k_Street Consulting, LLC Blog

Why Your Business Needs to Define Its Ethical Code

Why Your Business Needs to Define Its Ethical Code

As the technology that businesses have available to them develops, so does the propensity for this technology to be used unethically. This has become especially apparent where data collection is concerned, and what that data is used for after it has been collected. How can you keep operations moving both productively, and ethically?

Collection Concerns
Data collection is one of the current big concerns in technology. With another newsworthy data breach practically every other day, companies that accumulate data for seemingly little reason effectively put their clients and customers at a greater risk of having this data stolen. Reflecting upon this, it is no wonder that 75 percent of consumers are concerned about brands keeping track of their browsing habits.

Facebook has been the focus of some negative attention in past months thanks to these concerns. In addition to the Cambridge Analytica situation, Facebook has adopted artificial intelligence technologies to analyze their users. This analysis is used to predict future behaviors, these insights being sold to advertisers. While this brings up many legitimate concerns about data privacy, it also introduces a different topic: the need for a code of ethics surrounding the use of collected data, as well as how much data is collected.

Why This Is a Real Issue
It should come as no surprise that businesses and individuals have different priorities, and that these different priorities shape their ethics in different ways. Likewise, the primary purpose of any business is to generate revenue through profit. Therefore, it only makes sense that a business as a unit would have the motivation to collect as much data as they can - after all, the more data available, the more insights that could be presumably be gleaned, and the more successful the business would be… in theory.

However, as mentioned above, many businesses seem to collect as much data as they can just so they can have it. This is not a great approach for them to take for a few reasons. Most obviously, because it just enables more data to be compromised if a breach was to occur.

Without the guidance of a code of ethics leading your business decisions, the likelihood of risking your clients’ data for the sake of advancement - be it more insight, improved automation and artificial intelligence, or another business goal - becomes much higher.

Enforcing Ethics
In order to create a workplace that is in alignment with your determined ethics, you need to make sure of two things. One, that you clearly establish and share them within your business so that your employees are on the same page as you are, and two, that you stand by these ethics.

To accomplish this, learning your company’s ethics should be a part of an employee’s onboarding process, with a written document leaving no questions as to what will and won’t be tolerated. Then, you need to make sure that you not only listen when ethical violations are reported, but also allow those reporting them to remain anonymous.

What would be the most important aspect of your policy for employees to follow? Share it in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Friday, December 14 2018

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

History Upgrade Spam Blocking Shadow IT Sync Browser Windows 10s Books Benefits Online Shopping Hiring/Firing Audiobook Computer Inventory Excel PowerPoint Two Factor Authentication Network Internet of Things Virtual Reality Statistics Scam Business Computing Telephony Proactive Troubleshooting Google Docs Saving Money Password Manager Users Conferencing Managed Service Provider Television Alert Unified Threat Management Online Currency Credit Cards Mobile Device Management Touchscreen Application Point of Sale Fiber-Optic Healthcare Government Workforce Small Business Distributed Denial of Service Retail Hosted Solutions NarrowBand How To Mobile Facebook Downtime Wiring Trending Apps Congratulations Public Cloud Website Virtual Desktop Leadership Pain Points VoIP Nanotechnology Students Mobile Office Budget Software Tips Encryption Windows Utility Computing Firewall communications Proactive IT Managed IT Data storage Augmented Reality Recovery The Internet of Things Regulations Identity Theft Politics HVAC webinar Computers Running Cable IT Management Assessment Smartphones Hacking Internet Exlporer Connectivity WIndows 7 IBM Safe Mode IT Support Windows 8 Touchpad Employer Employee Relationship Data Backup Instant Messaging Social Networking Innovation Display LinkedIn IT service Money Tip of the week Password Video Games Search Engine Camera Data Recovery Intranet Worker Commute Hosted Solution Gadgets Shortcuts Microsoft Smart Tech Social Fax Server Windows Server 2008 Screen Mirroring Administration Telephone Systems Wireless Internet Best Practices Infrastructure Colocation Virus Public Computer Software as a Service DDoS Skype Two-factor Authentication Office 365 Relocation Mobile Computing Evernote Emergency Criminal Read User Unified Communications Practices Managed Service Comparison Internet exploMicrosoft Wireless IT Plan Data loss Business Continuity CrashOverride Accountants Gaming Console Remote Computing Compliance Environment Legal Chrome Recycling Administrator Office Audit Black Market Cybersecurity Information Flexibility PDF Wearable Technology Devices avoiding downtime Servers Technology Thought Leadership HBO Safety Productivity Specifications Mobile Device Bandwidth Remote Monitoring and Maintenance Line of Business Addiction Tip of the Week Twitter CES Theft Redundancy Remote Worker Samsung Customers Save Time Google Drive IT solutions Antivirus Insurance Amazon Web Services Android User Tips Windows Media Player Thank You Flash GDPR Advertising Efficiency Data Management Spam Machine Learning How to Paperless Office Wireless Charging Going Green MSP Bloatware Tools Warranty Root Cause Analysis App Operating Systems Managed IT Services BDR Health Settings Backup Windows 10 Phishing Mouse Loyalty Domains Printer Apple Storage Cameras Keyboard Project Management Entertainment Regulation Memory Gmail OneNote Multi-Factor Security Content Filtering Start Menu Notifications Chromecast Patch Management Networking IaaS Programming Wi-Fi Mobility Analyitcs Outlook WiFi Wire Cables People Humor Lithium-ion battery Internet Document Management Work/Life Balance Virtual Assistant Hosted Computing Workers File Sharing Disaster Recovery Fraud BYOD Help Desk eCommerce Emails Smartphone Network Security Millennials Cryptocurrency Cortana Electronic Medical Records Quick Tips Security Hacker Hardware Computer Care Consultant Managed IT Services SaaS Data Warehousing Cost Management Holiday Miscellaneous Windows 10 Privacy Data Breach Cybercrime Customer Service Lifestyle Archive Product Reviews Current Events Virtual Private Network YouTube Ransomware Business Owner E-Commerce Staff Biometrics Computer Accessories Education Data Managing Stress Marketing Solid State Drive Strategy IT Services Netflix Private Cloud Sports Best Available Analytic Passwords iphone Botnet Update Tablet Unsupported Software Big data Human Resources USB Value Vendor Management Webinar Blockchain Remote Work NIST HIPAA Data Storage Customer Relationship Management Streaming Media Vulnerability Applications SharePoint Cast Transportation Search Voice over Internet Protocol Files Hring/Firing Employer-Employee Relationship Analysis Tablets Laptop Digital Signature Microsoft Office Social Engineering Mobile Devices Knowledge Microchip Communication Bluetooth Cloud Phone System Email Charger Collaboration Artificial Intelligence Smart Office Save Money Wireless Technology Automation Office Tips analytics Enterprise Content Management Robot Telecommuting Business Technology Law Enforcement Risk Management Amazon Access Control Hybrid Cloud Telephone System Data Security Bing Frequently Asked Questions Content Management Password Management eWaste Uninterrupted Power Supply Physical Security Network Congestion IT Solutions IT Support Computer Fan Meetings Workplace Tips Cache Techology Content Music User Error Smart Technology Authentication malware Supercomputer End of Support Content Filter Maintenance Best Practice Remote Monitoring Router Shortcut Google Apps Tech Support Electronic Health Records IT Consultant Printers Information Technology VPN Printer Server Word Saving Time Entrepreneur Operating System Hackers Worker Bring Your Own Device Rootkit travel Outsourced IT Productivity Business Intelligence Computer Repair Tech Term Google Battery Business Mangement FENG Scalability IoT Windows 7 HaaS Science Cleaning Hard Drives Reputation Software Business Management Computing Infrastructure Digital Payment Professional Services Virtualization Automobile Cloud Computing Monitor Server Net Neutrality Social Media Company Culture Data Protection Experience Business Training

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *