Académique Documents
Professionnel Documents
Culture Documents
Reporting
Chapter 5-7
6.1 Teamwork
6.1.1 An Ethical Corporate Climate
6.1.2 Loyalty and Collegiality
6.1.3 Managers and Engineers
6.1.4 Managing Conflict
6.2 Confidentiality and Conflicts of Interest
6.2.1 Confidential: Definition
6.2.2 Confidentiality and Changing Jobs
6.2.3 Confidentiality and Management Policies
6.2.4 Confidentiality: Justification
6.2.5 Conflicts of Interest: Definition and Examples
6.2.6 Moral Status of Conflicts of Interest
6.3 Rights of Engineers
6.3.1 Professional Rights
6.3.2 Employee Rights
6.4 Whistleblowing
6.4.1 Whistleblowing: Definition
6.4.2 Two Cases
6.4.3 Moral Guidelines
6.4.4 Protecting Whistleblowers
6.4.5 Commonsense Procedures
6.4.6 Beyond Whistleblowing
6.5 The BART Case
6.5.1 Background
6.5.2 Responsibility and Experimentation
6.5.3 Controversy
6.5.4 Aftermath
6.5.5 Comments
Chapter 7 Honesty
7.1 Truthfulness and Trustworthiness
7.1.1 Truthfulness
7.1.2 Trustworthiness
7.1.3 Academic Integrity
7.2 Research Integrity
7.2.1 Excellence versus Misconduct
7.2.2 Bias and Self-Deception
7.3 Consulting Engineers
7.3.1 Advertising
7.3.2 Competitive Bidding
7.3.3 Contingency Fees
7.3.4 Safety and Client Needs
7.4 Expert Witnesses and Advisers
7.4.1 Expert Witnesses in the Courts
7.4.2 Abuses
7.4.3 Advisers in Planning and Policy-Making
5.1.2 Risks
- Any uncertainty about the future.
hazard in a given time interval is determined by both risk and exposure. For
some hazards, the number of deaths may increase exponentially with
exposure, or there may be a safe limit below which the death rates are
unaffected by exposure. To evaluate the degree of impact of a hazard both
risk and exposure levels must be taken into account.
In contrast to the early statistical assessment of risk, the intrinsic
psychosocial nature of risk acceptability was initially studied through
psychophysics and psychometrics of risk perception (Slovic et al., 1990;
Tversky and Kahneman, 1974). There were two main ideas that emerged at
about the same time, first risk was recognized as a social construct and
secondly that implicit theories of risk perception have developed among
laypeople that describe how risks are evaluated, accepted and how personal
decisions concerning different risks occur. (Heimer, 1988; Lupton, 1999ab).
Thus, risk acceptability was determined to be a measure of an individuals
tolerance for risk derived from a social construct influenced by a number of
acquired factors.
and there has been growing public concern about trust in experts. In
response, there have been attempts to 'engage' the public in various ways
and to assess the acceptability of these innovations. This volume brings
together leading social scientists to present the most up-to-date research
about these topics, and to examine the debates about risk and public
acceptance of new technologies.
CIHR subject to the Privacy Act, and the Access to Information Act.
These laws govern the collection, use and disclosure of information under the
control of the federal government and certain federally funded organizations.
Documentation submitted to CIHR by the applicant may be provided to the
review committee members, external reviewers and observers. The
documentation may contain personal information and confidential commercial
information. By law, applicants have the right of access to the information
provided by review committee members and external reviewers about their
applications. The names of external reviewers must be kept confidential to
ensure they can provide an impartial review of an application. Review
committee members names can be released at the discretion of CIHR.
Written materials used in the review process are generally made available to
applicants when they are notified of the funding opportunity results.
Review committee members, external reviewers and observers must ensure
that:
all documentation and information that CIHR entrusts to review
committee members, external reviewers and observers is maintained in
strict confidence at all times. It must be used only for the purpose for which
it was originally collectednamely, to review applications and make funding
recommendations as applicable;
review documentation is stored in a secure manner to prevent
unauthorized access. It must be transmitted using secure techniques and
when it is no longer required, it must be destroyed in a secure manner. Any
loss or theft of the documentation must be reported to CIHR; and
all enquiries or representations received by review committee
members, external reviewers or observers about an application or its review
must be referred to CIHR. Review committee members, external reviewers or
observers must not contact the applicants for additional information or
disclose matters arising from the review process to the applicants.
Additional requirements for review committee members and observers:
Review deliberations are confidential. Comments made by review
committee members during the review of applications and the conclusions of
the committees review must never be discussed or disclosed with
individuals not involved in the review process unless required by legislation
or the courts.
The identity of successful applicants and the details of the
grants/awards must remain confidential until a decision is made by CIHR and
officially announced to the applicants and the public. The identities of
unsuccessful or ineligible applicants are not made public and must not be
divulged unless required by legislation or the courts.
During the meeting, observers must be as unobtrusive as possible to
minimize disruption and must not remove from the meeting room written
notes or documentation related to reviewer assignments, ratings or reviewer
comments on applications.
Confirmation
I have read and understood the Conflict of Interest and Confidentiality
Agreement. I agree to comply with the requirements of the Conflict of Interest
and Confidentiality Policy of the Federal Research Funding Organizations.
(Additional information can be found in procedural guidelines for the specific
review process.) I understand that any breach of this agreement will result in
a review of the matter, with CIHR reserving the right to take appropriate
action including, but not limited to, my removal from serving on or observing
current or future CIHR review committees or from serving as an external
reviewer. The use of review documentation for any other purpose could result
in a CIHR investigation and/or report to the federal Privacy Commissioners
Office. Any action that CIHR may or may not take will not prevent a person
whose privacy rights have been compromised from seeking legal action
against the respondent. By signing this form, I certify that I am not currently
ineligible to apply for and/or hold funds from the Canada Foundation for
Innovation (CFI), the Canadian Institutes of Health Research (CIHR), the
Natural Sciences and Engineering Research Council of Canada (NSERC), the
Social Sciences and Humanities Research Council of Canada (SSHRC) or any
other research or research funding organization worldwide for reasons of
breach of policies on responsible conduct of research-such as ethics, integrity
or financial management policies. I also certify that I am not currently under
investigation for a breach of the CFIs, CIHRs, NSERCs or SSHRCs policies. If I
become the subject of such an investigation, I will immediately withdraw from
participation in the CIHR review process(es) until the investigation is complete
and CIHR has determined that I am once again eligible to participate
clearly point to the employer or client as the main source of the decision as to
what information is to be treated as confidential.
Keep secret is a relational expression. It always make sense to ask,
Secret with respect to whom? In the case of some government
organizations, such as the Federal Bureau of Investigation (FBI) and Central
Intelligence Agency (CIA), highly elaborate systems for classifying information
have been access to what information. Within other government agencies and
private companies, engineers and other employees are usually expected to
withhold information labeled confidential from unauthorized people both
inside and outside the organization.
6.2.2 Confidentiality and Changing Jobs
The obligation to protect confidential information does not cease to
pretext such information. Former employees would quickly divulge it to their
new employers or, perhaps for a price, sell it to competitor of their former
employers. Thus, the relationship of trust between employer and employee in
regard to confidentiality continues beyond the formal period of employment.
Unless the employer gives consent, former employees are barred indefinitely
from revealing trade secrets. This provides a clear illustration of the way in
which the professional integrity of the engineers involves much more than
mere loyalty to ones present employer.
Yet thorny problems arise in this area. Many engineers value
professional advancement more than long-term ties with any on company,
and so they change jobs frequently. Engineers in research and development
are especially likely to have high rates of turnover. They are the people most
likely to expose to important new trade secrets. Moreover, when they transfer
into new companies they often do the same kind of work as before precisely
the type os situation in which trade secrets of their old companies may have
relevance, a fact that could have strongly contributed to their having readily
found new employment.
6.2.3 Confidentiality and Management Policies
What might be done to recognize the legitimate personal interests and
rights of engineers and other employees while also recognizing the rights of
employers in this area? One approach is to use employment contracts that
place special restrictions centered on the geographical location of future
employers, the length of time after leaving the present employer before one
can engage in certain kinds of work, and the type of work it is permissible to
do for future employers. Thus, Goodrich might have required as a condition of
employment what Wohlgemuth sign an agreement that if he sought work
elsewhere he would not work on space suit projects for a competitor in the
United States for five years after leaving Goodrich.
Yet such contracts are hardly agreements between equals, and they
threaten the right of individuals to pursue their careers freely. For this reason
the courts have tended not to recognize such contracts as binding, although
they do uphold contractual agreements forbidding the disclosure of trade
secrets.
More needs to be said, however. Why should mere threats of possible harm
always be condemned? Suppose that substantial good might sometimes
result from pursuing a conflict of interest.
In fact, it is not always unethical to pursue conflicts of interest. In practice,
some conflicts are thought to be unavoidable, or even acceptable. One
illustration of this is that the government allows employees of aircraft
manufacturers, such as Boeing or McDonnell Douglas, to serve as government
inspectors for the Federal Aviation Agency (FAA). The FAA is charged with
regulating airplane manufacturers and making objective safety and quality
inspections of the airplanes they build. Naturally the dual roles-government
inspector and employee of the manufacturer being inspected could bias
judgements. Yet with careful screening of inspectors, the like hood of such
bias is said to be outweighed by the practical necessities of airplane
inspection.
the Constitution was written, no one envisaged the giant corporations that
have emerged in our century. Corporations wield enormous power politically
and socially, often in multinational settings; they operate much as minigovernments, and they are often comparable in size to those governments
the authors of the Constitution had in mind. For example, American Telephone
& Telegraph in the 1970s employed twice the number of people that inhabited
the largest of the original 12 colonies when the Constitution was written.
Ewing proposes that large corporations ought to recognize a basic set
of employee rights. As examples we will discuss rights to privacy and to equal
opportunity.
6.4 Whistleblowing
6.4.1 Whistleblowing: Definition
DEFINITION of 'Whistleblower'
Anyone who has and reports insider knowledge of illegal activities
occurring in an organization. Whistleblowers can be employees, suppliers,
contractors, clients or any individual who somehow becomes aware of illegal
activities taking place in a business either through witnessing the behavior or
being told about it. Whistleblowers are protected from retaliation under
various programs created by the Occupational Safety and Health
Administration (OSHA) and the Securities and Exchange Commission (SEC).
6.4.2 Two Cases
Sarbanes and Oxley Act
As a response to the Enron scandal, the Congress of the United States
adopted the Sarbanes and Oxley Act of 2002 (enacted 30 July, 2002;
hereinafter: SOX), because the scandal shook public confidence in the nations
securities markets. As the whole scandal was triggered off by an internal
whistleblowing, no one was surprised that SOX contains whistleblower
sections (Questionnaire I/14). The Act attempts to encourage and protect
whistleblowers in a variety of ways by providing channels for anonymous
whistleblowing, establishing criminal penalties for retaliation against
whistleblowers, and protection for whistleblowers in order to preserve their
work status. While SOX was passed in response to domestic issues, it was
written in haste, which allowed for potential extraterritorial application. The
SOX applies to every publicly registered company issuing securities in an
American secondary exchange market. Former chairman of the Security
Exchange Commission once told at a conference, that our mandate is to
implement the Sarbanes-Oxley Act fully for all companies, foreign or
domestic.[12] The provisions of the SOX are mirrored in the Nasdaq and the
New York Stock Exchange (hereinafter: NYSE) rules.[13] If listed on NYSE,
companies must certify their accounts to those markets yearly, and this
certification process implies that companies are in position to assert that they
comply with whistleblowing rules (Questionnaire I/12). SOX made hundreds of
companies to adopt whistleblowing in their codes of conduct, and not only
companies listed in American exchange markets (Questionnaire I/10-11). It
became one symbol of transparency and compliance. 1. Section 301 of the
Act is a distinctive part of the SOX for its requirement of a channel for
anonymous whistleblowing. The section requires audit committees of covered
companies to establish whistleblowing procedures whereby employees can
anonymously submit issues of concern regarding questionable accounting or
auditing matters: Section 301.4. 4) COMPLAINTS.Each audit committee shall
establish procedures for (A) the receipt, retention, and treatment of
complaints received by the issuer regarding accounting, internal accounting
controls, or auditing matters; and (B) the confidential, anonymous
submission by employees of the issuer of concerns regarding questionable
accounting or auditing matters. This whistleblowing channel shall be set up
not later than 270 days after the date of enactment, and the Securities
Exchange Commission shall, by rule, direct the national securities exchanges
and national securities associations to prohibit the listing of any security of an
issuer that is not in compliance with the requirements of any portion of
paragraphs (2) through (6) of section 301 of the Act. Section 301 requires the
committees to have procedures for retaining and treating the reports. Most
commonly, the organizational response to this requirement has been to
contract with an independent hotline company to receive the reports.
Experiences show that these hotlines are unlikely to spur whistleblowing, but
they greatly increase costs in time and money. Unfortunately, we dont have
much information on these internal channels, because companies tend to
treat relevant information as trade secrets and consequently it is difficult to
determine their effectiveness. What information is available shows that
hotlines and other designated recipients of whistleblowing find that a large
percentage of the reports involve human resource issues, and only very few
case involve legal or ethical issues.[14] 2. If a whistleblower suffers retaliation
for reporting, Section 806 gives the employee the right to seek protection.
This section prohibits any kind of retaliation, such as discharging, demoting,
suspension, harassment, or any other kind of discrimination against an
employee in the terms and conditions of the employment against a
whistleblower who reports covered information to someone within the
organization who has the authority to investigate, discover, or terminate
misconduct. The section specifies a process. First, the employee within 90
days has to file a complaint with the Secretary of Labor. An administrative
law judge hears the evidence resulting from the investigation and decides
(Questionnaire II/9). The case will not go forward if the employer can show
clear evidence that the sanctions would have taken place in the absence of
the whistleblowing. As we already mentioned, the law is vague enough that it
may cover U.S. citizens working for a foreign subsidiary or for a private
foreign subsidiary of a covered U.S. company, or a foreign employee working
for a foreign subsidiary. Section 806 virtually makes no distinction between
domestic and foreign companies that have securities registered or listed in
the USA. Even though it has the potential to reach foreign companies, the
jurisdiction interprets the SOX in a more restrictive manner. In Carnero vs.
Boston Scientific Corporation, the First Circuit Court found that the SOX do not
The following three statements are obviously true, but their relative
importance is debated. (1) I exist. (2) Others exist. (3) I am not someone else.
Morality stresses 2 (e.g. duty to the population) and undermines 1 and 3 as
much as possible. For instance, Harris et al. (2005) take self-interest as one of
the impediments to responsible action (p. 37). Rejection of 3 is obvious in
the universalization at the core of Kants categorical imperative and in the
utilitarian view that my welfare is on a par with that of others. As writes Rawls
(1971), utilitarianism does not take seriously the distinction between
persons (p. 24). In other words, the fact that it is me and not someone else
we are talking about should not be brought into the picture (or rather should
be taken out of the picture): there is a tendency to associate professionalism
with setting aside personal values in order to be objective and to meet shared
standards of the profession (Martin, 2002). Codes embody this view: they pile
up duties for professionals without acknowledging that professionals are
individuals, rather than mere vectors for duty. It is then clear that the question
of whistle-blowing is just a matter of comparing duty toward the public to duty
toward the employer. But this view relies on a bias in favor of alienation: it
assumes that I do not exist, that I do not count, or that I am someone else. So
the employee must account for the interests of the public and of the company
only thinking of oneself is selfish, i.e. wrong. In any deliberative contest
between a moral obligation and some other consideration, the moral
obligation will always win out, according to the morality system. (Chappell,
2006). For instance, Fleddermann (1999) never mentions possible harm to the
employee: to him whistle-blowing is determined wholly on external criteria.
Likewise, to DeGeorge (2005) the difference between possible and mandatory
whistle-blowing is independent of the employee. The whistle blower is part of
the implementation, not part of the decision.2 As Martin (2000) points out,
final judgments about obligations to whistleblow must be made contextually,
not as a matter of general rule. And they must take into account the burdens
imposed on whistleblowers an their families. One may decide to reject codes
of morality so that whistle-blowing is optional. But this is difficult since, even
though a code is just a consensual opinion not the repository of objective
truths (Bouville, 2007), the fact that a given agent would prefer not to be in
[the morality] Whistle-blowing and morality 5 system or bound by its rules will
not excuse him (Williams, 1985, p. 177). Alternatively, one may abide by the
mandatory requirements expressed in codes of ethics (Martin, 2002) and
make whistle-blowing a moral obligation. A third option is to change the
meaning of obligation so that whistle-blowing is a moral obligation without
being obligatory. We will now examine this paradoxical view.
any innovative engineering design is like this and has components that have
not been previously tested.
The Automatic Train-Control (ATC) system was an innovative method for
controlling train speed and access to stations. In most urban mass transit
systems, this function is performed by human drivers reading trackside
signals and receiving instructions via radio from dispatchers. Instead, BART
relied on a series of onboard sensors that determined the train's position and
the location of other trains. Speeds on the track were automatically
maintained by monitoring the location of the train and detecting allowed
speed information. One of the unique and problematic features of the system
was that there were no fail-safe methods of train control [Friedlander, 1972].
Rather, all control was based on redundancy. This distinction is very
important. "Fail safe" implies that if there is a failure, the system will revert to
a safe state. In the case of BART, this would mean that a failure would cause
the trains to stop. Redundancy, on the other hand, relies on switching failed
components or systems to backups in order to keep the trains running.
There are two distinct phases of this type of engineering project,
construction and operation, each requiring different skills. For this reason,
early on, BART decided to keep its own staff relatively small and subcontract
most of the design and construction work. This way, there wouldn't be the
need to lay off hundreds of workers during the transition from construction to
operation [Anderson, 1980]. This system also encouraged the engineers who
worked for BART not only to oversee the design and construction of the
system, but also to learn the skills required to run and manage this complex
transportation system. Contracts for design and construction of the railroad
infrastructure were awarded to a consortium of large engineering firms known
as Parsons, Brinkerhoff, Tudor, and Bechtel (PBTB). PBTB began construction
on the system in January of 1967. The transbay tube was started in November
of that year. Also in 1967, a contract was awarded to Westinghouse to design
and build the ATC. In 1969, Rohr industries was awarded a contract to supply
250 railroad cars.
A little bit should be said about the management structure at BART. By
design, BART was organized with a very open management structure.
Employees were given great freedom to define what their jobs entailed and to
work independently and were encouraged to take any concerns that they had
to management Unfortunately, there was also a very diffuse and unclear
chain of command that made it difficult for employees to take their concerns
to the right person [Anderson, 1980].
The key players in this case were three BART engineers working on
various aspects of the ATC: Roger Hjortsvang, Robert Bruder, and Max
Blankenzee. The first to be employed by BART was Hjortsvang. As part of his
One of the members of the board of directors, Dan Helix, spoke with the
engineers and appeared to take them seriously. Helix took the engineer's
memos and the report of the consultant and distributed them to other
members of the board. Unfortunately, he also released them to a local
newspaper, a surprising act of external whistleblowing by a member of the
board of directors. Naturally, BART management was upset by this action and
tried to locate the source of this information. The three engineers initially lied
about their involvement. They later agreed to take their concerns directly to
the board, thus revealing themselves as the source of the leaks. The board
was skeptical of the importance of their concerns. Once the matter was in the
open, the engineers' positions within BART became tenuous.
On March 2 and 3, 1972, all three engineers were offered the choice of
resignation or firing. They all refused to resign and were dismissed on the
grounds of insubordination, lying to their superiors (they had denied being the
source of the leaks), and failing to follow organizational procedures. They all
suffered as a result of their dismissal. None was able to find work for a
number of months, and all suffered financial and emotional problems as a
result. They sued BART for $875,000, but were forced to settle out of court,
since it was likely that their lying to superiors would be very detrimental to
the case. Each received just $25,000 [Anderson, 1980].
As the legal proceedings were taking place, the IEEE attempted to
assist the three engineers by filing an amicus curiae (friend of the court) brief
in their support. The IEEE asserted that each of the engineers had a
professional duty to keep the safety of the public paramount and that their
actions were therefore justified. Based on the IEEE code of ethics, the brief
stated that engineers must "notify the proper authority of any observed
conditions which endanger public safety and health." The brief interpreted
this statement to mean that in the case of public employment, the proper
authority is the public itself [Anderson, 1980]. This was perhaps the first time
that a national engineering professional society had intervened in a legal
proceeding on behalf of engineers who had apparently been fulfilling their
duties according to a professional code of ethics.
Safety concerns continued to mount as BART was put into operation.
For example, on October 2, 1972, less than a month after BART was put into
revenue service, a BART train overshot the station at Fremont, California and
crashed into a sand embankment. There were no fatalities, but five persons
were injured. The accident was attributed to a malfunction of a crystal
oscillator, part of the ATC, which controlled the speed commands for the train.
Subsequent to this accident, there were several investigations and reports on
the operation of BART. These revealed that there had been other problems
and malfunctions in the system. Trains had often been allowed too close to
each other; sometimes a track was indicated to be occupied when it wasn't
and was indicated not to be occupied when it was. The safety concerns of the
three engineers seemed to be borne out by the early operation of the system
[Friedlander, 1972, 1973].
Ultimately, the ATC was improved and the bugs worked out. In the
years since, BART has accumulated an excellent safety record and has served
as the model for other high-tech mass transit systems around the country.
Chapter 7 Honesty