DatCom Blog

Why Your Business Needs to Define Its Ethical Code

Why Your Business Needs to Define Its Ethical Code

As the technology that businesses have available to them develops, so does the propensity for this technology to be used unethically. This has become especially apparent where data collection is concerned, and what that data is used for after it has been collected. How can you keep operations moving both productively, and ethically?

Collection Concerns
Data collection is one of the current big concerns in technology. With another newsworthy data breach practically every other day, companies that accumulate data for seemingly little reason effectively put their clients and customers at a greater risk of having this data stolen. Reflecting upon this, it is no wonder that 75 percent of consumers are concerned about brands keeping track of their browsing habits.

Facebook has been the focus of some negative attention in past months thanks to these concerns. In addition to the Cambridge Analytica situation, Facebook has adopted artificial intelligence technologies to analyze their users. This analysis is used to predict future behaviors, these insights being sold to advertisers. While this brings up many legitimate concerns about data privacy, it also introduces a different topic: the need for a code of ethics surrounding the use of collected data, as well as how much data is collected.

Why This Is a Real Issue
It should come as no surprise that businesses and individuals have different priorities, and that these different priorities shape their ethics in different ways. Likewise, the primary purpose of any business is to generate revenue through profit. Therefore, it only makes sense that a business as a unit would have the motivation to collect as much data as they can - after all, the more data available, the more insights that could be presumably be gleaned, and the more successful the business would be… in theory.

However, as mentioned above, many businesses seem to collect as much data as they can just so they can have it. This is not a great approach for them to take for a few reasons. Most obviously, because it just enables more data to be compromised if a breach was to occur.

Without the guidance of a code of ethics leading your business decisions, the likelihood of risking your clients’ data for the sake of advancement - be it more insight, improved automation and artificial intelligence, or another business goal - becomes much higher.

Enforcing Ethics
In order to create a workplace that is in alignment with your determined ethics, you need to make sure of two things. One, that you clearly establish and share them within your business so that your employees are on the same page as you are, and two, that you stand by these ethics.

To accomplish this, learning your company’s ethics should be a part of an employee’s onboarding process, with a written document leaving no questions as to what will and won’t be tolerated. Then, you need to make sure that you not only listen when ethical violations are reported, but also allow those reporting them to remain anonymous.

What would be the most important aspect of your policy for employees to follow? Share it in the comments!

Tip of the Week: Technology Has Your Business Cove...
The New Version of Chrome has Interesting Changes


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, February 21 2019

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Best Practices Privacy Cloud Business Computing Network Security Google User Tips Hosted Solutions Microsoft Hackers Tech Term Software Mobile Devices Backup Malware Internet Business Data Innovation Smartphones Productivity Communications Data Backup Hardware Email Workplace Tips VoIP Cloud Computing Small Business Smartphone Data Recovery IT Services Business Continuity Android Managed IT Services Router Computer Cybersecurity Disaster Recovery Communication Ransomware Network Windows 10 Artificial Intelligence Alert Outsourced IT Browser Law Enforcement Efficiency Cybercrime Chrome Internet of Things Windows 10 IT Support Applications Server Mobile Device Gadgets Office 365 How To Money Collaboration Computers Business Management Password Windows Miscellaneous Facebook Spam Passwords Telephone Systems Virtualization Holiday Saving Money Word Social Media Wi-Fi Managed IT Services Productivity BDR Information Work/Life Balance Vulnerability Connectivity Social Engineering Office Private Cloud Managed Service Microsoft Office Settings BYOD Save Money Keyboard Mobile Device Management Flexibility Apps Operating System Encryption Government App Voice over Internet Protocol Mobility Phishing Data Security Two-factor Authentication Avoiding Downtime Quick Tips Data Protection Health Windows 7 HaaS Entertainment Bandwidth Content Management Machine Learning Google Docs End of Support Data Storage Virtual Assistant Office Tips Scam Networking OneNote Comparison Blockchain Public Cloud Remote Computing Website Redundancy Remote Monitoring Employer-Employee Relationship IT Management Identity Theft Telephone System Infrastructure Managed IT Human Resources Software as a Service Sports Google Drive Spam Blocking Upgrade VPN Business Intelligence Bring Your Own Device IT Plan Fraud Access Control Update Automation Data Management Botnet Servers Legal Data Breach Telephony CES Paperless Office Unsupported Software Video Games Firewall WiFi Gmail Cache Warranty Internet Exlporer Risk Management IT Consultant Cast Telecommuting Safe Mode Employee Travel Outlook Google Apps Wiring Apple Recovery Workforce Digital Signature HVAC Vendor Best Practice Wearable Technology Save Time Instant Messaging Patch Management Trending Skype Bing History Training Emails Software Tips Amazon Web Services Nanotechnology Solid State Drive Flash Recycling Wireless Internet Printer IT Support Politics Leadership Remote Work Practices Digital Signage Frequently Asked Questions Workers Devices Unified Threat Management iPhone Techology Current Events Meetings Net Neutrality PDF Enterprise Content Management Display Marketing USB Samsung Start Menu YouTube Help Desk Virtual Reality Online Shopping Smart Tech MSP Big Data Audit eWaste Wire Mouse Internet exploMicrosoft Hosted Computing Google Search Excel Thought Leadership Mobile Computing Electronic Medical Records FCC Password Management Security Cameras Wireless Hacking Value IBM Specifications Tools Company Culture Users Hybrid Cloud Experience Worker Commute Charger Physical Security Evernote File Sharing Scalability Computer Fan Sync Criminal Administrator HIPAA Battery Credit Cards Inventory Proactive IT Tip of the week Password Manager Camera Black Market Knowledge Data loss Title II NIST Hacker Automobile Augmented Reality Search Supercomputer Downtime Staff Managing Stress Shortcuts Information Technology Cleaning Netflix Wireless Charging Content The Internet of Things Smart Office Microchip Budget Education webinar Windows 10s Windows Server 2008 Business Mangement Addiction Hiring/Firing Network Congestion Screen Mirroring Online Accountants Cryptocurrency Smartwatch HBO Cortana Remote Worker How to Root Cause Analysis Millennials Social Music Document Management Computer Care Audiobook FENG Multi-Factor Security Search Engine Advertising Computing Infrastructure Conferencing Amazon Authentication Employer Employee Relationship Two Factor Authentication Content Filtering Assessment Computer Accessories Shadow IT Safety Vendor Management Webinar Television Bluetooth Managed Service Provider Wireless Technology Troubleshooting Transportation CrashOverride IT solutions Books Public Computer Compliance Twitter Loyalty Benefits Business Owner Worker Regulation ISP Printers Hosted Solution SaaS Smart Technology Emergency Rootkit