Verified Document

Is It Legal For Your Family To Read Your E-Mail  Term Paper

¶ … Privacy Justin Ellsworth's parents should not have been given access to his e-mail account on their request alone, as it would have violated nearly every privacy act in existence at the time of the case, the Yahoo agreement terms with Justin, and set a dangerous precedence for invasion of digital assets of the deceased. Yahoo relented and only provided the e-mail account access on court order, which preserved the digital rights and privacy of its millions of customers using Yahoo mail and other online e-mail applications in the process (Leach 2005). Yahoo argued successfully that providing access without court order would have violated the Stored Communications Act (SCA), 18. U.S.C. § 2701. This has become an often-cited precedent by all other Internet e-mail providers who must retain the trust of their customers to stay in business. The case has a multifaceted ethical aspect to it, which is analyzed from a deontological and utilitarian standpoint below.

Analysis of E-mail Access from an Ethical Standpoint

Deontological reasoning is predicated on the findings of Kant (1981) who posited that moral laws take the form of categorical reasoning and imperatives including university, congeniality and community. Universality concentrates on the universal laws of nature, congeniality focused on treating persons as ends, never as mere means, and community where Kant believes the best ethical outcomes come from a decision maker putting themselves in the role of subject and sovereignty (Ralph, 1999). Using deontological ethics to evaluate the decision of whether to allow the Ellsworths to gain access to their deceased son's Yahoo e-mail account raises the ethical dilemma of defining a parents' right to know of their son's thoughts and emotions immediately before his untimely death. The ethical dilemma for Yahoo is however seen from a global standpoint, where the deontological conflict of needing to preserve the rights of e-mail customers to their privacy, even in death...

Yet from a deontological perspective it could be argued either way, with the family having higher precedence to access over the broader interpretation of the law.
What makes access to e-mail a paradox from an deontological perspective is that universality and congeniality, two of the three formulations Kant defined in his categorical imperative, are plausibly met by serving the family first (Ralph, 1999). What makes the paradox so difficult is that community, the third categorical imperative, is clearly violated if Yahoo chooses to make an exception to its licensing agreement and provide the family access to the deceased soldier's e-mail account.

Deontological ethics must be interpreted across all three categorical imperatives if they are to provide the necessary foundation for ethical decision making (Irene, 2007). Yahoo stayed consistent with all three categorical imperatives and was able to alleviate any legal challenges as a result. The universality aspect of the case from a deontological perspective also shows that regardless of how many families, from varied circumstances regarding the loss of a loved one and family member, does not ever provide an exception to the violating of the three categorical imperatives either. In this context, Kant's definition of deontological reasoning resembles the core concepts of utilitarianism as well (Irene, 2007).

Deontological reasoning and utilitarianism share a commonality at the structural level as both look to provide consistency of ethical and moral direction based on the foundational use of core categorical…

Sources used in this document:
Bibliography

Carroll, A.B. (1990). Principles of business ethics: Their role in decision making and an initial consensus. Management Decision, 28(8), 20.

Gustafson, A. (2013). In defense of a utilitarian business ethic. Business and Society Review, 118(3), 325.

Irene, V.S. (2007). Beyond utilitarianism and deontology: Ethics in economics. Review of Political Economy, 19(1), 21.

Leach, Susan L. (2005). Who gets to see the e-mail of the deceased? Christian Science Monitor, May 2, pg. 12.
Cite this Document:
Copy Bibliography Citation

Related Documents

Email Privacy Times Change and So Do
Words: 1829 Length: 5 Document Type: Essay

Email Privacy Times change and so do social institutions. When the laws protecting our privacy were originally drafted there was not even the notion of email. Such a concept was so futuristic as to be well beyond the most imaginative of the Founding Fathers. Today, however, emails have become a regular course of communication between members of society and, as such, they deserve attention. Do they fall within our expectation of

Students' Email Usage and Student
Words: 10852 Length: 40 Document Type: Term Paper

This research will fill in a gap that was discovered in the literature review. There have been many, even in an academic setting, that have made comments regarding the effects of email on the student environment. However, there have been no significant studies to substantiate these claims. This study will fill in the existing gap in research and will examine the actual importance of email to the academic setting. Chapter

Threatening Email the Law Enforcement
Words: 2058 Length: 6 Document Type: Research Paper

This is why computer evidence -- such as the email itself -- cannot outweigh the underlying crime. What is being investigated is a threat against human life. While investigating this threatening email and Westfall (the main suspect), it is important for the investigator to heed the law; suspects still have all the legal rights and protections afforded them per the United States Constitution (Reyes & Brittson 2007). "Reading emails, intercepting

Owns Your Email Who Has
Words: 946 Length: 3 Document Type: Case Study

Essentially, by taking such a strong stance against breaking their own regulations, even in cases of death, Yahoo! was upholding utilitarian principles in order to benefit the community as a whole. Thus, the company was focused on upholding a commitment to privacy for all of its members. It was unfortunate that Justin Ellsworth lost his life in the line of battle, but that could not jeopardize the promise Yahoo!

Three Basic Problems With Email Today
Words: 3201 Length: 10 Document Type: Essay

Constraints to Email and Potential Solutions Humankind has been communicating over increasingly lengthy distances over the millennia, beginning with drums and smoke signals, to relay runners and mounted messengers, to the telegraph and telephone and then, during the 1990s, the Internet and email. All of these communication media have their limitations, though, including the most popular written communication method today: email. Indeed, many observers believe that email will eventually spell

Legal/Ethical Issue Relating to Human
Words: 2564 Length: 8 Document Type: Research Paper

This collection comprises health-care and social service employees such as visiting nurses, psychiatric evaluators, and probation workers; community employees such as gas and water utility workers, phone and cable TV employees, and letter carriers; retail workers; and taxi drivers (OSHA Fact Sheet, 2002). The best defense that companies can give is to institute a no tolerance rule in regards to workplace aggression against or by their workers. The company should

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now