Introduction 2
Case Study 2
Deontological Ethical Theory 2
Categorical Imperative 3
RIMS Strategy 3
STEP 1: Generate Moral points of view 3
Pro-monitoring: 3
Anti-monitoring: 4
STEP 2: Identify the implications 4
Positive Concerns: 4
Negative Concerns: 4
STEP 3: Final solutions 4
Abuse of computer storage 4
Invasion of privacy: 5
Ruins Trust 5
Conclusion 5
References 6
Books: 6
Internet Journals/Articles: 6
Introduction
Privacy is defined as ‘the state of being free from unwanted or undue intrusion or disturbance in one’s private life or affairs; freedom to be let alone’. (The Definition of Privacy) From the definitions, it is seen that privacy has the connotations of liberty and enjoyment whereas the lack of privacy …show more content…
The school principal reported this to the police, and charges were laid. Given the comprehensive IT policy governing the use of school-owned technology, the Supreme Court of Canada found that Mr. Cole had a diminished expectation of privacy in the contents of his computer, and allowed the evidence to be admitted. This decision reinforces the importance of implementing, and following, a policy for use of employer-owned technology in the workplace. (Thomlinson, 2013)
Deontological Ethical Theory
There are certain objective ethical standards of behaviour that everyone should respect. Such as keeping business work at the business and all non-business related tasks should not be done at the place of business. This is a task in which many people fail to adhere to and therefore, privacy regulations, such as blocking certain websites, are put in place to prevent these occurrences in the workplace. The deontological theory is ‘the duty always to abide by those objective standards of ethical behaviour that we have discerned through our rational thinking’. (Kretzschmar et al., 2012)
The focus of this theory is not on the person who had the pornography at work, rather it is focusing on the behaviour and the quality of the action itself of having the pornography on a work computer which is a bad …show more content…
The company/school should not go looking on the teachers computers to see what they have there as this is an invasion of privacy. However, it may be important to monitor the usage and downloads onto the computer in order to try and maintain protocol in the workplace. It is also noted that the incident in the case study was during routine maintenance which is