Deck 4: Privacy: Technology, Surveillance and Freedom

ملء الشاشة (f)
exit full mode
سؤال
Employers are not in violation of the Electronic Communications Privacy Act when they monitor their employees' emails,as long as the clearly inform their employees that monitoring may occur.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Judy's employer installed software on her work computer to monitor all of her internet activity,including personal emails. She believes this action constitutes an invasion of privacy and her employer may be liable in tort. Which legal standard would apply?

A)She will succeed if she can show that the installation of the software was an intentional intrusion "upon the solitude or seclusion her or her private affairs," and the employer's use of the software would highly offend a reasonable person.
B)She will succeed if she can show that her employer viewed information that was not public using the software.
C)She will succeed if she can show that her employer used the software to monitor her activity during work hours.
D)She will succeed if she can show that her employer did not act reasonably when installing the software
سؤال
The term "privacy" does not appear anywhere in the Constitution of the United States. Explain Despite this,the Supreme Court has recognized privacy rights guaranteed by the Constitution. Provide three examples specific privacy protections that the Court has recognized.​​
سؤال
Frank was engaged in a dispute with his employer over a workers' compensation claim.The employer searched the internet for information about him and found a blog that he had published that detailed all of his hiking adventures,including some that occurred during a period of time when he was claiming he was unable to work due to injury. Identify the test that most courts would use in determining whether or not Frank's employer's actions were an invasion of privacy and indicate whether they were.​​
سؤال
In what way do telematics pose a threat to employee privacy?

A)They enable workplaces to become more efficient through the use of data relating to employee activities.
B)They enable employers to more effectively monitor supply chains and merchandise sales, which results in reduced theft.
C)They enable employers to constantly monitor employees' movements and use of technology and equipment, revealing information such as when they take breaks and the internet websites they visit.
D)They place pressure on employees to remain efficient and productive.
سؤال
The U.S.Constitution explicitly guarantees the right to privacy.
سؤال
Privacy rights are triggered under the Fourth Amendment:

A)when a corporation has authorized an agent with direct authority to perform an electronic search of an employee's e-mail account.
B)when the government is monitoring a person's movements in public.
C)when the government is conducting a search.
D)during an archival search of e-mails on a corporation's server in response to a lawsuit that was filed by a competitor.
سؤال
Discuss the employee claims that counter businesses' justifications of electronic surveillance.​
سؤال
Discuss Lewis Maltby's proposition that employers should not do drug testing (or other testing related to off-work conduct)but should instead focus on impairment testing when an employee is entering the workplace..​
سؤال
The Fourth Amendment protects persons and corporation from unwarranted and unreasonable searches.
سؤال
Briefly describe what Alan Westin believes are the "functions of privacy."​
سؤال
Which statement best summarizes the privacy protections afforded by the Federal Stored Communications Act.

A)The only electronic communications it pertains to are private emails.
B)It protects all electronic communications that were transmitted via an electronic communication service, that are in electronic storage, and that are not public, but does not prevent a person who was authorized to see those communications from sharing it with others.
C)It prevents the intended recipient of an electronic communication from sending that communication to other people.
D)It enables employers to see any and all electronic communications made by their employees.
سؤال
The development of technology brought about the first instances of employers monitoring their employees' activities outside of work.
سؤال
Under the Genetic Information Nondiscrimination Act of 2008 (GINA)it is unlawful for an employer to request,require or purchase genetic information related to employees of their families. List at least three exceptions to this rule.​
سؤال
According to The Functions of Privacy,by Alan Westin,privacy has several functions in today's society.These include:

A)Total freedom in the private life with no consequences to the work life.
B)The ability to vent anger at authority without being held responsible.
C)The ability to post critical information on the Internet without consequences at work.
D)The ability to spend time quietly analyzing the actions and reactions of other people.
سؤال
Which of the following is NOT one of the privacy rights created by the Supreme Court through its interpretation of various constitutional amendments?

A)The government cannot interfere with the choices adults make about their private family and sexual life.
B)An individual's medical history cannot be publicized by the government.
C)Individuals are protected against unwarranted invasion of privacy by private corporations.
D)Corporations are protected against unreasonable government searches or seizures.
سؤال
9. When it comes to employment and social media:
I) Every U.S. law dealing with employee privacy grants significant deference to an employer's legitimate business interest.
II) U.S employers may legally canvass social media sites for information on employees and potential employees and act upon the information found.
III) When an employer finds and uses social media information to reprimand or fire an employee, the employee is likely to be successful in claiming the employer violated the employee's right to privacy.
IV) Employees can take steps to maintain the privacy of their social media use when they are not working to prevent employers from viewing it.

A)I and II only
B)I, II and III only.
C)I, II and IV only
D)I, II, III and IV
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/17
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 4: Privacy: Technology, Surveillance and Freedom
1
Employers are not in violation of the Electronic Communications Privacy Act when they monitor their employees' emails,as long as the clearly inform their employees that monitoring may occur.
True
2
Judy's employer installed software on her work computer to monitor all of her internet activity,including personal emails. She believes this action constitutes an invasion of privacy and her employer may be liable in tort. Which legal standard would apply?

A)She will succeed if she can show that the installation of the software was an intentional intrusion "upon the solitude or seclusion her or her private affairs," and the employer's use of the software would highly offend a reasonable person.
B)She will succeed if she can show that her employer viewed information that was not public using the software.
C)She will succeed if she can show that her employer used the software to monitor her activity during work hours.
D)She will succeed if she can show that her employer did not act reasonably when installing the software
A
3
The term "privacy" does not appear anywhere in the Constitution of the United States. Explain Despite this,the Supreme Court has recognized privacy rights guaranteed by the Constitution. Provide three examples specific privacy protections that the Court has recognized.​​
The Court has stated that the government cannot interfere in the choices you make about your private family and sexual life,including the use birth control or (for adults)and consensual homosexual activity,for example. The government is also not allowed to publicize the most intimate private information of citizens,such as medical and sexual histories.The Fourth Amendment also protects both individuals and corporations against unwarranted and unreasonable government searches or seizures.
4
Frank was engaged in a dispute with his employer over a workers' compensation claim.The employer searched the internet for information about him and found a blog that he had published that detailed all of his hiking adventures,including some that occurred during a period of time when he was claiming he was unable to work due to injury. Identify the test that most courts would use in determining whether or not Frank's employer's actions were an invasion of privacy and indicate whether they were.​​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
5
In what way do telematics pose a threat to employee privacy?

A)They enable workplaces to become more efficient through the use of data relating to employee activities.
B)They enable employers to more effectively monitor supply chains and merchandise sales, which results in reduced theft.
C)They enable employers to constantly monitor employees' movements and use of technology and equipment, revealing information such as when they take breaks and the internet websites they visit.
D)They place pressure on employees to remain efficient and productive.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
6
The U.S.Constitution explicitly guarantees the right to privacy.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
7
Privacy rights are triggered under the Fourth Amendment:

A)when a corporation has authorized an agent with direct authority to perform an electronic search of an employee's e-mail account.
B)when the government is monitoring a person's movements in public.
C)when the government is conducting a search.
D)during an archival search of e-mails on a corporation's server in response to a lawsuit that was filed by a competitor.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
8
Discuss the employee claims that counter businesses' justifications of electronic surveillance.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
9
Discuss Lewis Maltby's proposition that employers should not do drug testing (or other testing related to off-work conduct)but should instead focus on impairment testing when an employee is entering the workplace..​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
10
The Fourth Amendment protects persons and corporation from unwarranted and unreasonable searches.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
11
Briefly describe what Alan Westin believes are the "functions of privacy."​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which statement best summarizes the privacy protections afforded by the Federal Stored Communications Act.

A)The only electronic communications it pertains to are private emails.
B)It protects all electronic communications that were transmitted via an electronic communication service, that are in electronic storage, and that are not public, but does not prevent a person who was authorized to see those communications from sharing it with others.
C)It prevents the intended recipient of an electronic communication from sending that communication to other people.
D)It enables employers to see any and all electronic communications made by their employees.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
13
The development of technology brought about the first instances of employers monitoring their employees' activities outside of work.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
14
Under the Genetic Information Nondiscrimination Act of 2008 (GINA)it is unlawful for an employer to request,require or purchase genetic information related to employees of their families. List at least three exceptions to this rule.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
15
According to The Functions of Privacy,by Alan Westin,privacy has several functions in today's society.These include:

A)Total freedom in the private life with no consequences to the work life.
B)The ability to vent anger at authority without being held responsible.
C)The ability to post critical information on the Internet without consequences at work.
D)The ability to spend time quietly analyzing the actions and reactions of other people.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is NOT one of the privacy rights created by the Supreme Court through its interpretation of various constitutional amendments?

A)The government cannot interfere with the choices adults make about their private family and sexual life.
B)An individual's medical history cannot be publicized by the government.
C)Individuals are protected against unwarranted invasion of privacy by private corporations.
D)Corporations are protected against unreasonable government searches or seizures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
17
9. When it comes to employment and social media:
I) Every U.S. law dealing with employee privacy grants significant deference to an employer's legitimate business interest.
II) U.S employers may legally canvass social media sites for information on employees and potential employees and act upon the information found.
III) When an employer finds and uses social media information to reprimand or fire an employee, the employee is likely to be successful in claiming the employer violated the employee's right to privacy.
IV) Employees can take steps to maintain the privacy of their social media use when they are not working to prevent employers from viewing it.

A)I and II only
B)I, II and III only.
C)I, II and IV only
D)I, II, III and IV
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 17 في هذه المجموعة.