Privacy Issue at Bingo Bank

In: Philosophy and Psychology

Submitted By jjmy89
Words 604
Pages 3
The ethical issue identified questions if it is right for BB to implement the 8-minute rule and surveillance system to limit employees’ personal break time in order to reduce customer waiting time, when doing so infringes upon the employees’ rights to fairness and privacy?

Kantian ethics is the most relevant here as the tension results from conflicting rights and duties. This 8 minutes policy promotes the rights of BB, its shareholders and customers. However, even though employees have a duty to adhere to this policy, doing so would be incongruent with their moral rights to fairness and privacy. The employees are not being respected as equal and autonomous persons capable of making decisions in their own life, and physical privacy is violated when they are no longer able to have private personal time as and when required, without being monitored.

This perspective identifies which rights and duties are in conflict, to be be addressed in the recommendations. Rawlsian ethics is also relevant as it helps to prioritize the conflicting rights and duties. Under the veil of ignorance, no rational and self-interested employer who could now be at the receiving end of the policy would want to risk having his privacy infringed upon. Hence, this perspective helps to decide which rights cannot be sacrificed for others. Lastly, the Utilitarian perspective here helps to analyze and weigh the consequences of each decision made. The analysis shows that short term benefits of a policy, even to the majority, is not substantial to justify a potential long term harm to the majority, even if not implementing the policy does not in itself result in much pleasure for any stakeholder in the present. Although both virtue ethics and ethics of care are applicable in evaluating this case, we have not focused on them as they do not offer as much direction for deriving practical…...

Similar Documents

How Privacy Issues Affect Businesses

...CONTEMPORARY BUSINESS ISSUES – PRIVACY IN THE WORKPLACE How Privacy Issues Affect Businesses How Privacy Issues Affect Businesses The existing economic and business setting implies on-going efforts towards better understanding and dealing with the challenges of the modern era, which are characterized by the crucial need for making changes due to intense competition and ongoing global crisis’. As a rule, privacy rights are established by explicit regulations, laws or rules. Some privacy rights are relevant in the workplace and some don't. And even if there is no particular law, a right to privacy can be based on the legal common law notion of having a "reasonable expectation of privacy”, (Lippke, 1998). For employers and employees in the business industry, privacy concerns have become progressively more widespread in the workplace, and with the increased use of electronic resources, privacy at work is even more compound. Consequently, it is imperative that both supervisors and managers have a fundamental understanding of some of the more common privacy rights and issues that can arise, as well as the restrictions that may apply. Some of the more prevalent privacy issues that employees face are drug testing, email monitoring, personnel records, social security numbers, monitoring and eavesdropping, back-ground screening, and medical records. Because of these issues, there are quite a few areas of human capital management in which privacy rights are recognized.......

Words: 2173 - Pages: 9

Unit 3 Individual Project Contracts and Privacy Issues - Contracts

...American Intercontinental University Unit 3 Individual Project Contracts and Privacy Issues - Contracts BUSN150 – Legal and Ethical Environment of Business Professor Eric Baime June 30, 2013 Contracts and Privacy Issues - Contracts 1. What is the difference between an express and an implied contract? A unilateral and a bilateral contract? A contract that is void or voidable? 2. What elements must be in place for formation of a contract? 3. What are three examples of valid consideration? Abstract In this paper the reader will be able to know the different between express and implied contract, unilateral and bilateral contract, and contract that is void or voidable. You will also know the elements you must place for formation of a contract. In conclusion three examples of valid consideration will be given. Introduction What is a contract? Contract a promise or set of promises for reach of which the law gives a remedy, or performance of which the law in ways recognizes as a duty. Contracts are like a set of voluntary promises that the law will enforce for private parties. There are many different types of contracts, and there are differences between the contracts. Explanation of the different types of contracts will be identified below. Differences Contracts are sometimes referred to as express or implied. Implied contract is agreement that is formed by nature of the conduct or behavior of a party, rather than words ( Basically......

Words: 889 - Pages: 4

Biometrics (in Term to Ethic and Privacy Issues)

...BIOMETRICS (IN TERM TO ETHIC AND PRIVACY ISSUES) IFSM201 Section 4035 Semester 1302 DUE DATE 02/03/2013 Introduction Biometrics is the science and technology of measuring and analyzing biological data. In information technology, biometrics refers to technologies that measure and analyzes human body characteristics, such as DNA, fingerprints, eye retinas and irises, voice patterns, facial patterns and hand measurements, for authentication purposes. Authentication by biometric verification is becoming increasingly common in public security systems, cooperate, consumer electronic and point of sale application. In addition to security, the driving force behind biometric verification has been convenience. (Rouse, 2008) In the recent years, civil liberty organization has argued that the collection of biometric data undermines the human rights for privacy and anonymity. (Shaikh, 2005) One of the most oldest and accurate type of biometric systems is fingerprint recognition; it is an extremely useful biometrics technology. Fingerprints have long been recognized as a primary and accurate identification method. It has been used for commercial, government and forensic purposes. Iris recognition system is highly nature technology and provides the most secure methods of authentication and identification thanks to the unique characteristics of the iris. This made the technology very useful in areas such as information security, access security, ATMs and airport......

Words: 657 - Pages: 3

Bingo information (Vermont only); (v) I am seeking employment in a position which requires a financial fiduciary responsibility to the employer or a client of the employer, including the authority to issue payments, collect debts, transfer money, or enter into contracts (Vermont only); (vi) COMPANY can demonstrate that the information is a valid and reliable predictor of employee performance in the specific position being sought or held; (vii) I am seeking employment in a position that involves access to an employer’s payroll information (Vermont only); (viii) the information is substantially job related, and the bona fide reasons for using the information are disclosed to me in writing, (complete the question below) (Connecticut, Maryland, Oregon | | | |1.a. Banks, savings associations, and credit unions with total assets of over |a. Bureau of Consumer Financial Protection | |$10 billion and their affiliates. |1700 G Street NW Washington, DC 20006 | |b. Such affiliates that are not banks, savings associations, or credit unions |b. Federal Trade Commission: Consumer Response Center – FCRA Washington, DC | |also should list, in addition to the Bureau: ......

Words: 3232 - Pages: 13

123 Bingo

...ITT-TECH EN 1320: Composition I Summer Quarter 2014 Human Bingo Grid This ice-breaker is an extremely quick way to get to know one another, you will probably have spoken to everyone else in the room by the time you finish it. The idea of the exercise is to put a different person’s name in each of the boxes in the grid below. You must put a different person’s name in each box. For the boxes marked with an * the person must demonstrate that they can. Therefore, make sure that if someone says they can roll their tongue, you see actually see them doing it. Is left-handed | Has a birthday this month | Can say “Hello” in three languages* | Has met someone famous-who? | Can sing a line from a country-western song* | Has a sister | Has been mistaken for a TV celebrity-who? | Has NOT seen a Harry Potter film | Has been to a different country | Has two or more pets | Is wearing glasses* | Has served in the Armed Forces | FREESPACE | Can repeat “She sells shells” 5 times fast* | Can give examples of a synonym, antonym, and homonym* | Is wearing jewelry* | Has been to a live football game | Can recite a line from Shakespeare* | Has the same eye color as yourself | Can play a musical instrument-what? | Has lived in a different state | Can name 3 different Horror movies* | Can stand on one foot, rub their stomach and pat their head at the same time* | Can roll their tongue* | Was born in a different country |...

Words: 258 - Pages: 2

Privacy Issues

...Technology has given people access to more information than ever before. There was a time that information such as social security numbers and bank accounts could be protected simply by shredding documents. Now this information can be found on the internet by almost anyone unless it is well protected. These laws help protect personal information from unauthorized users. Additionally, it gives the person providing the information certain rights. Each of the following laws have been enacted to provide protection of a person’s private information from unauthorized access. The first law is the Privacy Act of 1974 (PA74). This requires an agency to obtain written permission from the individual providing the information before sharing it with another agency. It is also the right of an individual to access their own information for review and changes, and they may also determine what records pertaining to them are collected, maintained, used or distributed. There are exceptions that allow access to personal records and include law enforcement with a need to know, investigations, or administrative purposes just to name a few. An organization that may use the PA74 would be medical personnel when collecting medical information that will be recorded in a system of records. Another law enacted in 1986 is the Electronic Communications Privacy Act (ECPA). This applies more directly with electronic storage including protection of communications during transport from sender to......

Words: 872 - Pages: 4


...journal homepage: My privacy is okay, but theirs is endangered: Why comparative optimism matters in online privacy concerns Young Min Baek a,⇑, Eun-mee Kim b, Young Bae c a Department of Communication, Yonsei University, Republic of Korea Department of Communication, Seoul National University, Republic of Korea c Department of Information Sociology, Soongsil University, Republic of Korea b a r t i c l e i n f o a b s t r a c t It is easy to trace and compile a record of individuals’ online activities, and cases of online privacy infringement (i.e., improper use of personal information) have been reported in advanced societies. Based on existing risk perception research, this study examines comparative optimism regarding online privacy infringement (i.e., users tend to believe privacy infringement is less likely to happen to oneself than to others) and its antecedents and consequences. Relying on large-scale online survey data in South Korea (N = 2028), this study finds: (1) comparative optimism is higher when the comparison targets are younger; (2) online knowledge and maternalistic personality traits increase comparative optimism mainly by influencing perceived risk to others, while prior experience of privacy infringement increases comparative optimism mainly by influencing perceived personal risk; and (3) comparative optimism is related to both greater adoption of privacy-protective behaviors and a higher level of support......

Words: 5399 - Pages: 22

Cloud Hooks: Security and Privacy Issues in Cloud Computing

...Proceedings of the 44th Hawaii International Conference on System Sciences - 2011 Cloud Hooks: Security and Privacy Issues in Cloud Computing Wayne A. Jansen, NIST Abstract In meteorology, the most destructive extratropical cyclones evolve with the formation of a bent-back front and cloud head separated from the main polar-front, creating a hook that completely encircles a pocket of warm air with colder air. The most damaging winds occur near the tip of the hook. The cloud hook formation provides a useful analogy for cloud computing, in which the most acute obstacles with outsourced services (i.e., the cloud hook) are security and privacy issues. This paper identifies key issues, which are believed to have long-term significance in cloud computing security and privacy, based on documented problems and exhibited weaknesses. • applications can be developed upon and deployed. It can reduce the cost and complexity of buying, housing, and managing hardware and software components of the platform. Infrastructure-as-a-Service (IaaS) enables a software deployment model in which the basic computing infrastructure of servers, software, and network equipment is provided as an on-demand service upon which a platform to develop and execute applications can be founded. It can be used to avoid buying, housing, and managing the basic hardware and software infrastructure components. 1. Introduction Cloud computing has been defined by NIST as a model for enabling convenient,......

Words: 7808 - Pages: 32

Ethical Issues on Confidentiality and Privacy of Patients

...Ethical issues on confidentiality and privacy of patients According to American nursing association article regarding patients medical information’s privacy and confidentiality shows us “Advances in technology, including Computerized Medical Databases, The Internet and Tele-Health, have opened the door to potential, unintentional breaches of private /confidential information of patients, so nurses and other health professionals who regularly work with patients and their confidential medical records should contribute the development of standards ,policies and laws that protect patient privacy and confidentiality of health records .” Due to the fast advancement of technology, it is very hard to protect our privacy in the areas of medical sectors. Many people have access to patient’s medical records including the attending physician, house staff, student, consultant, nurses, social workers, pharmacists, billing staffs and insurance company employees. Although computerized medical records have vital roles to improve the access to medical information efficiently, they allow more serious breaches of confidentiality. For example, confidentiality can be violated at any computer station, and fax and e-mail also present opportunities for confidentiality to be broken. I think in my opinion, keeping medical information confidentially shows respect for patents that except physician to maintain confidentiality, and it plays a vital role in improving employees ethics at work. Furthermore,...

Words: 610 - Pages: 3


...Executive Summary Having created a brilliant product, Bingo, which successfully brought about innovation in the snack market, Ram and Satya at ITC now are now facing problems in maintaining Bingo’s market share. Increased competition, Low quality cheap copies of the product, and low reach are the major drivers of the loss in market share. The task at hand is to improve Bingo’s performance, regain and increase its market share, communicate the brand proposition effectively and increase its reach in various parts of the country especially south. Getting trials with larger masses and maintaining the loyalty of existing franchise are a few potential ways of establishing connect with the customers. Clearly Bingo’s triangle shape is easily imitable, but the customer’s reasons for buying the snack are mainly its taste. The actual value proposition that the consumer seeks in bingo is the taste. In such a scenario, strategies for defense against copycats and discounted players need to be chalked out by communicating the actual brand proposition effectively. In addition, Bingo’s market penetration in Southern India is low as compared with the Northern India We see it as a huge opportunity for research regarding the consumer behavior specific to southern India, cater to their needs, increase reach and establish a solid base. In this analysis, we present our ideas, thoughts and recommendations on how to achieve the task at hand. Bingo’s war......

Words: 740 - Pages: 3

Issues and Challenges Faced by Islamic Banks

...guidance this project would not have materialized. The guidance and support received from all the members who contributed and who are contributing to this project, was vital for the success of the project. We are grateful for their constant support and help. ABSTRACT: This research is conducted just to explore that what are the issues and challenges as also what opportunities are there for the Islamic banks in Pakistan. As Pakistan is a Muslim country and the main population is of Muslims, there is a great importance of Islamic banking in this country and people are getting aware of this financial system. But the main challenge here that is faced by the Islamic banking is that Pakistan govt. is supporting conventional banking more. For this research interviews were taken from the employees and the customers of Islamic banks. These interviews are about the basics of the Islamic banking, about the awareness of Muslim society, the opportunities for the development and growth and the challenges that are faced by the Islamic banks in Pakistan. This research shows that as the Muslims in Pakistan want halal banking and are switching towards Islamic banks as they want to live their lives according to Islam, so there are opportunities for the Islamic financial system in Pakistan. In order to make this financial system successful the banking authorities should educate the people about it and keep them updated with the passage of time. The information system should be......

Words: 12868 - Pages: 52

A Comparative Analysis of Performance Evaluation, Liquidity Gap Analysis and Other Issues of Dutch –Bangla Bank Ltd. and Premier Bank Ltd.

... ID.No.091-11-924 Figure: Return on Asset (ROA) Interpretation: ROA (Return on Asset): ROA is a indicator of managerial efficiency, it indicates how capable the management of bank has been converting the institution’s assets into net earnings. In this example, the DBBL earned in year 2010 is 1.989693165 and in 2009 is 1.39102595.The Premier Bank in year 2010 is 2.632 and 2009 is 2.2988, which means the 2010 is than the 2009 by using tk. 100 of assets. Here we see that Premier Bank is higher on ROA, SO Premier bank is better than DBBL. Return on Equity (ROE): Figure: Return on Equity (ROE) Interpretation: ROE (Return on Equity): ROE is measure of rate of return following to this bank’s shareholder. If approximates the net benefit that the stockholder have received from investing their capital in the bank. For this example, DBBL shareholders will get 2010 is 28.63057606 and 2009 is 26.1431769. The Premier Bank shareholders get in 2010 is $28.0636 and 2009 is 23.4650, which mean the 2010 is than the 2009 by using tk. 100 of assets. Here we see that Premier Bank is higher on ROA, So DBBL is better than Premier Bank. NIM (Net Interest Margin): Figure: NIM (Net Interest Margin) Interpretation: NIM (Net Interest Margin): Net interest margin it measures how large a spread between interest revenue and......

Words: 4896 - Pages: 20


...BINGO Since its launch period in March, 2007, BINGO as a brand has been though a lots of ups and downs. Both Branding and sales and Distribution aspects of marketing for BINGO have been explored and matured to a large extent. Though the product itself is considered to be in a growth stage with a market share of 16% in the branded snacks food category, it has been successful to a large extent in creating the required Brand recall for the category INDIAN SNACK INDUSTRY: Snacks are a part of Consumer Convenience/ Packaged Foods segment. Snack is describes as a small quantity of food eaten between meals or in place of a meal. Snack food generally comprises bakery products, namkeen, ready-to-eat mixes, chips and other light processed foods. According to Ministry of food processing, the snack food industry is worth Rs 100 billion in value and over 4,00,000 tonnes in terms of volume. Though very large and diverse, the snacks industry is dominated by the unorganized sector. According to a survey almost 1,000 snacks items and 300 types of savouries are sold across India. The branded snacks are sold at least 25% higher than the unbranded products. Though there is no particular time for snacks, normally they are consumed at teatime. There is large no. of varieties with specialities from all regions, which have gained national acceptance. The industry has been growing around 10% for the last three years, while the branded segment is growing around 25% per annum to stand at......

Words: 1057 - Pages: 5

Google and Privacy Issues

...[Type the company name] | Google and Privacy Issues | | | Google is the highest used internet search engine and is free for international use. Good and bad exists with everything and although Google provides people all over the world with tons of information, it is constantly being overlooked and controlled by the people who created it and who control it which can be seen as a huge downside for many individuals. There are many critisms of Google such as manipulation of search results, violating people’s privacy and censorship of search results such as page ranking. Although Google provides services that play a large part in many people’s lives for free, it does come at the price of an individual’s personal information and privacy. Google, Facebook and every browser ever created have always gathered data and used that data, but never have these companies created a compilation of personal information based on years of our trusting them. Google has been attempting and has begun to succeed in taking over all of our digital media, from the top used search engine as well as Gmail and Google news which have become the number one news source for many people. People are taking information that they want to hear and Google has been trapping society in a box by finding out our major interests and purely basing everything else off of that rather than incorporating new ideas. Google has the power to control us without us even realizing it and “because Google is so......

Words: 1655 - Pages: 7

Rfid Tags in Stores and Their Privacy Issues

...RFID Tags in Stores and Their Privacy Issues RFID tags in stores and the privacy issues that arise from their use are that they can be read from a distance. These tags are able to store personal information about the consumer. The RFID tags can be placed on an item without the consumer even knowing that it is there. RFID stands for Radio Frequency Identification. RFID tags are a technology that uses very small computer chips about the size of a grain of sand. They are used to keep track of items from a distance. Each chip has a unique identification number that is paired to an antenna that transmits information between it and a reader device. Some of these chips can transmit information to a reader that is up to 30 feet away. RFID tags can be programmed to store personal information about how a person shops, what they buy most often, how often they go to a certain store. Some chips could even store what credit card was used to make a purchase. RFID tags can be hidden from the consumer. These chips can be put between layers of cardboard. RFID tags can be placed in plastic or they can be in the design of the package. Privacy issues for RFID tags are that they can be read from a large distance by anyone with a reader. RFID chips can lead to theft of personal information by criminals. The consumer may not know that the chip has stored their personal information or that it can be read by anyone with a reader. The RFID tags can be hidden many different ways......

Words: 297 - Pages: 2

Fist of Legend | Ceramica elettrico | Rail Wars!