Securing privacy at work: the importance of contextualized consent

The starting point of this article is that employees’ chances of securing reasonable expectations of privacy at work must be better protected. A dependency asymmetry between employer and job-applicant implies that prospective employees are in a disadvantaged position vis à vis the employer regarding the chances of defending their reasonable interests. Since an increased usage of work related surveillance will, to a larger extent, require of job-applicants that they negotiate their privacy interests in employment contracting, it is important to consider means of strengthening employees’ negotiating power. This article emphasizes the importance of contextualizing consent for contractual agreements to be ethically acceptable.

[1]  Jon Elster,et al.  Sour Grapes: Studies in the Subversion of Rationality , 1985 .

[2]  Shoshana Zuboff In the Age of the Smart Machine , 1988 .

[3]  S. Alpert,et al.  Protecting Medical Privacy: Challenges in the Age of Genetic Information , 2003 .

[4]  Georg Simmel Die Großstädte und das Geistesleben , 2006 .

[5]  F. Peter CHOICE, CONSENT, AND THE LEGITIMACY OF MARKET TRANSACTIONS , 2004, Economics and Philosophy.

[6]  Blake J. Roessler,et al.  The Value of Privacy , 2004 .

[7]  R. Nozick Anarchy, State, and Utopia , 1975, Princeton Readings in Political Thought.

[8]  J. Nouwt,et al.  Reasonable Expectations of Privacy? Eleven Country Reports on Camera Surveillance and Workplace Privacy , 2005 .

[9]  M. Foucault,et al.  Discipline and Punish: The Birth of the Prison. , 1978 .

[10]  B. Rössler Privacies: philosophical evaluations , 2004 .

[11]  Thomas Scanlon,et al.  What we owe each other , 1998 .

[12]  B. Kapp,et al.  A history and theory of informed consent , 1986 .

[13]  P. Brey The importance of privacy in the workplace. , 2005 .

[14]  R. D'amico Discipline and Punish: The Birth of the Prison , 1978, Telos.

[15]  M. Foucault,et al.  Discipline and Punish: The Birth of the Prison , 2020, On Violence.

[16]  John Weckert,et al.  Privacy, the Workplace and the Internet , 1999, WebNet.

[17]  Roger Clarke,et al.  The Digital Persona and Its Application to Data Surveillance , 1994, Inf. Soc..

[18]  J. Rawls,et al.  Justice as Fairness: A Restatement , 2001 .

[19]  Edward J. Bloustein,et al.  Privacy as an Aspect of Human Dignity : An Answer to Dean Prosser , 1984 .

[20]  Elin Palm Privacy Expectations at Work—What is Reasonable and Why? , 2009 .

[21]  Paul S. Appelbaum,et al.  Informed Consent: Legal Theory and Clinical Practice , 1987 .

[22]  William S. Brown Ontological Security, Existential Anxiety and Workplace Privacy , 2000 .

[23]  A. Lever Feminism, Democracy and the Right to Privacy , 2005 .

[24]  E. Goffman Relations in Public: Microstudies of the Public Order , 1971 .

[25]  Jean Louise Cohen Regulating Intimacy: A New Legal Paradigm , 2002 .

[26]  T. Beauchamp,et al.  A History and Theory of Informed Consent , 1986, American Political Science Review.

[27]  Charles Fried Philosophical Dimensions of Privacy: Privacy [a moral analysis] , 1984 .

[28]  F. Schoeman,et al.  Philosophical Dimensions of Privacy , 1984 .

[29]  Herman T. Tavani,et al.  PHILOSOPHICAL THEORIES OF PRIVACY: IMPLICATIONS FOR AN ADEQUATE ONLINE PRIVACY POLICY , 2007 .

[30]  Bernard Williams,et al.  Shame and Necessity , 1995, The Classical Review.

[31]  Ian H Maitland Distributive Justice in Firms: Do the Rules of Corporate Governance Matter? , 2001, Business Ethics Quarterly.

[32]  G. F. Judisch,et al.  Informed Consent. Legal Theory and Clinical Practice , 1988 .

[33]  Priscilla M. Regan Legislating Privacy: Technology, Social Values, and Public Policy , 1995, The Handbook of Privacy Studies.

[34]  J. Rachels Why privacy is important , 1985 .

[35]  J. Agassi Dignity in the workplace can work be dealienated? , 1986 .