Male Rep 2


 "Customer's perception is our reality"

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Why Your Business Needs to Define Its Ethical Code

Why Your Business Needs to Define Its Ethical Code

As the technology that businesses have available to them develops, so does the propensity for this technology to be used unethically. This has become especially apparent where data collection is concerned, and what that data is used for after it has been collected. How can you keep operations moving both productively, and ethically?

Collection Concerns
Data collection is one of the current big concerns in technology. With another newsworthy data breach practically every other day, companies that accumulate data for seemingly little reason effectively put their clients and customers at a greater risk of having this data stolen. Reflecting upon this, it is no wonder that 75 percent of consumers are concerned about brands keeping track of their browsing habits.

Facebook has been the focus of some negative attention in past months thanks to these concerns. In addition to the Cambridge Analytica situation, Facebook has adopted artificial intelligence technologies to analyze their users. This analysis is used to predict future behaviors, these insights being sold to advertisers. While this brings up many legitimate concerns about data privacy, it also introduces a different topic: the need for a code of ethics surrounding the use of collected data, as well as how much data is collected.

Why This Is a Real Issue
It should come as no surprise that businesses and individuals have different priorities, and that these different priorities shape their ethics in different ways. Likewise, the primary purpose of any business is to generate revenue through profit. Therefore, it only makes sense that a business as a unit would have the motivation to collect as much data as they can - after all, the more data available, the more insights that could be presumably be gleaned, and the more successful the business would be… in theory.

However, as mentioned above, many businesses seem to collect as much data as they can just so they can have it. This is not a great approach for them to take for a few reasons. Most obviously, because it just enables more data to be compromised if a breach was to occur.

Without the guidance of a code of ethics leading your business decisions, the likelihood of risking your clients’ data for the sake of advancement - be it more insight, improved automation and artificial intelligence, or another business goal - becomes much higher.

Enforcing Ethics
In order to create a workplace that is in alignment with your determined ethics, you need to make sure of two things. One, that you clearly establish and share them within your business so that your employees are on the same page as you are, and two, that you stand by these ethics.

To accomplish this, learning your company’s ethics should be a part of an employee’s onboarding process, with a written document leaving no questions as to what will and won’t be tolerated. Then, you need to make sure that you not only listen when ethical violations are reported, but also allow those reporting them to remain anonymous.

What would be the most important aspect of your policy for employees to follow? Share it in the comments!

Tip of the Week: Technology Has Your Business Cove...
The New Version of Chrome has Interesting Changes


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, November 20 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Hackers Network Security Business Computing Backup Malware Hosted Solutions Mobile Devices Google Data VoIP Microsoft Business Disaster Recovery roundup Email nonprofit Software bgc Alert Innovation Internet Managed IT Services Business Continuity communications Hardware Outsourced IT IT Services Smartphones User Tips Windows 10 Managed IT Services Tech Term Browser Data Backup Saving Money Computer Ransomware Server Data Recovery Cybercrime Efficiency Cloud Computing Android Network BDR Smartphone Computers Internet of Things IT Support Workplace Tips Small Business Business Management Productivity Office IT Support Communication Miscellaneous Windows Passwords Quick Tips Productivity Save Money Cybersecurity Telephone Systems Managed IT BYOD Chrome Artificial Intelligence Recovery Money Social Engineering Mobile Device Management Applications Social Media Hacking Upgrade Law Enforcement Phishing Facebook Firewall Mobility Windows 10 Work/Life Balance Gadgets Virtualization Vulnerability Collaboration Information Microsoft Office How To Automation Compliance Managed Service Provider Flexibility Budget VPN Router App Office Tips Proactive IT Two-factor Authentication Avoiding Downtime Wi-Fi Private Cloud Password Bandwidth Holiday Bring Your Own Device Office 365 Remote Monitoring Health Data Protection Mobile Computing Value HaaS Connectivity Google Drive Safety Data Security Information Technology Mobile Device Servers Apps Identity Theft History Data Breach Keyboard Black Market Business Intelligence Operating System Remote Computing Word Scam Redundancy Spam Sports Legal Electronic Medical Records Data Storage Website Save Time CES HIPAA PDF Wireless Technology Risk Management Worker Government YouTube Employer-Employee Relationship Solid State Drive Encryption Managed Service IT Management Computing Infrastructure Voice over Internet Protocol Automobile Marketing Content Management Unified Threat Management Spam Blocking Software as a Service Comparison Hiring/Firing SaaS IT Plan Data Management Blockchain Virtual Assistant USB Cleaning Update Physical Security Training Workers The Internet of Things Entertainment Battery Content Filtering Credit Cards Telephone System Computer Care WiFi Patch Management Business Owner End of Support Infrastructure Paperless Office Emergency OneNote Windows 7 Fraud Big Data Samsung Data storage Charger Settings Document Management Unsupported Software Leadership Regulations Hard Drives Digital Signature Amazon Shadow IT Books Audit Monitor Colocation Cache Transportation Current Events Frequently Asked Questions Telecommuting Cryptocurrency Instant Messaging Robot Professional Services Warranty Help Desk Public Computer Customers Software Tips Business Mangement HVAC Skype Inventory Cables Wiring Going Green Users Best Practice Content Relocation Amazon Web Services Hosted Solution Loyalty Computer Fan Wireless Internet Benefits Knowledge Excel Remote Work Safe Mode Search Meetings Files Devices Printer Gmail Networking Politics Rootkit Start Menu Access Control Unified Communications Virtual Reality Audiobook Humor Accountants Online Shopping MSP FENG Hacker Cortana Multi-Factor Security Wire Smart Technology Network Congestion Tip of the week How to Windows 10s Data loss Thought Leadership Mouse HBO Recycling Specifications Enterprise Content Management Apple Tools Authentication Theft Microchip Worker Commute Smart Office Video Games Employer Employee Relationship webinar Flash Evernote File Sharing Internet Exlporer Google Apps Trending Two Factor Authentication Windows Server 2008 Human Resources Troubleshooting Public Cloud Screen Mirroring Twitter Administrator IBM Outlook eWaste Millennials Password Management Chromecast Scalability Experience Vendor Management iPhone Nanotechnology Camera Search Engine Laptop Data Warehousing Lifestyle Computer Accessories Conferencing Sync Practices Wireless Charging Augmented Reality Education Assessment IT Consultant Staff Regulation Cast User Error Google Docs Addiction Supercomputer Wireless Criminal Workforce NIST Downtime Mobile Smart Tech Printers Bing Touchpad Techology CrashOverride Reputation Advertising Password Manager Machine Learning NarrowBand Bluetooth Netflix Telephony Hosted Computing Fiber-Optic Remote Worker Television GDPR Thank You E-Commerce Congratulations nonprofits