that their dealings aligned with the overall good and did not pose any harm to others and with this was born business ethics.

Pro's/Con's of Random Drug Testing
Words: 3109 Length: 8 Document Type: Term Paper

Checkyourassignments.org/images/spacer.gif exposure due to liability apart from increased premiums of employees compensation. Employers possess a http://www.checkyourassignments.org/images/spacer.gif self-interest while maintaining a workplace which http://www.checkyourassignments.org/images/spacer.gif free from drugs meant for the security as well as interests of staffs and bosses alike. But this is far from the complete picture. Debate comes to the fray when bosses either inexpertly or through force enforce drug testing in a way which infringes individual or privileges

Appellant Brief - Prisoners' First
Words: 3496 Length: 13 Document Type: Term Paper

M. Lin's release from MCF has had the effect of rendering his lawsuit moot. In this case, M. Lin was incarcerated at the time the lawsuit was filed, but not at the time it is being decided. Thus, M. Lin's cause of action fails on the issue of mootness. Additionally, of the six members whom were denied visitation privileges, five of them have had sons which whom were formerly

Post War Iraq a Paradox in the Making Legitimacy Vs. Legality
Words: 14187 Length: 35 Document Type: Term Paper

Post War Iraq: A Paradox in the Making: Legitimacy vs. legality The regulations pertaining to the application of force in International Law has transformed greatly from the culmination of the Second World War, and again in the new circumstances confronting the world in the aftermath of the end of the Cold War. Novel establishments have been formed, old ones have withered away and an equally enormous quantity of intellectual writing has

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now