ch 7 privacy

23
26. “Can You Pass the Job 26. “Can You Pass the Job Test?” Test?” Newsweek (5 May 1986) Newsweek (5 May 1986) Various forms of testing are Various forms of testing are once again becoming popular. once again becoming popular. Fourth Amendment Fourth Amendment Can employers require things Can employers require things like drug tests as like drug tests as conditions for employment? conditions for employment?

Upload: proethics

Post on 14-Jan-2015

1.421 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Ch 7 Privacy

26. “Can You Pass the Job 26. “Can You Pass the Job Test?” Test?” Newsweek (5 May 1986)Newsweek (5 May 1986)

Various forms of testing are once Various forms of testing are once again becoming popular.again becoming popular.

Fourth AmendmentFourth Amendment Can employers require things like Can employers require things like

drug tests as conditions for drug tests as conditions for employment?employment?

Page 2: Ch 7 Privacy

Forms of TestingForms of Testing Honesty Tests: polygraph; writtenHonesty Tests: polygraph; written

– Problem of accuracy/reliabilityProblem of accuracy/reliability– Is this a preventative measure or determination of Is this a preventative measure or determination of

guiltguilt Drug TestsDrug Tests

– Problem of accuracy 95%-99% accurate = 1-5 out Problem of accuracy 95%-99% accurate = 1-5 out of every 100 tested will produce inaccurate results.of every 100 tested will produce inaccurate results.

– Some studies rate the error at 25% false positiveSome studies rate the error at 25% false positive– Test may not reflect current drug induced Test may not reflect current drug induced

impairment, but residual drugs in one’s system impairment, but residual drugs in one’s system (THC, Cocaine)(THC, Cocaine)

– Should these only apply to those whose work has a Should these only apply to those whose work has a bearing on public safety?bearing on public safety?

Page 3: Ch 7 Privacy

Testing (Cont.)Testing (Cont.) Personality TestsPersonality Tests

– Problem with those that don’t do well on tests Problem with those that don’t do well on tests generally.generally.

Genetic ScreeningGenetic Screening– Can be useful in protecting the employees and Can be useful in protecting the employees and

public from health risks.public from health risks.– May also result in discrimination against May also result in discrimination against

homosexuals, women and those predisposed to homosexuals, women and those predisposed to disease.disease.

– Accuracy problems in terms of both false pos. Accuracy problems in terms of both false pos. and neg.and neg.

Page 4: Ch 7 Privacy

27. “Privacy, Morality, 27. “Privacy, Morality, and the Law” W. A. and the Law” W. A. ParentParent Definition of PrivacyDefinition of Privacy Why we value PrivacyWhy we value Privacy Account of the moral and legal Account of the moral and legal

right to privacyright to privacy

Page 5: Ch 7 Privacy

Definition of PrivacyDefinition of Privacy Privacy DefinedPrivacy Defined Cultural norms and existing practices.Cultural norms and existing practices. ““Personal information consists of facts Personal information consists of facts

which most persons in a given society which most persons in a given society choose not to reveal about themselves choose not to reveal about themselves (except to close friends, family, . . .) or (except to close friends, family, . . .) or of facts about which a particular of facts about which a particular individual is acutely sensitive and which individual is acutely sensitive and which he therefore does not choose to reveal he therefore does not choose to reveal about himself”(216).about himself”(216).

Page 6: Ch 7 Privacy

Value of PrivacyValue of Privacy

Privacy prevents others from obtaining Privacy prevents others from obtaining personal, sensitive information that personal, sensitive information that could be used to acquire power over us.could be used to acquire power over us.

Privacy prevents the scorn or ridicule Privacy prevents the scorn or ridicule due to intolerant views or life styles, due to intolerant views or life styles, habits and ways of thinking.habits and ways of thinking.

Privacy is part and parcel of ‘the liberal Privacy is part and parcel of ‘the liberal ethic’ i.e., a violation of the respect for ethic’ i.e., a violation of the respect for personspersons..

Page 7: Ch 7 Privacy

Moral Right to PrivacyMoral Right to Privacy

The value of privacy establishes The value of privacy establishes the moral right to privacy for the moral right to privacy for those that value those that value freedom freedom and and individuality.individuality.

That privacy is a moral right does That privacy is a moral right does not entail that it can never be not entail that it can never be violated.violated.

Page 8: Ch 7 Privacy

Criteria of a Wrongful Criteria of a Wrongful InvasionInvasion

For what purpose is the undocumented personal For what purpose is the undocumented personal info. sought?info. sought?

Is this purpose a legitimate and important one?Is this purpose a legitimate and important one? Is the knowledge sought through invasion of Is the knowledge sought through invasion of

privacy relevant to its justifying purpose?privacy relevant to its justifying purpose? Is invasion of privacy the only or the least Is invasion of privacy the only or the least

offensive means of obtaining the knowledge?offensive means of obtaining the knowledge? What restrictions or procedural restraints have What restrictions or procedural restraints have

been placed on the privacy-invading techniques?been placed on the privacy-invading techniques? What protection is to be afforded the personal What protection is to be afforded the personal

knowledge once it has been acquired?knowledge once it has been acquired?

Page 9: Ch 7 Privacy

Purpose of the Criteria Purpose of the Criteria (pp.220-221)(pp.220-221) 1-4 deal with the rationale for 1-4 deal with the rationale for

invading privacyinvading privacy– gratuitious invasions: when there is gratuitious invasions: when there is

no purpose; when the purpose is no purpose; when the purpose is less than compelling; when the less than compelling; when the personal facts have nothing to do personal facts have nothing to do with the justifying elements; when with the justifying elements; when the info. could have been obtained the info. could have been obtained by less intrusive measures.by less intrusive measures.

Page 10: Ch 7 Privacy

Purpose (Cont.)Purpose (Cont.)

5 deals with the actual invasion of 5 deals with the actual invasion of privacyprivacy– Indiscriminate Invasions: occur when Indiscriminate Invasions: occur when

insufficient procedural safeguards insufficient procedural safeguards have been imposed on the have been imposed on the techniques employed.techniques employed.

6 deals with how the obtained 6 deals with how the obtained info. is treated after the invasion.info. is treated after the invasion.

Page 11: Ch 7 Privacy

The Legal Right to Privacy The Legal Right to Privacy

Contemporary jurisprudence could have Contemporary jurisprudence could have benefited from the philosophical analysis of benefited from the philosophical analysis of privacy.privacy.

Griswold v. Connecticut – law recognizes an Griswold v. Connecticut – law recognizes an implicit right to privacy.implicit right to privacy.

Eisenstadt v. Baird – equated the right to Eisenstadt v. Baird – equated the right to privacy with the right to make fundamentally privacy with the right to make fundamentally important choices free from unwarranted important choices free from unwarranted government intrusion.government intrusion.

Many cases conflate the right to privacy with Many cases conflate the right to privacy with the right to liberty.the right to liberty.

Page 12: Ch 7 Privacy

28. “Invasions of Privacy 28. “Invasions of Privacy in Social Science in Social Science Research”Research” Nature of rights and the nature of Nature of rights and the nature of

the right to privacy.the right to privacy. Justifiable invasions of one’s right Justifiable invasions of one’s right

to privacy.to privacy. Application to Social Science Application to Social Science

research.research.

Page 13: Ch 7 Privacy

The Right to PrivacyThe Right to Privacy

A right to some good “x” is a A right to some good “x” is a understood as having a valid understood as having a valid claim to do or have “x” assuming:claim to do or have “x” assuming:– The person who has the claim is The person who has the claim is

permitted to do or have “x”.permitted to do or have “x”.– The claim is another’s obligation to The claim is another’s obligation to

the person.the person.

Page 14: Ch 7 Privacy

Rights and ObligationsRights and Obligations

To claim that one has a right entails To claim that one has a right entails that someone else has either a that someone else has either a positive or negative obligation.positive or negative obligation.

Positive Obligation: obligation to Positive Obligation: obligation to provide someone with “x” or the provide someone with “x” or the means to do “x”.means to do “x”.

Negative Obligation: obligation to Negative Obligation: obligation to refrain from interfering with someone’s refrain from interfering with someone’s doing or having “x”.doing or having “x”.

Page 15: Ch 7 Privacy

Privacy and Respect Privacy and Respect for Personsfor Persons Individual autonomy Individual autonomy capable of acting capable of acting

and forming conceptions of the good.and forming conceptions of the good. ““It is surely a truism that control over It is surely a truism that control over

one’s life entails control (to some degree) one’s life entails control (to some degree) over what is known by others about over what is known by others about oneself and control over some set of oneself and control over some set of crucial (private) areas of one’s life.”(225) crucial (private) areas of one’s life.”(225)

GMP-respect for persons GMP-respect for persons abstract right abstract right to privacy.to privacy.

Page 16: Ch 7 Privacy

Justifying Invasions of Justifying Invasions of PrivacyPrivacy Specifically – Invasions of privacy Specifically – Invasions of privacy

in social science research.in social science research. Some deception is required to Some deception is required to

perform social science perform social science experiments experiments Milgram studies Milgram studies (Ch.5 study/discussion question (Ch.5 study/discussion question 6).6).

Page 17: Ch 7 Privacy

Criteria for Determining Criteria for Determining Unjust Invasions of Unjust Invasions of PrivacyPrivacy CC11: Social scientists unjustifiably : Social scientists unjustifiably

invade their subjects’ privacy invade their subjects’ privacy whenever they manipulate subjects whenever they manipulate subjects into doing something embarrassing into doing something embarrassing or disclosing private embarrassing or disclosing private embarrassing facts, and thereby place their facts, and thereby place their subjects in a false public light or subjects in a false public light or intrude into their private domain.intrude into their private domain.

Page 18: Ch 7 Privacy

Alternate CriteriaAlternate Criteria

CC22: Social scientists unjustifiably : Social scientists unjustifiably invade their subjects’ privacy invade their subjects’ privacy under certain conditions when under certain conditions when they manipulate subjects into they manipulate subjects into doing something embarrassing or doing something embarrassing or disclosing private embarrassing disclosing private embarrassing facts, and thereby place their facts, and thereby place their subjects in a false public light of subjects in a false public light of intrude into their private domains.intrude into their private domains.

Page 19: Ch 7 Privacy

Problems with CProblems with C22

Trades rights for utilityTrades rights for utility Rights can only be sacrificed for Rights can only be sacrificed for

the protection of competing the protection of competing rights.rights.

Reminder: Both C1 and C2 apply Reminder: Both C1 and C2 apply to situations in which there is not to situations in which there is not consent to the invasions.consent to the invasions.

Page 20: Ch 7 Privacy

““Safe” Areas of Social Safe” Areas of Social LifeLife ““It is necessary for social justice and It is necessary for social justice and

the institution of morality that what the institution of morality that what may be called “safe” areas of social may be called “safe” areas of social life be carved out that are almost life be carved out that are almost entirely free from intrusion”(227)entirely free from intrusion”(227)

Violation of safe areas by lying, Violation of safe areas by lying, deception etc. is almost always wrong.deception etc. is almost always wrong.

Safe areas can only be overridden to Safe areas can only be overridden to protect other safe areas.protect other safe areas.

Page 21: Ch 7 Privacy

Privacy and Social Privacy and Social Science ResearchScience Research Acc. to Pinkard, social science Acc. to Pinkard, social science

research that invades a safe area research that invades a safe area is always morally unjustified.is always morally unjustified.

Invasions of privacy in tacit, Invasions of privacy in tacit, structured and consensual structured and consensual situations is permissible.situations is permissible.

Agreement of rational persons Agreement of rational persons standard.standard.

Page 22: Ch 7 Privacy

Hypothetical Hypothetical AgreementAgreement ““Our judgments in these cases thus Our judgments in these cases thus

should be set in the context of a should be set in the context of a model of moral reasoning that model of moral reasoning that focuses on principles that are focuses on principles that are sharedshared between people and to which we can between people and to which we can imagine people imagine people contractuallycontractually agreeing.”(228)agreeing.”(228)

Hypothetical agreement rests on a Hypothetical agreement rests on a respect for persons.respect for persons.

Page 23: Ch 7 Privacy

Context CountsContext Counts Is the laboratory setting a “poker Is the laboratory setting a “poker

game”?game”? Is the subway a poker game?Is the subway a poker game? What would hypothetical agents What would hypothetical agents

agree to or not agree to?agree to or not agree to? Is there a “right” to do research Is there a “right” to do research

that overrides one’s right to that overrides one’s right to privacy?privacy?