k_Street Consulting, LLC Blog

Why Your Business Needs to Define Its Ethical Code

Why Your Business Needs to Define Its Ethical Code

As the technology that businesses have available to them develops, so does the propensity for this technology to be used unethically. This has become especially apparent where data collection is concerned, and what that data is used for after it has been collected. How can you keep operations moving both productively, and ethically?

Collection Concerns
Data collection is one of the current big concerns in technology. With another newsworthy data breach practically every other day, companies that accumulate data for seemingly little reason effectively put their clients and customers at a greater risk of having this data stolen. Reflecting upon this, it is no wonder that 75 percent of consumers are concerned about brands keeping track of their browsing habits.

Facebook has been the focus of some negative attention in past months thanks to these concerns. In addition to the Cambridge Analytica situation, Facebook has adopted artificial intelligence technologies to analyze their users. This analysis is used to predict future behaviors, these insights being sold to advertisers. While this brings up many legitimate concerns about data privacy, it also introduces a different topic: the need for a code of ethics surrounding the use of collected data, as well as how much data is collected.

Why This Is a Real Issue
It should come as no surprise that businesses and individuals have different priorities, and that these different priorities shape their ethics in different ways. Likewise, the primary purpose of any business is to generate revenue through profit. Therefore, it only makes sense that a business as a unit would have the motivation to collect as much data as they can - after all, the more data available, the more insights that could be presumably be gleaned, and the more successful the business would be… in theory.

However, as mentioned above, many businesses seem to collect as much data as they can just so they can have it. This is not a great approach for them to take for a few reasons. Most obviously, because it just enables more data to be compromised if a breach was to occur.

Without the guidance of a code of ethics leading your business decisions, the likelihood of risking your clients’ data for the sake of advancement - be it more insight, improved automation and artificial intelligence, or another business goal - becomes much higher.

Enforcing Ethics
In order to create a workplace that is in alignment with your determined ethics, you need to make sure of two things. One, that you clearly establish and share them within your business so that your employees are on the same page as you are, and two, that you stand by these ethics.

To accomplish this, learning your company’s ethics should be a part of an employee’s onboarding process, with a written document leaving no questions as to what will and won’t be tolerated. Then, you need to make sure that you not only listen when ethical violations are reported, but also allow those reporting them to remain anonymous.

What would be the most important aspect of your policy for employees to follow? Share it in the comments!



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, February 21 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Smartphones Data Security Environment Office Content Filtering Instant Messaging communications How to Data Protection Archive Printer Strategy Apps Professional Services Employer-Employee Relationship Hardware Two-factor Authentication Telephone System Phone System Passwords Inventory Bloatware Security Cameras Virtual Assistant Communication Users Digital Signature Operating Systems Cameras Computing Infrastructure SharePoint Save Money Meetings Disaster Recovery MSP Accountants Hacker Internet exploMicrosoft Phishing Social Engineering Excel Shortcut Data Storage Data Backup Wireless Internet Android Holiday BYOD Customers eCommerce Backup and Disaster Recovery Television Multiple Versions Managed Service Budget Downtime Troubleshooting Windows 10 Display Botnet Product Reviews Spam Public Computer Enterprise Content Management Employer Employee Relationship Analyitcs Augmented Reality Statistics Gadgets Connectivity Public Cloud Unsupported Software Access Control Science Scam Virtual Reality Smartwatch Google Drive Remote Worker Automation Mobile Devices Proactive IT HBO IT service Scalability Hosted Solution Browser Streaming Media Root Cause Analysis Data storage Best Practice Computer History Settings Vulnerability Flexibility Human Resources Millennials Virtualization Wireless Charging Information IT Solutions IT Management Amazon Microchip Online Currency Social Networking Alert Efficiency Telephony Laptop Pain Points Bandwidth Software Tips Worker Commute Printers Loyalty Content Management Computer Care BDR Mobile Device Management Recovery Fraud Screen Mirroring Current Events avoiding downtime App Cables Saving Time Unified Communications Backup GDPR Collaboration Point of Sale Big data Outlook Humor Samsung Hackers Best Practices Hacking Healthcare Analysis Books Cybercrime Amazon Web Services Twitter NarrowBand Virtual Desktop Employee Sports VoIP Business Intelligence Remote Monitoring Electronic Health Records Authentication Warranty Windows 10 WiFi Leadership Windows Server 2008 Relocation How To Infrastructure Start Menu Evernote VPN User Error travel Mobility Experience Law Enforcement HVAC Google Criminal Safe Mode Wire Private Cloud Trending Risk Management Facebook Applications Gmail Gaming Console WIndows 7 Router ISP Rootkit Printer Server CrashOverride Managed Service Provider Cost Management Compliance Audit Comparison Practices Physical Security Data Warehousing Reputation Administrator Business Mangement Customer Service Mobile User Tips Mobile Device Domains Virtual Private Network Knowledge Supercomputer Transportation Password Multi-Factor Security The Internet of Things Business Continuity Specifications Cybersecurity Computer Accessories Tech Support Cloud Wi-Fi Shortcuts DDoS Electronic Medical Records Email Hybrid Cloud Smart Office Hard Drives FENG Cast Chromecast File Sharing Running Cable Managed IT Services Computers Storage Audiobook Fiber-Optic Techology Mobile Office Flash Windows Media Player Customer Relationship Management HIPAA Virus Website Apple Social Media Black Market Battery Hosted Computing Cache Blockchain IT solutions Voice over Internet Protocol CES Data loss Business Computing Camera Entertainment Productivity YouTube Consultant Congratulations Tip of the Week Regulation Employee/Employer Relationship Data Office 365 Tablet IaaS iphone Thank You Mouse Skype Value Identity Theft Workplace Tips Security Information Technology Telecommuting Keyboard Insurance Microsoft Office Worker Firewall Best Available Business Technology File Versioning Encryption Devices Thought Leadership Mobile Computing Emergency Sync Two Factor Authentication Computer Repair Touchscreen Machine Learning E-Commerce Solid State Drive Artificial Intelligence Upgrade Unified Threat Management Biometrics Redundancy Regulations Privacy Memory Smart Technology USB Maintenance SaaS Small Business Ransomware Update IBM Search Engine Hring/Firing Line of Business Content Smartphone Help Desk Webinar Utility Computing Application malware Network Security Entrepreneur Telephone Systems Training Cortana Smart Tech User Project Management Proactive Distributed Denial of Service Restore Data IT Support analytics IT Support webinar IT Services Going Green Antivirus Workers Analytic Music Content Filter Marketing Staff Uninterrupted Power Supply Word Remote Monitoring and Maintenance Conferencing Cryptocurrency Tech Term Bluetooth End of Support Search Vendor IoT Remote Work Quick Tips Cleaning Cloud Computing Software Net Neutrality Patch Management Digital Signage Programming Paperless Office Operating System Work/Life Balance Save Time Assessment Notifications Read Charger Touchpad Recycling Software as a Service Wearable Technology Internet Business Owner Internet Exlporer Password Manager Health Money Online Shopping People Government Google Apps Wireless Technology Lifestyle Password Management Business Management Managed IT Services Wiring Vendor Management Workforce Data Breach Tip of the week Bring Your Own Device HaaS Emails Server Safety Spam Blocking Windows 8 Data Recovery Addiction Files Managing Stress Fax Server Students NIST Frequently Asked Questions Business Automobile Network Networking Intranet Company Culture Digital Payment Retail LinkedIn Bing Colocation Outsourced IT Servers Data Management Monitor Lithium-ion battery Google Docs Video Games Legal IT Plan Document Management Network Congestion Saving Money Technology Windows 7 Shadow IT Netflix Robot Education Social PowerPoint Miscellaneous Wireless Innovation PDF Benefits Nanotechnology Tools Managed IT Internet of Things Theft Remote Computing Productivity OneNote Credit Cards Google Search Hiring/Firing Windows IT Consultant Windows 10s Chrome Hosted Solutions Administration Office Tips Advertising Politics eWaste Computer Fan Microsoft Tablets

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *