The Legal Environment of Business: Text and Cases (MindTap Course List)
10th Edition
ISBN: 9781305967304
Author: Frank B. Cross, Roger LeRoy Miller
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 9, Problem 2BS
Summary Introduction
Case summary:The company SY is an online social networking company. The company SY launched a program that allows its members to share what they do elsewhere like renting a DVD with others.
To find:Way the company SY can avoid complaints of breach of privacy.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
LinkedIn: Employees’ Privacy vs. Employer’s Reputation
With the growing use of social media, employers need to determine how much they should monitor their employees’ use of social media. An employee may post something that is confidential to the employer or harm the reputation of the employer. If not monitored, and stopped, long term damage can be done to the employer. On the other hand, without probable cause, an employer can be seen as overacting and invading the employee’s personal privacy by monitoring the social media posts. Social media use by employees can be an asset as the employee can be an advocate for the employer or it could be a liability if the employee posts harmful information.
Aside from the legal requirements, how should the principles of justice shape any efforts by employers to monitor employees’ personal use of social media?
In 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used toinvestigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. “Not only did investigators impersonate board members, employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for CNet Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who had launched the quest to identify media sources in the first place.” The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting clerical or custodial…
In 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used toinvestigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. “Not only did investigators impersonate board members, employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for CNet Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who had launched the quest to identify media sources in the first place.” The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting clerical or custodial…
Chapter 9 Solutions
The Legal Environment of Business: Text and Cases (MindTap Course List)
Knowledge Booster
Similar questions
- In 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used toinvestigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. “Not only did investigators impersonate board members, employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for CNet Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who had launched the quest to identify media sources in the first place.” The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting clerical or custodial…arrow_forwardIn 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used to investigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. “Not only did investigators impersonate board members, employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for CNet Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who had launched the quest to identify media sources in the first place.” The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting clerical or custodial…arrow_forwardIn 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used to investigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. "Not only did investigators impersonate board members, employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for CNet Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who had launched the quest to identify media sources in the first place." The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting clerical or custodial…arrow_forward
- GSK recognizes that commercial pressures and complex regulatory environments can present employees with difficult ethical situations. GSK provides guidance and support for them backed by rigorous auditing and action if misconduct is identified. The company’s code of conduct promotes honest and ethical conduct by setting out the standards to be followed by GSK’s employees in their everyday work for the company. The code is communicated both within and outside the company. A separate publication, ‘‘The Employee guide to Business conduct’’, helps employees to understand the meaning of code in practice and its acceptable and unacceptable behavior. Managers are required to set an example and ensure that all their staff receives guidance, training and supervision on ethical behavior and legal compliance relevant to their jobs. Senior managers formally certify their adherence to the code and other GSK policies and standards. GSK has audit systems to help identify and deal with cases of…arrow_forwardCindy Bonfield posted the following on her Facebook, "My friend Eliza just stole an Apple phone from Walmart. Can you believe it?" Eliza was working at the time and did not steal the phone. Which of the following statements is true? a. Cindy has defamed Eliza. b. Cindy has not defamed anyone because not many people would know who Eliza is. c. Cindy was just mistaken and is not liable for defamation.arrow_forward1. How important is privacy to you personally? Describe a situation, work-related or otherwise, in which you felt your privacy was threatened. 2. Does business have a responsibility to provide employees with more satisfying work lives? Or to better accommodate their family needs? State sources that were used to answer questions if anyarrow_forward
- A coworker confides to you that he is going to begin sending emails to your employer's internal corporate blog site, which serves as a suggestion box. He plans to use an anonymous remailer and sign the messages "Anonymous." Your friend is afraid of retribution from superiors but wants to call attention to instances of racial and gender discrimination observed during his five years as an employee with the firm. What would you say to your friend?arrow_forwardIn 2006, Hewlett-Packard Development Company LP became embroiled in a controversy over methods used to investigate media leaks from its board. HP Chairperson Patricia Dunn could have simply asked the directors who was the source cited in the story, sought an apology and gone from there. With some direct face-to-face communication, the story would likely have ended quickly. It did not. "Not only did investigators impersonate board members employees and journalists to obtain their phone records, but according to multiple reports, they also surveilled an HP director and a reporter for Net Networks Inc. They sent monitoring spyware in an e-mail to that reporter by concocting a phoney tip. They even snooped on the phone records of former CEO and Chairperson Carly Fiorina, who had launched the quest to identify media sources in the first place. The situation continued to escalate. For example, the New York Times reported that HP consultants even considered planting clerical or custodial…arrow_forwardWhistle-blowing is a situation when an employee informing the public about the illegal or immoral behavior of an employer or an organization. Discuss FIVE (5) situations when whistle-blowing is morally justified.arrow_forward
- On November 24, 2014, employees of Sony Pictures Entertainment booted up their computers to find an image of a skull along with a message from a group calling itself the Guardians of Peace. The message read: "We've already warned you and this is just the beginning. We've obtained all your internal data including your secrets and top secrets [which will be released] if you don't obey us." As Sony would eventually discover, the hackers had stolen reams of sensitive data, including the Social Security numbers of 47,000 current and former employees, system passwords, salary lists, contracts, and even copies of some Sony employees' passports. The hackers accessed hundreds of Outlook mailboxes as well as Sony IT audit documents. They also stole media files and placed pirated copies of five of Sony's movies on illegal file-sharing servers. Sony was forced to completely shut down its information systems in an attempt to stem the data breach. Ultimately, Sony would determine that the damage…arrow_forwardA whistleblower uses nonpublic knowledge or even top-secret knowledge to make illegal or unethical circumstances in a company public. Each employee signs in his contract a Non- Disclosure-Agreement to protect data and insider knowhow of the company. Under which circumstances is whistleblowing ethical, und which circumstances it is not ethical? Support your argumentation with the congruent ethical theories.arrow_forwardMost companies have policies that regulate employees’ personal use of work computers during work hours. Some even monitor employee e-mails and track the Web sites that have been visited. Do you consider this type of surveillance an invasion of privacy? What are the advantages of restricting employee use of the Internet and e-mail at work?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- BUSN 11 Introduction to Business Student EditionBusinessISBN:9781337407137Author:KellyPublisher:Cengage LearningEssentials of Business Communication (MindTap Cou...BusinessISBN:9781337386494Author:Mary Ellen Guffey, Dana LoewyPublisher:Cengage LearningAccounting Information Systems (14th Edition)BusinessISBN:9780134474021Author:Marshall B. Romney, Paul J. SteinbartPublisher:PEARSON
- International Business: Competing in the Global M...BusinessISBN:9781259929441Author:Charles W. L. Hill Dr, G. Tomas M. HultPublisher:McGraw-Hill Education
BUSN 11 Introduction to Business Student Edition
Business
ISBN:9781337407137
Author:Kelly
Publisher:Cengage Learning
Essentials of Business Communication (MindTap Cou...
Business
ISBN:9781337386494
Author:Mary Ellen Guffey, Dana Loewy
Publisher:Cengage Learning
Accounting Information Systems (14th Edition)
Business
ISBN:9780134474021
Author:Marshall B. Romney, Paul J. Steinbart
Publisher:PEARSON
International Business: Competing in the Global M...
Business
ISBN:9781259929441
Author:Charles W. L. Hill Dr, G. Tomas M. Hult
Publisher:McGraw-Hill Education