Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Law

None

Law and Technology

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Law

Exploring The Ethicality Of Firing Employees Who Blog, Sean Valentine, Gary Fleischman, Robert Sprague, Lynn Godkin Dec 2009

Exploring The Ethicality Of Firing Employees Who Blog, Sean Valentine, Gary Fleischman, Robert Sprague, Lynn Godkin

Robert Sprague

This exploratory study evaluates the ethical considerations related to employees fired for their blogging activities. Specifically, subject evaluations of two employee-related blogging scenarios were investigated with established ethical reasoning and moral intensity scales, and a measure of corporate ethical values was included to assess perceptions of organizational ethics. The first scenario involved an employee who was fired because of innocuous blogging, while the second vignette involved an employee who was fired because of work-related blogging. Survey data were collected from employed college students and working practitioners. The findings indicated that the subjects’ ethical judgments that firing an employee for blogging …


Preserving Identities: Protecting Personal Identifying Information Through Enhanced Privacy Policies And Laws, Robert Sprague, Corey Ciocchetti Dec 2008

Preserving Identities: Protecting Personal Identifying Information Through Enhanced Privacy Policies And Laws, Robert Sprague, Corey Ciocchetti

Robert Sprague

This article explores the developing phenomenon of the ongoing collection and dissemination of personal identifying information (PII): first, explaining the nature and form of PII, including the consequences of its collection; second, exploring one of the greatest threats associated with data collection - unauthorized disclosure due to data breaches, including an overview of state and federal legislative reactions to the threats of data breaches and identity theft; third, discussing common law and constitutional privacy protections regarding the collection of personal information, revealing that United States privacy laws provide very little protection to individuals; and fourth, examining current practices by online …