企業(yè)倫理學(xué)(原書第5版) 課件 第7、8章 道德決策制定:工作場所中的技術(shù)和隱私;營銷倫理_第1頁
企業(yè)倫理學(xué)(原書第5版) 課件 第7、8章 道德決策制定:工作場所中的技術(shù)和隱私;營銷倫理_第2頁
企業(yè)倫理學(xué)(原書第5版) 課件 第7、8章 道德決策制定:工作場所中的技術(shù)和隱私;營銷倫理_第3頁
企業(yè)倫理學(xué)(原書第5版) 課件 第7、8章 道德決策制定:工作場所中的技術(shù)和隱私;營銷倫理_第4頁
企業(yè)倫理學(xué)(原書第5版) 課件 第7、8章 道德決策制定:工作場所中的技術(shù)和隱私;營銷倫理_第5頁
已閱讀5頁,還剩86頁未讀 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡介

ChapterSeven:EthicalDecisionMaking:TechnologyandPrivacyintheWorkplaceCopyright?2021McGraw-HillEducation.Allrightsreserved.NoreproductionordistributionwithoutthepriorwrittenconsentofMcGraw-HillEducation.ChapterObjectives1Afterreadingthischapter,youwillbeableto:Explainanddistinguishthetwodefinitionsofprivacy.Describetheethicalsourcesofprivacyasafundamentalvalue.Identifythelegalsourcesofprivacyprotection,includingtheconceptofa“reasonableexpectationofprivacy.”Discussrecentdevelopmentsinconnectionwithemployeemonitoring.Identifyandexplaintherisksinvolvedinafailuretounderstandtheimplicationsoftechnologyanditsuse.Enumeratethereasonswhyemployerschoosetomonitoremployees’work.ChapterObjectives2Afterreadingthischapter,youwillbeableto:Discusstheethicsofmonitoringasitappliestodrugtesting.Discusstheethicsofmonitoringasitappliestopolygraphs,genetictesting,andotherformsofsurveillance.Explaintheinterestsofanemployerinregulatinganemployee’sactivitiesoutsideofwork.Discusstheimplicationsofworldevents,likerecentimmigrationpolicychanges,onbusinessdecisionsaboutprivacy.EthicalDecisionMakingThis“telephone”hastoomanyshortcomingstobeseriouslyconsideredasameansofcommunication.Thedeviceisinherentlyofnovaluetous.WesternUnionInternalMemo,1876Introduction1

Thischapterreviewssomekeyethicalissuesoftechnologyandprivacy,withafocusonprivacyintheworkplace.Conflictarisesthroughtheregulationofpersonalactivitiesorpersonalchoices,orthroughvariousformsofmonitoring.Chaptersevenexplorestheoriginsoftherighttoprivacyandthelegalandethicallimitationsonthatright.Introduction2Nextcomesmonitoringemployeeperformanceandtheethicalissuesfrompotentialtechnologicalinvasionsofprivacy.Thechapterthenconnectstheissuesoftechnologyandprivacytothebalanceofrightsandresponsibilitiesbetweenemployersandemployees.TheRighttoPrivacyPrivacyisasurprisinglyvagueanddisputedvalueincontemporarysociety.Callsforgreaterprotectionofprivacyrightsincreasedwiththeincreasedusedofcomputers.Privacyrights:Thelegalandethicalsourcesofprotectionforprivacyinpersonaldata.Thereiswidespreadconfusiononthenature,extent,andvalueofprivacy.DefiningPrivacyTwogeneralandconnectedunderstandingsofprivacy.Privacyistherighttobe"leftalone"withinapersonalzoneofsolitude.Privacyistherighttocontrolinformationaboutoneself.Privacyisimportantasitestablishestheboundarybetweenindividualsanddefinesone’sindividuality.Manypeoplebelievetherighttobe"leftalone"istoobroadandnotfeasibleintheworkplace.Therefore,thecontrolofpersonalinformationisabetterdefinition.Arightofprivacyimpliescontrolofallpersonalinformation.Perhapsthechoiceoflimitationorcontrolisone’ssenseofprivacy.EthicalSourcesofaRighttoPrivacy1Therighttoprivacyisfoundedintheindividual’sfundamentalrighttoautonomy.Thisrightisrestrictedbyaboundaryofreciprocalobligation.Reciprocalobligation:Whenanindividualexpectsrespectforhisorherpersonalautonomy,heorshehasareciprocalobligationtorespecttheautonomyofothers.Intheworkplace,reciprocalobligationimpliesthat:Anemployeehasanobligationtorespectthegoalsandpropertyoftheemployer.Theemployerhasareciprocalobligationtorespecttherightsoftheemployee,includingtherighttoprivacy.EthicalSourcesofaRighttoPrivacy2Thereisanapproachtoethicalanalysisthatseekstodifferentiatebetween:Thosevaluesthatarefundamentalacrosscultureandtheory,hypernorms.Thosevaluesthataredeterminedwithinmoralfreespaceandarenothypernorms.Individualprivacyisatthecoreofmanyofthebasicminimalrightsorhypernorms.Thevalueofprivacytocivilizedsocietyisasgreatasthevalueofthevarioushypernormstocivilizedexistence.Thefailuretoprotectprivacymayleadtoaninabilitytoprotectpersonalfreedomandautonomy.EthicalSourcesofaRighttoPrivacy3Legalanalysisofprivacyusingpropertyrightsperspectiveyieldsadditionalinsight."Property"isanindividual’slifeandallnon-procreativederivativesofherorhislife.Derivativesmayincludethoughtsandideas,aswellaspersonalinformation.Propertyrightsmeansdeterminingwhomaintainscontrolovertangiblesandintangibles,includingpersonalinformation.Whydoweassumeanindividualhasunfetteredrightstohisorherpersonalinformation?Privatepropertyrightsdependontheexistenceandenforcementofasetofrulesthatdefinewhohasarighttoundertakewhichactivitiesontheirowninitiativeandhowthereturnsfromthoseactivitieswillbeallocated.Thelegalrulesremainvague.LegalSourcesofaRighttoPrivacy1Privacycanbelegallyprotectedinthreeways:Bytheconstitution,Bystatutes,and,Bythecommonlaw.TheConstitution’sFourthAmendmentprotectionagainstunreasonablesearchandseizureappliestothepublic-sectorworkplace.LegalSourcesofaRighttoPrivacy2TheElectronicCommunicationsPrivacyAct(ECPA)of1986prohibitsunauthorizedaccessofstoredcommunications.ECPAimpactselectronicmonitoringonlybythirdpartiesandnotbyemployersSomestatesusestatutesbutapplicationtoprivate-sectororganizationsislimited,uncertain,ornotincludedatall.Intrusionintoseclusionviolationoccurswhensomeoneintentionallyintrudesontheprivateaffairsofanotherwhentheintrusionwouldbehighlyoffensivetoareasonableperson.LegalSourcesofaRighttoPrivacy3Manyrecentcourtdecisionswithregardtomonitoringseemtodependonwhethertheworkerhadnoticethatthemonitoringmightoccur.Thebasisforfindinganinvasionofprivacyisoftentheemployee’slegitimateandreasonableexpectationofprivacy.Iftheemployeehasactualnotice,thentheretrulyisnorealexpectationofprivacy.Thecompanyisallowedtomonitorevenwhenitpromisesnottomonitor.LegalSourcesofaRighttoPrivacy4ConnecticutandDelawarearetheonlytwostatesthatrequireemployerstonotifyworkerswhentheyarebeingmonitored.2019:Twenty-sixstates(plusGuam)prohibitemployersfromobtainingsocialmediapasswordsfromprospectiveorcurrentemployees.Table7.1:LegalStatusofEmployeeMonitoring1MethodsofCommunicationStatusTelephonecalls Monitoringispermittedinconnectionwithqualitycontrol.Noticetothepartiesonthecallisoftenrequiredbystatelaw,thoughfederallawallowsemployerstomonitorworkcallswithoutnotice.Iftheemployerrealizesthatthecallispersonal,monitoringmustceaseimmediately. Emailmessages Undermostcircumstances,employersmaymonitoremployeeemails.Eveninsituationswheretheemployerclaimsthatitwillnot,itsrighttomonitorhasbeenupheld.However,wheretheemployee’sreasonableexpectationofprivacyisincreased(suchasapassword-protectedaccount),thismayimpactthecourt’sdecision. Table7.1:LegalStatusofEmployeeMonitoring2MethodsofCommunicationStatusVoice-mail-systemmessages Thoughnotyetcompletelysettled,thelawhereappearstobesimilartotheanalysisofemailmessages. InternetuseWheretheemployerhasprovidedtheequipmentand/oraccesstotheinternet,theemployermaytrack,block,orreviewinternetuse.

GlobalApplications1PrivacyprotectionismoredifficultgiventheimplicationsoftheEuropeanUnion’sGeneralDataProtectionRegulation(GDPR).Providesthatpersonalinformationcannotbecollectedorsharedbycompanieswithoutindividuals’permission.Informationaboutwhoisusingthedataandforwhatpurposeitisbeingcollectedmustbeprovidedinaclear,easilyunderstandablemanner.Consumershavetherighttoreviewthedataandcorrectinaccuracies.GDPRincludesheavyregulatorypowersbyimposingheavyfinesforthosecompaniesthatbreaktheseregulations.UndertheGDPR,theEuropeanUniondoesnotallowthetransferofdataonitscitizensoutsideofthecountryunlessthecountryisdeemedtohaveadequatedataprivacylaws.TheEuropeanUnionPrivacyShield1UndertheEUPrivacyShield:WhenusingEuropeans’data,U.S.intelligenceserviceswillhavetoadheretothenewlimitsandoversightmechanism.TheU.S.StateDepartmentwillhavetoemployanewwatchdogtohandlecomplaintsaboutintelligence-relatedmatters.Companiesmustself-certifycompliancewiththePrivacyShieldanditsstatedprinciples.Certificationsmustberenewedannually.TheEuropeanUnionPrivacyShield2CompaniesmustpubliclydisplaytheirprivacypoliciesthatshowcompliancewithEUlaw.Companieswillhavetoresolvecomplaintswithin45daysofbeingfiled.Companieswillhavetoupdatetheirprivacypoliciestoexplainhowpeoplecanaccesstheseservices.CompanieswillfacemorerestrictionsonbeingabletoforwardEuropeans’personaldatatoothercompanies.GlobalApplications2Giventhenatureofthelegaluncertaintyorinstabilityconcerningthesechallengingareasofinformationgathering,perhapstheonlysourceofananswerisethics.Insummary.Employeeprivacyisviolatedwhenever:Employersinfringeuponpersonaldecisionsthatarenotrelevanttotheemploymentcontract–whetherthecontractisimpliedorexplicit.Personalinformationthatisnotrelevanttothatcontractiscollected,stored,orusedwithouttheinformedconsentoftheemployee.Further,becauseconsentplaysapivotalroleinthisunderstanding,theburdenofproofrestswiththeemployertoestablishtherelevancyofpersonaldecisionsandinformationatissue.EthicalDecisionMaking3Technologyisnothing.What’simportantisthatyouhaveafaithinpeople,thatthey’rebasicallygoodandsmart,andifyougivethemtools,they’lldowonderfulthingswiththem.SteveJobs,Chair,CEOandCo-FounderofAppleIncorporatedLinkingPrivacytotheEthicalUseofTechnologyNewtechnologychallengesprivacyinunimaginableways.Newtechnology,however,doesnotnecessarilyimpactourvaluejudgments.Butnewtechnologyinsteadprovidesnewwaystogathertheinformationonwhichtobasethem.Thelackoflegislationmeansworkplacedisputesbecomeamatterofcontractlaw.Doweneed"newethics"forthis"neweconomy"?No,becausethesamevaluesoneheldunderpreviouscircumstancesshouldpermeateandrelatetolatercircumstances.However,theperspectiveonebringstoeachexperienceisimpactedbytheunderstandinganduseofnewtechnology.InformationandPrivacy1Tomakeeffectivedecisions,businessesmustanticipatetheperceptionsoftheirstakeholders.Google’smottois:"Don’tbeevil."Yet,GooglecausedcontroversywithitsGmailprivacypolicy.Googleminesauser'semailcontentsandusestheinformationfortargetedadvertising.Itarguesthatusershave‘noreasonableexpectation’ofprivacy.Byfailingtofullycomprehendandplanforitsstakeholders’perceptionsoftheprograms,Googlebreachedethicalboundariesandalsosufferedpublicbacklash.InformationandPrivacy2Moralrequirementsthatneedtobeimposedoninformationiftechnologyisdependentoninformation.Truthfulnessandaccuracy.Thepersonprovidingtheinformationmustbetruthful.Respectforprivacy.Thereceiveroftheinformationmustuseethicallimitsofindividuals'privacy.Respectforpropertyandsafetyrights.Areasofpotentialvulnerability,includingnetworksecurity,sabotage,theft,andimpersonationareenhancedandmustthereforebeprotected.Accountability.Technologyallowsforanonymityrequiringgreaterpersonalresponsibilityandaccountability.ManagingEmployeesThroughMonitoring1Monitoringemployees’workisoneofthemostprevalentformsofinformationgatheringintheworkplace.Technologyaffordsaneffective,lowcostmonitoringability.SurveyconductedbytheAmericanAcademyofManagementfoundthatnearly80%oflargecompaniesgatherinformationthroughemailmonitoringandalsointernetusemonitoring.ManagingEmployeesThroughMonitoring2Employeeshavecometoexpectthattheiremailsarethepropertyof—oratleastsubjecttosearchby—theiremployers.Internetusemonitoringisevolvingassocialmediagrows.Employersareconcernedaboutemployeeproductivityandwhethertheiremployeesmaybringtoomuchoftheirpersonallivestotheworkplace.Employeemonitoringchallengesbodyautonomybyusingbiotrackingtechnologyandbadgesthatmonitorthetone,gender,andlivelocationofemployees.Theseapplicationscanbecomeintrusiveforemployees.ManagingEmployeesThroughMonitoring3Whenmanaginginformation,ethicalissuesmaynotbeobvious.Whenwedonotcompletelyunderstandthetechnologyinvolved,wemightnotunderstandtheethicalimplicationsofourdecisions.Welosetheabilitytoprotectourowninformationeffectivelybecausewemaynotunderstand:Theimpactonourautonomy,Thecontrolofourinformation,Ourreciprocalobligations,orWhatmightbebestforourpersonalexistence.ManagingEmployeesThroughMonitoring4Ethicalissuesareenhancedbytheknowledgegapexistingbetweenpeoplewhodounderstandthetechnologyandotherswhoareunabletoprotectthemselvesbecausetheydonotunderstand.Technologyallowsforaccesstoinformationthatwasneverbeforepossible.Itcanbedonewithouttherecipient'sknowledgeorevenunintentionally.Technologymeansweareseldomoutoftheboundariesofourworkplace.Ourtotalaccessibilitycreatesnewexpectations,andthereforeconflicts.ManagingEmployeesThroughMonitoring5Continuoustechnologicalaccessibilityblursthelinesbetweenpersonalandprofessionallives.Employeesmightnotappreciate24by7accessibilitybecauseoftheirinterestinsocialmediaandbeingcaughtactiveonit.Technologyresultsinmorefacelesscontacts.E-mail,texting,andsocialmediapostsdonotcarrythesameweightas'puttingitinwriting.'Giventheeaseandinformalityofelectroniccommunicationwearemorecarelesswithourcommunications.WhyDoFirmsMonitorTechnologyUsage?1Employersneedtomanagetheirworkplacesto:Placeworkersinappropriatepositions,Toensurecompliancewithaffirmativeactionrequirements,orToadministerworkplacebenefits.Allowsmanagerstoensureeffectiveperformancebypreventinglostproductivityduetoinappropriatetechnologyuseiftheemployeeisawarethathewillbemonitored.WhyDoFirmsMonitorTechnologyUsage?2Monitoringoffersemployersamethodtoprotectitsotherresources.Protectsproprietaryinformationandguardsagainsttheft.Protectstheirequipmentandbandwidth.Protectsagainstlegalliability.ManagingEmployeesThroughMonitoring28%ofemployershavefiredworkersforusingtheInternetduringtheworkdayfornon-work-relatedactivity.18%havefiredworkersbecauseofpostsonsocialmediaRacist,sexist,orinappropriatepostsorcomments.MonitoringEmployeesThroughDrugTesting1Employershavehadalonghistoryofmonitoringbydrugtestingthanbytechnologymonitoring.Theemployerhasastrongargumentinfavorofdrugtestingbasedonthelaw.Theemployerwouldbeheldresponsibleforlegalviolationsthatitsemployeescommitandhence,theirinterestincontrollingeveryaspectincreases.Employeesmayarguethattheirdrugusageisrelevantonlyifitimpactstheirjobperformance.Thelegalizationofmarijuanainsomeplaceshasmadeforcomplicatedworkplacedilemmas.MonitoringEmployeesThroughDrugTesting2Courtsinseveralstateshaveruledthatanemployeetestingpositiveformarijuanamayprevailagainstanemployerundercertaincircumstances,eveniftheemployerisenforcingdrug-freeworkplacepolicies.Determiningwhentheuseoccurredisstillthedifficultquestiontoanswer.Employersincountrieswheremarijuanaislegalizedorwherepossessionispermittedmayprohibititsuseatworkandemployeesfrombeingatworkwhileimpaired.Therefore,employersmaytesttheirworkerstodetermineimpairment.MonitoringEmployeesThroughDrugTesting3Employersmightconducttestingonaregularbasisbasedoncharacteristicsrelatedtotheemployee'sjobperformanceandworkplacebehavior.ThesecharacteristicsareofferedbytheNationalCouncilonAlcoholismandDrugDependenceas“warningsignsofdruguse.”Testingoccursbothduringemploymentandalsopreemployment.Forthecompaniesthathavedrugtestingrequirements,therearelegalrealitiestoconsider.TheAmericanswithDisabilitiesAct(ADA)prohibitsemployersfrominquiringaboutanemployee’suseofprescriptiondrugsunlesstheemployerhasareasonablebasisforbelievingthattheworkerposesasafetythreatorisunabletodohisorherjob.OtherFormsofMonitoring1Employersarelimitedintheircollectionofinformationthroughotherformsoftesting,suchaspolygraphsormedicaltests.MedicalinformationisprotectedbytheAmericanswithDisabilitiesActbutalsobytheHealthInsurancePortabilityandAccountabilityAct(HIPAA).HIPPAstipulatesthatemployerscannotuse"protectedhealthinformation"withoutpriorconsent.OtherFormsofMonitoring2Polygraphsanddrugtesting,physicalandelectronicsurveillance,third-partybackgroundchecks,andpsychologicaltestinghaveallbeenusedtogainemployeeinformation.Useofelectronicmonitoringandsurveillanceisincreasing.Wheremightthispracticeheadtowardinthefuture?Oneareasuretoprovidenewquestionsonprivacyisgenetictesting.TheGeneticInformationNon-DiscriminationAct(GINA)2008prohibitsdiscriminationbasedongeneticinformation.UnderGINA,yourgeneticinformationisalsoyourfamily’smedicalhistory.OtherFormsofMonitoring3GINAdoesprovideforexceptions.Anemployercancollectgeneticinformationto:ComplywiththeFamilyMedicalLeaveAct(FMLA).Monitorthebiologicaleffectsoftoxinsintheworkplace.Ifcollected,theinformationmayonlybereleasedundercertaincircumstances.EEOCissuedclarifyingguidelinesin2010thatincludea“safeharbor”liabilityexceptionforemployersthatinadvertentlyreceivegeneticinformationinresponsetoalawfulmedicalinquiry.EthicsandBusinessThingsdonotchange;wechange. HenryDavidThoreauBusinessReasonstoLimitMonitoringMonitoringmaycreateasuspiciousandhostileworkplace.Theemployerisneglectingakeystakeholder—theworker.Monitoringmayconstraineffectiveperformancesinceitcan:Causeincreasedstressandnegativelyimpactperformance.Causeinjuriessuchascarpaltunnelsyndrome.Leadtounhappy,disgruntledworkers.Employeesclaimthatmonitoringisaninherentinvasionofprivacythatviolatestheirfundamentalhumanrighttoprivacy.BalancingInterests1Monitoringcanbemademoreethicalorhumane.Hawthorneeffect:Notifyingworkerswhentheyarebeingmonitored.Eveniftheyareunabletoprepareinadvance,theemployeesareabletoensurethattheyareontheirbestbehaviorduringthosecalls.Workersarefoundtobemoreproductivebasedonthepsychologicalstimulusofbeingsingledout.Strivingtowardabalancethatrespectsindividualdignitywhilealsoholdingindividualsaccountablefortheirrolesintheorganization.Amonitoringprogramdevelopedaccordingtothemission,thenimplementedinamannerthatremainsaccountabletotheimpactedemployees,approachesthatbalance.ParametersforaMonitoringPolicyNomonitoringinprivateareas(Example:restrooms).Limitmonitoringtowithintheworkplace.Employeesshouldhaveaccesstoinformationgatheredduringmonitoring.Nosecretmonitoring–advancenoticerequired.Monitoringshouldonlyresultinattainingsomebusinessinterest.Employermayonlycollectjob-relatedinformation.Thereneedstobeadisclosureagreementregardingthemonitoring.Nodiscriminationbyemployersbasedonoff-workactivities.BalancingInterests2PhilosopherWilliamParentsuggestsweasksixquestionstodeterminewhetheractionsarejustifiableorhavethepotentialforaninvasionofprivacyorliberty.Forwhatpurposeistheundocumentedpersonalknowledgesought?Isthispurposealegitimateandimportantone?Istheknowledgesoughtthroughinvasionofprivacyrelevanttoitsjustifyingpurpose?Isinvasionofprivacytheonly,ortheleastoffensive,meansofobtainingtheknowledge?Whatrestrictionsorproceduralrestraintshavebeenplacedontheprivacy-invadingtechniques?Howwillthepersonalknowledgebeprotectedonceithasbeenacquired?RegulationofOff-WorkActs1Regulationofoff-workactivitiesisaninterestingissue,particularlyinat-willenvironments.Evenat-willemployersmustcomplywithavarietyofstatestatutes.Mostbusinessescannotdiscriminateagainstsmokersbutsomecompaniesencourageemployeestoquit.OnestateandsixU.S.citiesbandiscriminationonthebasisofweight.Lawsprotectingagainstdiscriminationbasedonmaritalstatusexistinjustunderhalfthestates.Notnecessarilyprotectedagainstactionbasedonwhotheymarried.Twenty-onestatesandtheDistrictofColumbiaprohibitemploymentdiscriminationonthebasisofsexualorientation.RegulationofOff-WorkActs2Moststatutesprovideforemployerdefenseforrulesthat:Arereasonablyandrationallyrelatedtotheemploymentactivitiesofaparticularemployee.Constitutea"bonafideoccupationalrequirement."Meaningarulethatisreasonablyrelatedtothatparticularposition.Arenecessarytoavoidaconflictofinterestortheappearanceofconflictofinterest.RegulationofOff-WorkActs3Thequestionofmonitoringemployeeonlinecommunicationwhileoffworkisrelevanttotechnologymonitoring.Ariseswithoutmuchlegalguidance.Demandssensitiveethicaldecisionmaking.Isitethicaltoseekoutonlineinformationprohibitedfromajobinterview,suchasreligion?Lawsvaryfromcountrytocountryandalsofromstatetostate.PrivacyRightsSinceSeptember11,200119/11hadamajorimpactonprivacywithintheU.S.andontheemploymentenvironment,inparticular.ThemostpublicizedmodificationwastheadoptionandimplementationoftheUnitingandStrengtheningAmericabyProvidingAppropriateToolsRequiredtoInterceptandObstructTerrorism(USAPATRIOT)Actof2001.Expandsstates'rightswithregardtoInternetsurveillance,includingworkplacesurveillancetechnology,andamendedtheElectronicCommunicationPrivacyAct.Grantsaccesstosensitivedatawithonlyacourtorderratherthanawarrantandimposescriminalpenaltiesforaidingterrorists.Newdisclosureregimeallowsincreasedsharingofinformationbetweengovernmentagenciestoincreaseprotection.PrivacyRightsSinceSeptember11,20012TitleTwoofthePATRIOTActprovidesforthefollowingenhancedsurveillanceprocedures:Expandsauthoritytointerceptwire,oral,andelectroniccommunicationsrelatedtoterrorism,computerfraud,andabuseoffenses.ProvidesrovingsurveillanceauthorityundertheForeignIntelligenceSurveillanceAct(FISA)of1978totrackindividuals.Allowsnationwideseizureofvoice-mailmessagespursuanttowarrants.Broadensthetypesofrecordsthatlawenforcementmayobtainfromelectronicserviceproviders.Permitsemergencydisclosureofelectroniccommunicationstoprotectlifeandlimb.Providesnationwideserviceofsearchwarrantsforelectronicevidence.PrivacyRightsSinceSeptember11,20013TheprovisionsunderthePATRIOTActallowthegovernmenttomonitoranyoneontheInternetbycontendingitis"relevant"toacriminalinvestigation.ThePATRIOTActcombatsmoneylaunderingorthefundingofterroristorcriminalactivitythroughcorporateactivityorotherwise.Financialinstitutionsmustnowreportsuspiciousactivitiesandkeeprecordofforeignnationalemployees.PrivacyRightsSinceSeptember11,20014ThePATRIOTActhasbeenreauthorizedthreetimes.Elementshavebeenamended,revised,andextendedbyseveraladditionalbills.ThePATRIOTActallowsforandreliesonrequestsfrombusinessestogatherinformation.However,itwasrevealedthattheNationalSecurityAgency(NSA)washarvestingcontactlists,searchingemailcontent,andtrackingandmappingcellphonelocations.Manyorganizationsnownotifyusersofrequestsforinformationpriortodisclosureunlessprohibitedbystatuteorcourtorder.ChapterEight:EthicsandMarketingCopyright?2021McGraw-HillEducation.Allrightsreserved.NoreproductionordistributionwithoutthepriorwrittenconsentofMcGraw-HillEducation.ChapterObjectives1Afterreadingthischapter,youwillbeableto:Applyanethicalframeworktomarketingissues.Describethethreekeyconcernsofethicalanalysisofmarketingissues.Describetwointerpretationsof"responsibility"andapplythemtothetopicofproductsafety.Explaincontractualstandardsforestablishingbusiness’sresponsibilitiesforsafeproducts.Articulatethetortstandardsforestablishingbusiness’sresponsibilitiesforsafeproducts.Analyzetheethicalargumentsforandagainststrictproductliability.Discusshowtoevaluatebothethicalandunethicalmeansbywhichtoinfluencepeoplethroughadvertising.ChapterObjectives2Afterreadingthischapter,youwillbeableto:Explaintheethicaljustificationforadvertising.Tracedebatesaboutadvertising’sinfluenceoncustomerautonomy.Distinguishethicalfromunethicaltargetmarketing,usingmarketingtovulnerablepopulationsasanexample.Discussbusiness’sresponsibilitiesfortheactivitiesofitssupplychain.EthicsandMarketing1Amagazineissimplyadevicetoinducepeopletoreadadvertising. JamesCollinsIntroduction1

Somebelievetheverypurposeofbusinessisfoundwithinthemarketingfunction.TheAmericanMarketingAssociationdefinesmarketinginawaythatechoesthestakeholdermodelofCSRinChapter5.AccordingtotheAMA,marketingis"anorganizationalfunctionandasetofprocessesforcreating,communicating,anddeliveringvaluetocustomersandformanagingcustomerrelationshipsinwaysthatbenefittheorganizationanditsstakeholders."Anexchangebetweenasellerandabuyeriscentraltothemarketeconomyandthecoreideabehindmarketing.Marketingethicsexaminestheresponsibilitiesassociatedwithbringingaproduc

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論