DatCom Blog

Why Your Business Needs to Define Its Ethical Code

Why Your Business Needs to Define Its Ethical Code

As the technology that businesses have available to them develops, so does the propensity for this technology to be used unethically. This has become especially apparent where data collection is concerned, and what that data is used for after it has been collected. How can you keep operations moving both productively, and ethically?

Collection Concerns
Data collection is one of the current big concerns in technology. With another newsworthy data breach practically every other day, companies that accumulate data for seemingly little reason effectively put their clients and customers at a greater risk of having this data stolen. Reflecting upon this, it is no wonder that 75 percent of consumers are concerned about brands keeping track of their browsing habits.

Facebook has been the focus of some negative attention in past months thanks to these concerns. In addition to the Cambridge Analytica situation, Facebook has adopted artificial intelligence technologies to analyze their users. This analysis is used to predict future behaviors, these insights being sold to advertisers. While this brings up many legitimate concerns about data privacy, it also introduces a different topic: the need for a code of ethics surrounding the use of collected data, as well as how much data is collected.

Why This Is a Real Issue
It should come as no surprise that businesses and individuals have different priorities, and that these different priorities shape their ethics in different ways. Likewise, the primary purpose of any business is to generate revenue through profit. Therefore, it only makes sense that a business as a unit would have the motivation to collect as much data as they can - after all, the more data available, the more insights that could be presumably be gleaned, and the more successful the business would be… in theory.

However, as mentioned above, many businesses seem to collect as much data as they can just so they can have it. This is not a great approach for them to take for a few reasons. Most obviously, because it just enables more data to be compromised if a breach was to occur.

Without the guidance of a code of ethics leading your business decisions, the likelihood of risking your clients’ data for the sake of advancement - be it more insight, improved automation and artificial intelligence, or another business goal - becomes much higher.

Enforcing Ethics
In order to create a workplace that is in alignment with your determined ethics, you need to make sure of two things. One, that you clearly establish and share them within your business so that your employees are on the same page as you are, and two, that you stand by these ethics.

To accomplish this, learning your company’s ethics should be a part of an employee’s onboarding process, with a written document leaving no questions as to what will and won’t be tolerated. Then, you need to make sure that you not only listen when ethical violations are reported, but also allow those reporting them to remain anonymous.

What would be the most important aspect of your policy for employees to follow? Share it in the comments!

Tip of the Week: Technology Has Your Business Cove...
The New Version of Chrome has Interesting Changes


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, December 16 2018

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Tip of the Week Security Technology Privacy Best Practices Cloud Network Security Hackers Microsoft User Tips Hosted Solutions Business Computing Software Malware Tech Term Google Internet Business Backup Hardware Data Backup Innovation Mobile Devices Data Email Smartphones Communications Business Continuity Android VoIP Workplace Tips Data Recovery Small Business Smartphone Computer Managed IT Services Cloud Computing Ransomware IT Services Cybersecurity Communication Browser Chrome Alert Outsourced IT Law Enforcement Cybercrime Disaster Recovery Windows 10 Network Server Router Office 365 Business Management Internet of Things Efficiency Money Collaboration IT Support Computers Password Windows 10 Windows Miscellaneous Productivity How To Artificial Intelligence Applications Word Gadgets BDR Spam Saving Money Social Media Managed IT Services Telephone Systems Productivity Facebook Information Passwords Virtualization Mobile Device Save Money Connectivity BYOD Voice over Internet Protocol Managed Service Holiday Data Security Flexibility Apps Operating System Two-factor Authentication Government App Mobility Data Protection Vulnerability Social Engineering Avoiding Downtime Wi-Fi Quick Tips Mobile Device Management Work/Life Balance Keyboard Office Microsoft Office Phishing Spam Blocking End of Support VPN Upgrade Virtual Assistant Office Tips Remote Computing Public Cloud IT Plan Business Intelligence Fraud Managed IT Bring Your Own Device Update Telephone System Telephony Unsupported Software Windows 7 CES Data Breach Software as a Service Sports Data Management Data Storage Content Management Legal Bandwidth Google Docs Settings OneNote Health Redundancy Employer-Employee Relationship IT Management HaaS Comparison Blockchain Identity Theft Scam Networking Website Servers Encryption Entertainment Infrastructure Remote Monitoring Paperless Office Private Cloud Google Drive Human Resources Tip of the week Credit Cards Inventory IBM Wiring Knowledge Data loss Criminal Experience Charger HVAC Title II iPhone Techology Downtime Password Manager HIPAA Machine Learning Marketing Bing Netflix Virtual Reality The Internet of Things Wireless Charging Wireless Internet Printer webinar Staff Windows 10s Windows Server 2008 Hacking Access Control Supercomputer Devices Unified Threat Management Internet exploMicrosoft Network Congestion Screen Mirroring Cleaning Enterprise Content Management Online Accountants MSP Root Cause Analysis Botnet Business Mangement Budget YouTube Help Desk Wireless HBO Worker Commute FENG Scalability Cortana Hiring/Firing Wire Users Mouse Hybrid Cloud Conferencing Battery Millennials Password Management Automobile Amazon Authentication Thought Leadership Mobile Computing IT Consultant Cast Black Market Multi-Factor Security Music Computer Care Telecommuting File Sharing Search WiFi Gmail Company Culture Outlook Digital Signature Firewall Skype Content Travel Google Apps Risk Management Administrator Information Technology Emails Software Tips Education Workforce NIST Solid State Drive Flash Amazon Web Services Nanotechnology Camera Leadership Trending Wearable Technology Document Management Remote Work Practices Patch Management Augmented Reality Automation Meetings How to Recycling Training Managing Stress Shortcuts Frequently Asked Questions Net Neutrality PDF Start Menu Audiobook Workers Politics Smart Office Microchip Computing Infrastructure Cryptocurrency Audit Video Games Online Shopping Smart Tech Current Events Addiction Advertising USB Samsung Excel Best Practice Hosted Computing Remote Worker Internet Exlporer Recovery eWaste FCC Big Data Apple Tools Instant Messaging Search Engine Physical Security History Safe Mode Computer Fan Sync Evernote Electronic Medical Records Cache Warranty IT Support Specifications Value Transportation Shadow IT Books Public Computer Loyalty Safety Wireless Technology Benefits Managed Service Provider Worker Hosted Solution SaaS Smart Technology Business Owner Emergency Rootkit Compliance Employer Employee Relationship Two Factor Authentication Twitter Content Filtering Assessment Regulation Computer Accessories Webinar Printers Save Time Vendor Management Television CrashOverride Bluetooth IT solutions Troubleshooting