Normative Ethics and the Right to Privacy Essay

Exclusively available on Available only on IvyPanda® Made by Human No AI

Recent advances in technologies have prompted a new consideration of e-mail, use of e-mail, and its relation to ethics. Millions of users in all parts of the world use e-mail to communicate with each other. In many instances, e-mail is the only way for people to stay connected with their friends, relatives, and family members.

Those who use e-mail always expect to have a certain degree of privacy. However, they cannot guarantee that after their death, their parents or relatives will not have access to their messages. Neither deontological nor utilitarian perspectives justify parents’ willingness to access and read their deceased son’s correspondence. It is a direct breach of the personal right to privacy, which does not lead to any positive outcomes.

In 2005, Susan Llewelyn Leach published a story of deceased US marine Justin Ellsworth and his parents. According to Leach (2005), after Justin’s death, Ellsworths decided that they had the right to access and read their deceased son’s e-mail correspondence. They requested the right to his e-mail from Yahoo!, which refused to give out the young man’s password (Leach, 2005).

Ellsworths sued Yahoo!, and the court ruled that Yahoo had to provide Justin Ellsworth’s parents with access to his e-mail account (Leach, 2005). It goes without saying the decision enraged and horrified e-mail users, who always expected to have a certain degree of privacy in e-mail communication (Leach, 2005). It appears that, after death, families can be granted access to their deceased relatives’ e-mails. The most important question is whether or not it is ethical for a third party to access and use deceased persons’ e-mail correspondence.

Deontological and utilitarian ethical theories can shed light on the relevance and implications of e-mail use in the technological age. Utilitarianism (consequentialism) focuses on the consequences and outcomes of particular behaviors (O’Donohue & Ferguson, 2003). Based on utilitarian ethics, “one should act in such a way as to increase the total amount of happiness for society in general” (O’Donohue & Ferguson, 2003, p.29).

Put simply, whether or not an act or decision is ethical depends upon the consequences, to which this act or decision may lead. Unlike utilitarianism, deontology focuses on the rights and rules and disregards consequences (O’Donohue & Ferguson, 2003). Duty is the main focus of deontology (O’Donohue & Ferguson, 2003). Deontological ethics claims that individuals must act so as to turn their acts and decisions into a universal law (O’Donohue & Ferguson, 2003).

E-mail is a frequent object of discussion in literature and a matter of serious privacy concern. Privacy is usually defined as individual interest in controlling and handling personal data (Clarke, 2006). Ethical scandals involving e-mail correspondence are not uncommon (Anonymous, 2005).

The current state of legal science does not provide an answer to the question of whether e-mails must have the same degree of privacy protection as personal data and telephone conversations (Claburn, 2009). However, it is clear that neither deontological nor utilitarian ethics justifies accessing and using personal e-mail by a third party.

From the deontological perspective, the court’s decision to give Ellsworth’s parents legal access to his e-mail is a direct violation of his privacy rights. The fact of death does not affect this right; unfortunately, Justin Ellsworth is no longer able to protect his rights in court. From the viewpoint of utilitarianism, the court’s decision can become an important precedent and a role model for thousands of other parents to follow.

However, no one knows what can happen, once parents and family members discover what is written and stored in their children’s e-mails. Moreover, e-mails will never help parents to revive their children. Accessing and using someone else’s email is feasible and ethically justified, only if a crime or crime intentions are involved. Even then, e-mails should be used reasonably and within the limits needed to resolve the crime.

It is not clear what exactly Ellsworths wanted to achieve, when they asked the court to give them legal access to their son’s email. What exactly did they want to know? Did they feel that the e-mail correspondence would give them a sense of being close to their son?

Unfortunately, parents do not always realize that their children are personalities, with their own inner worlds, interests, desires, and secrets. Justin Ellsworth’s parents should not have been given access to his email. In light of these ethical and legal controversies, legal experts must focus on the analysis of e-mail use, its effects on privacy, and its implications for ethics.

Conclusion

Rapid advances in technology have turned e-mail into a routine means of communication. Millions of people in all parts of the world use e-mail to stay connected with their parents, family members, relatives, and friends. Those who use e-mail always expect to have some degree of privacy. E-mail companies and providers devise complex strategies and implement policies to preserve users’ anonymity. Unfortunately, not everyone realizes that accessing and using someone else’s e-mail is a serious violation of privacy.

The latter is an individual interest in controlling and managing personal data. Justin Ellsworth’s parents should not have been given access to his e-mail correspondence. Neither deontological nor utilitarian ethics justifies the use of e-mails by a third party. It is a violation of the individual right to privacy and an act that may lead to unpredictable results. In light of these controversies, legal experts must focus on the analysis of e-mail use, its effects on privacy, and its implications for ethics.

References

Anonymous. (2005). . ITS Times. Web.

Claburn, T. (2009). U.S. court weighs e-mail privacy, again. Information Week. Web.

Clarke, R. (2006). . Roger Clarke. Web.

Leach, S.L. (2005). The Christian Science Monitor. Web.

O’Donohue, W. & Ferguson, K.E. (2003). Handbook of professional ethics for psychologists. NY: SAGE.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2018, October 10). Normative Ethics and the Right to Privacy. https://ivypanda.com/essays/normative-ethics-and-the-right-to-privacy/

Work Cited

"Normative Ethics and the Right to Privacy." IvyPanda, 10 Oct. 2018, ivypanda.com/essays/normative-ethics-and-the-right-to-privacy/.

References

IvyPanda. (2018) 'Normative Ethics and the Right to Privacy'. 10 October.

References

IvyPanda. 2018. "Normative Ethics and the Right to Privacy." October 10, 2018. https://ivypanda.com/essays/normative-ethics-and-the-right-to-privacy/.

1. IvyPanda. "Normative Ethics and the Right to Privacy." October 10, 2018. https://ivypanda.com/essays/normative-ethics-and-the-right-to-privacy/.


Bibliography


IvyPanda. "Normative Ethics and the Right to Privacy." October 10, 2018. https://ivypanda.com/essays/normative-ethics-and-the-right-to-privacy/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1