Describe and evaluate the ethics of a breach in employee/client data confidentiality
Words: 275
Pages: 1
97
97
DownloadEmployee Data Confidentiality
Student’s Name
Institution
Employers should value the privacy of company procedures and secrets, and this is why employees are expected to maintain the standard of confidentiality (Quain, 2018). Most companies, particularly in the United States, have social media policies that can limit employees from posting about the employer on social networking sites such as Facebook and Twitter. However, some states have enacted laws that prohibit workers from disciplining a worker based on social media unless the post can cause damage to the organization. The work related posts have the potential to cause damage to the institution. Therefore, one may argue that analogies can break down because such information is compiled based on publicly available data that are obtained through legwork as well as by accessing public records and commercial databases. In this case, the employer is compelling workers to disclose passwords for their personal communications.
I work for an IT firm, and some of its stakeholders are investors, the society, the government and its agencies, and creditors. There are no federal laws that exclude an institution from requiring a worker to provide their password and username for social media accounts (Lunday, 2010). However, the following are the ethical systems that can support the need for the IT firm to require personal media credentials:
Social contract
Divine command
Ethics of care
Utilitarianism
Egoism ethics
The five forgiving ethical systems that the employer might have concerning the action of my friend are:
Natural Law
Virtue ethics
Ethical egoism
Consequentialism
Deontology
In case my ethical system was Virtue Ethics, I won’t report my friend because people should endeavor to become more courageous, honest, generous and compassionate.
Wait! Describe and evaluate the ethics of a breach in employee/client data confidentiality paper is just an example!
Therefore, my friend will make good ethical decisions without the need for immaterial moral rules.
References
Lunday, J. (2010). Managing the Workplace Ethics of Social Media. Retrieved from https://www.corporatecomplianceinsights.com/managing-the-workplace-ethics-of-social-media/
Quain, S. (2018). Employee Consequences for Breach of Confidentiality. Retrieved from https://smallbusiness.chron.com/employee-consequences-breach-confidentiality-15476.html
Subscribe and get the full version of the document name
Use our writing tools and essay examples to get your paper started AND finished.