k_Street Consulting, LLC Blog

Why Your Business Needs to Define Its Ethical Code

Why Your Business Needs to Define Its Ethical Code

As the technology that businesses have available to them develops, so does the propensity for this technology to be used unethically. This has become especially apparent where data collection is concerned, and what that data is used for after it has been collected. How can you keep operations moving both productively, and ethically?

Collection Concerns
Data collection is one of the current big concerns in technology. With another newsworthy data breach practically every other day, companies that accumulate data for seemingly little reason effectively put their clients and customers at a greater risk of having this data stolen. Reflecting upon this, it is no wonder that 75 percent of consumers are concerned about brands keeping track of their browsing habits.

Facebook has been the focus of some negative attention in past months thanks to these concerns. In addition to the Cambridge Analytica situation, Facebook has adopted artificial intelligence technologies to analyze their users. This analysis is used to predict future behaviors, these insights being sold to advertisers. While this brings up many legitimate concerns about data privacy, it also introduces a different topic: the need for a code of ethics surrounding the use of collected data, as well as how much data is collected.

Why This Is a Real Issue
It should come as no surprise that businesses and individuals have different priorities, and that these different priorities shape their ethics in different ways. Likewise, the primary purpose of any business is to generate revenue through profit. Therefore, it only makes sense that a business as a unit would have the motivation to collect as much data as they can - after all, the more data available, the more insights that could be presumably be gleaned, and the more successful the business would be… in theory.

However, as mentioned above, many businesses seem to collect as much data as they can just so they can have it. This is not a great approach for them to take for a few reasons. Most obviously, because it just enables more data to be compromised if a breach was to occur.

Without the guidance of a code of ethics leading your business decisions, the likelihood of risking your clients’ data for the sake of advancement - be it more insight, improved automation and artificial intelligence, or another business goal - becomes much higher.

Enforcing Ethics
In order to create a workplace that is in alignment with your determined ethics, you need to make sure of two things. One, that you clearly establish and share them within your business so that your employees are on the same page as you are, and two, that you stand by these ethics.

To accomplish this, learning your company’s ethics should be a part of an employee’s onboarding process, with a written document leaving no questions as to what will and won’t be tolerated. Then, you need to make sure that you not only listen when ethical violations are reported, but also allow those reporting them to remain anonymous.

What would be the most important aspect of your policy for employees to follow? Share it in the comments!

Tip of the Week: Technology Has Your Business Cove...
The New Version of Chrome has Interesting Changes


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Monday, May 27 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Apple Business Technology Wi-Fi WiFi Domains Document Management Outsourced IT Colocation Server LinkedIn Logistics CES Customers Apps People Camera Frequently Asked Questions ISP Unified Threat Management Mobile Device Management Gaming Console Patch Management Password Manager PowerPoint Digital Signage Employee Hosted Solutions Remote Worker Recycling Data Recovery Wireless Technology Restore Data Internet exploMicrosoft Amazon Web Services Remote Monitoring Best Practice Tablet History Google Docs Going Green Humor Law Enforcement Application eCommerce Authentication Data Security Virus IBM Windows Fraud Cache IT Plan Encryption Browser CrashOverride Microchip Computer Repair Point of Sale Keyboard Flash Electronic Health Records End of Support Consultant Trending Webinar Website Business Intelligence Science Database Project Management Big data Security Proactive Benefits Scalability File Versioning Virtualization Shadow IT Disaster Recovery Save Time Theft Virtual Assistant Fax Server Managed IT Services FENG Enterprise Content Management Security Cameras Recovery Black Market Workforce Outlook IT Management Wiring Windows 8 Business Continuity Small Business Analysis malware Vulnerability Money OneNote Internet Passwords Ransomware Entrepreneur Budget travel Millennials Virtual Reality Worker Commute Insurance Politics Monitor Cybersecurity Safety Data Breach Two Factor Authentication Social Networking Emergency Computer Accessories Operating System Statistics Staff Business Strategy Wire Employer Employee Relationship Practices Relocation Chromecast Hacking Firewall Manufacturing Operating Systems Multi-Factor Security Product Reviews Managed IT Services Computing Infrastructure Physical Security Environment Networking Managed Service Users Criminal Bandwidth Multiple Versions Health Search Engine Internet Exlporer Mobile Computing Smartwatch Hard Drives SaaS Marketing avoiding downtime Printer Server How To VPN Risk Management Skype Television How to Computer HVAC Files Windows 10 IT solutions Phishing Current Events Mobile Office Programming Computer Fan Backup Loyalty Retail Workplace Tips Touchscreen The Internet of Things Cryptomining Legal Root Cause Analysis Workers Computer Care Mouse Inventory Office Tips Netflix Audiobook Public Computer NarrowBand Entertainment Cleaning Data Management Identity Theft Tip of the Week Smart Office Net Neutrality Artificial Intelligence Content Filter Miscellaneous Hosted Solution Cables Gmail Default App Augmented Reality BYOD Evernote IT Support Botnet Charger Analyitcs Addiction Windows 10 Tech Support Start Menu Collaboration WIndows 7 Social Mobile Best Available Read Line of Business Mobility Mobile Devices IT Solutions Technology Machine Learning Windows 7 Assessment Social Engineering Warranty Communication Regulation Screen Mirroring Data Backup Flexibility Microsoft Phone System Tip of the week Data Storage Supercomputer Sports analytics Two-factor Authentication Devices Fiber-Optic Internet of Things Search Government Data storage Content Filtering Remote Monitoring and Maintenance Wireless Charging communications Distributed Denial of Service Managing Stress User Error Storage Printer Experience Notifications Microsoft Office Help Desk Excel Save Money Scam Maintenance Cryptocurrency Software Tips Cloud Professional Services Office 365 Specifications Customer Relationship Management Google Rootkit Infrastructure Printers Data loss Analytic Hybrid Cloud Cybercrime MSP Shortcuts Meetings Office Software as a Service Touchpad Cost Management File Sharing Bluetooth Instant Messaging Audit Redundancy Display Data Protection Human Resources IoT Efficiency Tablets Applications Smart Technology Value Comparison Data Warehousing Password Management SharePoint Smart Tech Telephone Systems Antivirus Work/Life Balance Memory Saving Money Productivity Tools IT Consultant Unified Communications 5G eWaste Troubleshooting Cortana Running Cable User Pain Points Paperless Office Facebook Telephone System Employer-Employee Relationship Remote Computing Intranet Healthcare Shortcut Samsung Amazon Holiday Password Network Security VoIP HBO DDoS Hardware USB Laptop Lithium-ion battery Chrome Settings Wireless Thank You Spam Public Cloud Administration Blockchain Cast HaaS E-Commerce Bring Your Own Device IT service Digital Payment Wireless Internet Worker Computers OLED Books Smartphone Thought Leadership GDPR Innovation Windows Media Player Data Social Media Hackers YouTube Compliance Telephony Automation Online Currency Digital Signature Smartphones Accountants Biometrics HIPAA Access Control Google Drive iphone Productivity Business Owner Upgrade Techology Quick Tips Regulations Email Cameras Mobile Device Cloud Computing Company Culture Network Congestion Remote Work Voice over Internet Protocol Gadgets Battery Employee/Employer Relationship Credit Cards Administrator Nanotechnology App Virtual Desktop Automobile Music Robot Private Cloud User Tips Twitter Connectivity Downtime Tech Term Servers Network Utility Computing Business Mangement Bing Router Managed IT Content Management Vendor Management Archive Training Emails Proactive IT Information Technology Windows Server 2008 Cabling Transportation Lifestyle Privacy Streaming Media Spam Blocking Saving Time PDF Virtual Private Network Managed Service Provider Online Shopping Hiring/Firing IT Support Vendor webinar Information Video Games Sync Android Electronic Medical Records Hosted Computing Biometric Security Advertising Bloatware Customer Service NIST Wearable Technology Leadership Alert Distribution Congratulations Business Computing Hacker Uninterrupted Power Supply Conferencing BDR Safe Mode Business Management Update Unsupported Software Word Telecommuting Google Search IT Services Windows 10s Content Knowledge Best Practices Education Hring/Firing Google Apps Reputation Students Solid State Drive IaaS Software Backup and Disaster Recovery

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *