shutterstock 99713225 TEST SIZE V8 051016

 

 "Only the Client can define Quality."

Have IT Questions?
Call us now (888) 894-6411

TWINTEL Solutions Blog

Why Your Business Needs to Define Its Ethical Code

Why Your Business Needs to Define Its Ethical Code

As the technology that businesses have available to them develops, so does the propensity for this technology to be used unethically. This has become especially apparent where data collection is concerned, and what that data is used for after it has been collected. How can you keep operations moving both productively, and ethically?

Collection Concerns
Data collection is one of the current big concerns in technology. With another newsworthy data breach practically every other day, companies that accumulate data for seemingly little reason effectively put their clients and customers at a greater risk of having this data stolen. Reflecting upon this, it is no wonder that 75 percent of consumers are concerned about brands keeping track of their browsing habits.

Facebook has been the focus of some negative attention in past months thanks to these concerns. In addition to the Cambridge Analytica situation, Facebook has adopted artificial intelligence technologies to analyze their users. This analysis is used to predict future behaviors, these insights being sold to advertisers. While this brings up many legitimate concerns about data privacy, it also introduces a different topic: the need for a code of ethics surrounding the use of collected data, as well as how much data is collected.

Why This Is a Real Issue
It should come as no surprise that businesses and individuals have different priorities, and that these different priorities shape their ethics in different ways. Likewise, the primary purpose of any business is to generate revenue through profit. Therefore, it only makes sense that a business as a unit would have the motivation to collect as much data as they can - after all, the more data available, the more insights that could be presumably be gleaned, and the more successful the business would be… in theory.

However, as mentioned above, many businesses seem to collect as much data as they can just so they can have it. This is not a great approach for them to take for a few reasons. Most obviously, because it just enables more data to be compromised if a breach was to occur.

Without the guidance of a code of ethics leading your business decisions, the likelihood of risking your clients’ data for the sake of advancement - be it more insight, improved automation and artificial intelligence, or another business goal - becomes much higher.

Enforcing Ethics
In order to create a workplace that is in alignment with your determined ethics, you need to make sure of two things. One, that you clearly establish and share them within your business so that your employees are on the same page as you are, and two, that you stand by these ethics.

To accomplish this, learning your company’s ethics should be a part of an employee’s onboarding process, with a written document leaving no questions as to what will and won’t be tolerated. Then, you need to make sure that you not only listen when ethical violations are reported, but also allow those reporting them to remain anonymous.

What would be the most important aspect of your policy for employees to follow? Share it in the comments!

Tip of the Week: Technology Has Your Business Cove...
The New Version of Chrome has Interesting Changes
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, January 22 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Technology Cloud Privacy Business Computing Hackers Network Security Backup Hosted Solutions Malware Mobile Devices Google Data VoIP Microsoft Business Disaster Recovery Software Email Business Continuity bgc roundup communications nonprofit Outsourced IT Managed IT Services Alert Innovation Internet Hardware IT Services Smartphones User Tips Tech Term Data Backup Browser Managed IT Services Windows 10 Computer Ransomware Server Smartphone Saving Money Data Recovery Internet of Things Cybercrime Cloud Computing Android Efficiency Network Communication IT Support IT Support BDR Computers Workplace Tips Small Business Productivity Business Management Windows Passwords Office Save Money Miscellaneous Productivity Artificial Intelligence Quick Tips Cybersecurity BYOD Money Social Engineering Mobility Chrome Recovery Holiday Windows 10 Applications Mobile Device Management Managed IT Router Telephone Systems Firewall Mobile Device Work/Life Balance Phishing Wi-Fi Office 365 Social Media Virtualization Gadgets Collaboration Hacking Vulnerability Upgrade Law Enforcement Facebook Automation Avoiding Downtime Compliance App VPN Health Password Proactive IT Microsoft Office Private Cloud Bandwidth Word Two-factor Authentication Information Remote Monitoring Bring Your Own Device Google Drive Data Protection Flexibility Budget How To Office Tips Managed Service Provider Apps Safety Operating System Voice over Internet Protocol Software as a Service Keyboard Data Security Servers Redundancy Identity Theft Remote Computing Data Breach Business Intelligence Connectivity Sports Information Technology HaaS Managed Service Spam Settings Scam Mobile Computing History Value Black Market IT Management Worker Data Management Employer-Employee Relationship USB End of Support Unified Threat Management Spam Blocking Human Resources Telephone System Comparison Battery Content Filtering Entertainment IT Plan Data storage SaaS Infrastructure Paperless Office Update Hiring/Firing Cleaning Business Owner The Internet of Things Emergency Training Workers Credit Cards Machine Learning WiFi Big Data PDF Computer Care Document Management Government Patch Management Solid State Drive CES Computing Infrastructure Windows 7 Fraud Marketing OneNote Legal Google Docs Samsung Save Time Encryption HIPAA Telephony Content Management Risk Management Unsupported Software Hacker Charger Data Storage Website Access Control Physical Security Automobile Wireless Technology Electronic Medical Records YouTube Blockchain Virtual Assistant Amazon Web Services Public Computer Recycling Enterprise Content Management Audiobook Authentication Loyalty Google Apps Computer Fan Smart Office Meetings Botnet iPhone File Sharing How to Excel Remote Work Twitter Administrator Worker Commute Start Menu Shortcuts Unified Communications Benefits Knowledge Online Shopping eWaste Password Management Video Games Multi-Factor Security User Error Rootkit Nanotechnology Camera Wireless FENG Data loss Smartwatch Downtime Practices Augmented Reality Troubleshooting Tip of the week Reputation Advertising Windows 10s Addiction Tools Social Theft Smart Technology Network Congestion Staff Regulation Scalability Experience HBO Specifications Education Flash Microchip Evernote Hard Drives Criminal NIST Trending Monitor Colocation Smart Tech Printers Password Manager Screen Mirroring Chromecast Robot Employer Employee Relationship webinar Hosted Computing Remote Worker Windows Server 2008 Laptop Customers Public Cloud Cache Techology Vendor Two Factor Authentication Digital Signature Outlook Millennials Warranty Sync Search Engine Wireless Charging Relocation IBM Cryptocurrency Data Warehousing Lifestyle Vendor Management Books Touchpad Assessment Business Mangement HVAC Cast Files Computer Accessories Conferencing Inventory Wiring Shadow IT Wireless Internet NarrowBand Mobile Display IT Consultant Instant Messaging Workforce Devices Printer Users Bing Fiber-Optic Humor Supercomputer Safe Mode Hosted Solution Regulations Amazon Television Gmail CrashOverride Networking Best Practice Content Bluetooth Netflix Cortana Audit Wire Professional Services Security Cameras Apple Leadership Accountants MSP Search Frequently Asked Questions Going Green Telecommuting Internet Exlporer Thought Leadership Mouse Virtual Reality Skype Help Desk Cables Transportation Current Events Politics Software Tips E-Commerce Thank You Congratulations nonprofits GDPR