Verified Document

Privacy Related Matrix Term Paper

Ethical Matrix Ethical Dilemma Matrix

Ethical Dilemma:

A business organization's Internet Service Provider (ISP) is providing preferential service (improved access, faster connection and download/upload speeds) to certain websites, apparently on the basis of business ties and co-ownership entanglements.

Ethical Principles:

Autonomy, Justice, Respect for Persons

Stakeholders:

End Users:

-Users of the Internet have the duty to make and exercise their own choices, which is limited by preferential access.

-This duty also insists that users be able to face all risks and opportunities available in equal measure, and with fair access.

-Users have the right to be viewed as important ends in and of themselves, served by the ISP and not simply serving the ISP in terms of money.

The Organization:

the organization has a duty to ensure that its employees can perform their functions with minimal interference, and that stakeholders in the business...

This is upheld through a variety of laws as well (Kapoor 2007).
3) Other Websites:

-Websites have a duty to work towards free and equal access in order to achieve real autonomy and the ability to exercise free will

-Preferential access directly impinges on the equal distribution of opportunities and risks inherent to the justice principle, barring un-preferred websites from equal access to users and consumers

-Treated as persons, websites have the right to the same respect as ends in and of themselves as any other entity, and should not be trampled simply because they are seen as…

Sources used in this document:
References

FCC. (2005). August 5, 2005 Policy Statement. Accessed 21 October 2011.

http://hraunfoss.fcc.gov/edocs_public/attachmatch/FCC-05-151A1.pdf

Kapoor, G. (2007). Corporate Laws. New York: Taxmann Publications.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security and Online Privacy Regulations:
Words: 5553 Length: 20 Document Type: Research Proposal

" (Muntenu, 2004) According to Muntenu (2004) "It is almost impossible for a security analyst with only technical background to quantify security risk for intangible assets. He can perform a quantitative or qualitative evaluation using dedicated software to improve the security of the information systems, but not a complete risk assessment for the whole information system. Qualitative assessment based on questionnaires use in fact statistical quantitative methods to obtain results. Statistical

Designing a New Regulatory Framework for Telecommunications Interception...
Words: 5019 Length: 18 Document Type: Discussion Chapter

New Regulatory Framework for Telecommunications in Jordan Jordan Telecommunications QUANTITATIVE RESULTS AND ANALYSIS Chapter X presented the pre-test results of the pilot study that used qualitative data collected from the interviews with Jordanian dignitaries. This chapter presents the quantitative results from the survey administered to the larger representative sample of respondents from Jordanian businesses. The interviews conducted for the pilot study and a review of the literature supported the development of questions used in

Governance Planning Document Scenario Major
Words: 1832 Length: 5 Document Type: Research Paper

All the personal and traffic data will only be accessed by authorized employees of our organization, who are to access the data to fulfill their duties. Our policy will be to protect all the data in the database from unauthorized access. Our data retention policy is to keep all data and metadata properly to prevent unauthorized access. In line with our data retention policy, our organization will protect the privacy

Business Ethics How Important Is an Individual's
Words: 3263 Length: 10 Document Type: Essay

Business Ethics How important is an individual's privacy in the workplace? Is an individual's privacy in the workplace the most important consideration to be taken into account? What constitutes privacy in a workplace environment? Do the goals and the mission of the organization supersede an individual's desire to protect his or her privacy? Is it ethical for an employer to collect and disperse personal information from employees without their knowledge? How

Distinction and Need for Governance at All Three Levels Corporate...
Words: 3850 Length: 13 Document Type: Term Paper

Corporate governance, IT Governance and Information Security Governance IS 8310 Governance, Risk Management and Compliance Governance is the process of empowering leaders to implement rules that are enforceable and amendable. For comprehensive understanding of the term' governance' it is essential to identify the leaders and the set of rules, and various positions that leaders govern. Corporate governance, IT Governance and Information Security Governance embraces a linkage with certain acquiescence system while

Production Possibilities Production Possibility Curves Are Representation...
Words: 2527 Length: 6 Document Type: Essay

Production Possibilities Production possibility curves are representation of the amount of two different goods that can be obtained by shifting resources from the production of one, to the production of the other. In addition, the graph represents maximum specified production level of one commodity that results given the production level of the other (Samuelson, 1962). The curve is used to describe consumers' choice between two different goods. The curves represent a wide

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now