Skip to main content
Log in

Securing privacy at work: the importance of contextualized consent

  • Original Paper
  • Published:
Ethics and Information Technology Aims and scope Submit manuscript

Abstract

The starting point of this article is that employees’ chances of securing reasonable expectations of privacy at work must be better protected. A dependency asymmetry between employer and job-applicant implies that prospective employees are in a disadvantaged position vis à vis the employer regarding the chances of defending their reasonable interests. Since an increased usage of work related surveillance will, to a larger extent, require of job-applicants that they negotiate their privacy interests in employment contracting, it is important to consider means of strengthening employees’ negotiating power. This article emphasizes the importance of contextualizing consent for contractual agreements to be ethically acceptable.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Alpert, S. A. (2003) Protecting medical privacy: Challenges in the age of genetic information. Journal of Social Issues, 59(2).

  • Beauchamps, T., Faden, R., & King, A. (1986). History and theory of informed consent. US: Oxford University Press.

    Google Scholar 

  • Bentham, J. (1787). In M. Bozovic (Ed.), The Panoptic Writings. London: Verso (Reprinted in 1985).

  • Berg, J., Appelbaum, P., Lidz, C., & Parker, L. (2001). Informed consent: Legal theory and clinical practice. US: Oxford University Press.

    Google Scholar 

  • Bloustein, E. (1964). Privacy as an aspect of human dignity: An answer to Dean Possner. New York University Law Review, 39, 962–1007.

    Google Scholar 

  • Brey, P. (2005). The importance of privacy in the workplace. In S. O. Hansson & E. Palm (Eds.), The ethics of workplace privacy. Brussels: P.I.E Lang Publisher.

    Google Scholar 

  • Brown, W. S. (2000). Ontological security, existential anxiety and workplace privacy. Journal of Business Ethics, 23(1), 61–65.

    Article  Google Scholar 

  • Clarke, R. (1994). The digital persona and its’ application to data surveillance. The Information Society, 10, 77–92.

    Google Scholar 

  • Cohen, J. L. (2002). Regulating intimacy—A new legal paradigm. Princeton and Oxford: Princeton University Press.

    Google Scholar 

  • Elster, J. (1983). Sour grapes: Studies in the subversion of rationality. Cambridge: Cambridge University Press.

    Google Scholar 

  • European Industrial Relations Observatory. (2003). New technology and respect for privacy at the workplace. Brussels: European Foundation for the Improvement of Living and Working Conditions.

  • Foucault, M. (1975). Discipline and punish: The birth of the prison. New York: Vintage Books. (1995).

    Google Scholar 

  • Fried, C. (1984). Privacy (A moral analysis). In F. D. Schoeman (Ed.), Philosophical dimensions of privacy: An anthology. Cambridge: Cambridge University Press.

    Google Scholar 

  • Goffman, E. (1971). Relations in public: Microstudies of the public order. New York: Basic Books.

  • Hoeren, T., & Eustergerling, S. (2005). Privacy and data protection at the workplace in Germany. In J. Nouwt, B. R. Vries, & J. E. J. Prins (Eds.), Reasonable expectations of privacy? Eleven Country reports on camera surveillance and workplace privacy. The Hague: TMC Asser Press.

    Google Scholar 

  • Lennerfors T. (2004). GPS—guard, pathfinder or surveillance? MA-thesis Stockholm. The Royal Institute of Technology (KTH).

  • Lever, A. (2005). Feminism, democracy and the right to privacy. Minerva: An Internet Journal of Philosophy, 9, 1–31.

    Google Scholar 

  • Levin, A. (2005). Dignity in the workplace. Proceedings of Academy of Legal Studies in Business (ALSB). San Fransisco.

  • Maitland, I. (2001). Distributive justice in firms: Do the rules of corporate governance matter? Business Ethics Quarterly, 11(1), 129–143.

    Google Scholar 

  • Miller, S., & Weckert, J. (2000). Privacy, the workplace and the internet. Journal of Business Ethics, 28, 255–265.

    Article  Google Scholar 

  • Nozick, R. (1974). Anarchy, state and utopia. New York: Basic Books.

    Google Scholar 

  • Palm, E. (2009). Privacy expectations at work—What is reasonable and why? Ethical Theory and Moral Practice, 12(2), 201–215.

    Google Scholar 

  • Peter, F. (2004). Choice, consent and the legitimacy of market transactions. Economics and Philosophy, 20, 1–18.

    Article  MathSciNet  Google Scholar 

  • Phillips, D. J. (2005). Privacy and data protection in the workplace: The US case. In J. Nouwt, B. R. Vries, & J. E. J. Prins (Eds.), Reasonable expectations of privacy? Eleven country reports on camera surveillance and workplace privacy. The Hague: TMC Asser Press.

    Google Scholar 

  • Rachels, J. (1975). Why privacy is important. Philosophy and Public Affairs, 4, 323–333.

    Google Scholar 

  • Rawls, J. (1971). A theory of justice. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Rawls, J. (2001). Justice as fairness—A restatement. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Regan, P. M. (1995). Legislating privacy—Technology, social values and public policy. Chapel Hill: University of North Carolina Press.

    Google Scholar 

  • Rössler, B. (Ed) (2004). Privacies—philosophical evaluation. Stanford, CA: Stanford University Press.

  • Rössler, B. (2005). The value of privacy. Cambridge: Polity Press.

  • Scanlon, T. (1975). Thomson on privacy. Philosophy & Public Affairs, 4(4), 315–322.

    Google Scholar 

  • Scanlon, T. M. (1998). What we owe to each other. Cambridge, MA: Belknap Press.

  • Simmel, G. (1995). Die Grossstädte und das Geistesleben. In R. Kramme, A. Rammstedt & O. Rammstedt (Eds.), Georg Simmel Aufsätze und Abhandlungen 1901–1908 (Vol. 1). Frankfurt-am-Main.

  • Tavani, H. (2007). Philosophical theories of privacy: Implications for an adequate online privacy policy. Metaphilosophy, 38(1) (January), 1–22.

    Google Scholar 

  • The Declaration of Helsinki, World Medical Association, Available from: www.wma.net/e/ethicsunit/helsinki.htm. Accessed 24 Sept 2009.

  • van den Hoven, J. (2000). Reflective equilibrium, technological design and direction of fit. In B. Petersson (Ed.), Applied ethics and reflective equilibrium, studies in applied ethics 8. Sweden: Unitryck Linköpings universitet.

    Google Scholar 

  • Voukko, R. (2007). Interdependence and control at work: Social issues in transforming care work with mobile technology. Proceedings of ETHICOMP; the ninth international conference (pp. 621–632).

  • Williams, B. (1994). Shame and necessity. London: University of California Press Ltd.

    Google Scholar 

  • Zuboff, S. (1988). In the age of the smart machine. London: Heineman.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Elin Palm.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Palm, E. Securing privacy at work: the importance of contextualized consent. Ethics Inf Technol 11, 233 (2009). https://doi.org/10.1007/s10676-009-9208-8

Download citation

  • Published:

  • DOI: https://doi.org/10.1007/s10676-009-9208-8

Keywords

Navigation