Abstract
The starting point of this article is that employees’ chances of securing reasonable expectations of privacy at work must be better protected. A dependency asymmetry between employer and job-applicant implies that prospective employees are in a disadvantaged position vis à vis the employer regarding the chances of defending their reasonable interests. Since an increased usage of work related surveillance will, to a larger extent, require of job-applicants that they negotiate their privacy interests in employment contracting, it is important to consider means of strengthening employees’ negotiating power. This article emphasizes the importance of contextualizing consent for contractual agreements to be ethically acceptable.
Similar content being viewed by others
References
Alpert, S. A. (2003) Protecting medical privacy: Challenges in the age of genetic information. Journal of Social Issues, 59(2).
Beauchamps, T., Faden, R., & King, A. (1986). History and theory of informed consent. US: Oxford University Press.
Bentham, J. (1787). In M. Bozovic (Ed.), The Panoptic Writings. London: Verso (Reprinted in 1985).
Berg, J., Appelbaum, P., Lidz, C., & Parker, L. (2001). Informed consent: Legal theory and clinical practice. US: Oxford University Press.
Bloustein, E. (1964). Privacy as an aspect of human dignity: An answer to Dean Possner. New York University Law Review, 39, 962–1007.
Brey, P. (2005). The importance of privacy in the workplace. In S. O. Hansson & E. Palm (Eds.), The ethics of workplace privacy. Brussels: P.I.E Lang Publisher.
Brown, W. S. (2000). Ontological security, existential anxiety and workplace privacy. Journal of Business Ethics, 23(1), 61–65.
Clarke, R. (1994). The digital persona and its’ application to data surveillance. The Information Society, 10, 77–92.
Cohen, J. L. (2002). Regulating intimacy—A new legal paradigm. Princeton and Oxford: Princeton University Press.
Elster, J. (1983). Sour grapes: Studies in the subversion of rationality. Cambridge: Cambridge University Press.
European Industrial Relations Observatory. (2003). New technology and respect for privacy at the workplace. Brussels: European Foundation for the Improvement of Living and Working Conditions.
Foucault, M. (1975). Discipline and punish: The birth of the prison. New York: Vintage Books. (1995).
Fried, C. (1984). Privacy (A moral analysis). In F. D. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology. Cambridge: Cambridge University Press.
Goffman, E. (1971). Relations in public: Microstudies of the public order. New York: Basic Books.
Hoeren, T., & Eustergerling, S. (2005). Privacy and data protection at the workplace in Germany. In J. Nouwt, B. R. Vries, & J. E. J. Prins (Eds.), Reasonable expectations of privacy? Eleven Country reports on camera surveillance and workplace privacy. The Hague: TMC Asser Press.
Lennerfors T. (2004). GPS—guard, pathfinder or surveillance? MA-thesis Stockholm. The Royal Institute of Technology (KTH).
Lever, A. (2005). Feminism, democracy and the right to privacy. Minerva: An Internet Journal of Philosophy, 9, 1–31.
Levin, A. (2005). Dignity in the workplace. Proceedings of Academy of Legal Studies in Business (ALSB). San Fransisco.
Maitland, I. (2001). Distributive justice in firms: Do the rules of corporate governance matter? Business Ethics Quarterly, 11(1), 129–143.
Miller, S., & Weckert, J. (2000). Privacy, the workplace and the internet. Journal of Business Ethics, 28, 255–265.
Nozick, R. (1974). Anarchy, state and utopia. New York: Basic Books.
Palm, E. (2009). Privacy expectations at work—What is reasonable and why? Ethical Theory and Moral Practice, 12(2), 201–215.
Peter, F. (2004). Choice, consent and the legitimacy of market transactions. Economics and Philosophy, 20, 1–18.
Phillips, D. J. (2005). Privacy and data protection in the workplace: The US case. In J. Nouwt, B. R. Vries, & J. E. J. Prins (Eds.), Reasonable expectations of privacy? Eleven country reports on camera surveillance and workplace privacy. The Hague: TMC Asser Press.
Rachels, J. (1975). Why privacy is important. Philosophy and Public Affairs, 4, 323–333.
Rawls, J. (1971). A theory of justice. Cambridge, MA: Harvard University Press.
Rawls, J. (2001). Justice as fairness—A restatement. Cambridge, MA: Harvard University Press.
Regan, P. M. (1995). Legislating privacy—Technology, social values and public policy. Chapel Hill: University of North Carolina Press.
Rössler, B. (Ed) (2004). Privacies—philosophical evaluation. Stanford, CA: Stanford University Press.
Rössler, B. (2005). The value of privacy. Cambridge: Polity Press.
Scanlon, T. (1975). Thomson on privacy. Philosophy & Public Affairs, 4(4), 315–322.
Scanlon, T. M. (1998). What we owe to each other. Cambridge, MA: Belknap Press.
Simmel, G. (1995). Die Grossstädte und das Geistesleben. In R. Kramme, A. Rammstedt & O. Rammstedt (Eds.), Georg Simmel Aufsätze und Abhandlungen 1901–1908 (Vol. 1). Frankfurt-am-Main.
Tavani, H. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38(1) (January), 1–22.
The Declaration of Helsinki, World Medical Association, Available from: www.wma.net/e/ethicsunit/helsinki.htm. Accessed 24 Sept 2009.
van den Hoven, J. (2000). Reflective equilibrium, technological design and direction of fit. In B. Petersson (Ed.), Applied ethics and reflective equilibrium, studies in applied ethics 8. Sweden: Unitryck Linköpings universitet.
Voukko, R. (2007). Interdependence and control at work: Social issues in transforming care work with mobile technology. Proceedings of ETHICOMP; the ninth international conference (pp. 621–632).
Williams, B. (1994). Shame and necessity. London: University of California Press Ltd.
Zuboff, S. (1988). In the age of the smart machine. London: Heineman.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Palm, E. Securing privacy at work: the importance of contextualized consent. Ethics Inf Technol 11, 233 (2009). https://doi.org/10.1007/s10676-009-9208-8
Published:
DOI: https://doi.org/10.1007/s10676-009-9208-8