XFER Blog

XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Your Business Needs to Define Its Ethical Code

Why Your Business Needs to Define Its Ethical Code

As the technology that businesses have available to them develops, so does the propensity for this technology to be used unethically. This has become especially apparent where data collection is concerned, and what that data is used for after it has been collected. How can you keep operations moving both productively, and ethically?

Collection Concerns
Data collection is one of the current big concerns in technology. With another newsworthy data breach practically every other day, companies that accumulate data for seemingly little reason effectively put their clients and customers at a greater risk of having this data stolen. Reflecting upon this, it is no wonder that 75 percent of consumers are concerned about brands keeping track of their browsing habits.

Facebook has been the focus of some negative attention in past months thanks to these concerns. In addition to the Cambridge Analytica situation, Facebook has adopted artificial intelligence technologies to analyze their users. This analysis is used to predict future behaviors, these insights being sold to advertisers. While this brings up many legitimate concerns about data privacy, it also introduces a different topic: the need for a code of ethics surrounding the use of collected data, as well as how much data is collected.

Why This Is a Real Issue
It should come as no surprise that businesses and individuals have different priorities, and that these different priorities shape their ethics in different ways. Likewise, the primary purpose of any business is to generate revenue through profit. Therefore, it only makes sense that a business as a unit would have the motivation to collect as much data as they can - after all, the more data available, the more insights that could be presumably be gleaned, and the more successful the business would be… in theory.

However, as mentioned above, many businesses seem to collect as much data as they can just so they can have it. This is not a great approach for them to take for a few reasons. Most obviously, because it just enables more data to be compromised if a breach was to occur.

Without the guidance of a code of ethics leading your business decisions, the likelihood of risking your clients’ data for the sake of advancement - be it more insight, improved automation and artificial intelligence, or another business goal - becomes much higher.

Enforcing Ethics
In order to create a workplace that is in alignment with your determined ethics, you need to make sure of two things. One, that you clearly establish and share them within your business so that your employees are on the same page as you are, and two, that you stand by these ethics.

To accomplish this, learning your company’s ethics should be a part of an employee’s onboarding process, with a written document leaving no questions as to what will and won’t be tolerated. Then, you need to make sure that you not only listen when ethical violations are reported, but also allow those reporting them to remain anonymous.

What would be the most important aspect of your policy for employees to follow? Share it in the comments!

Tip of the Week: Technology Has Your Business Cove...
The New Version of Chrome has Interesting Changes
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, March 20 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Data Hackers Small Business Google Mobile Devices Hardware Productivity VoIP Mobile Office Email Malware Network Security Gadgets Quick Tips Efficiency Innovation Business Management Network IT Services IT Support Business Social Media Business Continuity Smartphones Server Miscellaneous Upgrade User Tips Communication Communications Virtualization Windows Disaster Recovery Data Backup Computer Microsoft Office Managed IT Services Users Data Recovery Smartphone Passwords Browser Mobile Device Management Internet of Things Android Holiday WiFi Marketing Save Money Productivity Alert Outsourced IT Tech Term Vendor Management Ransomware Cloud Computing Cybercrime BDR Artificial Intelligence Mobile Computing Router Windows 10 Operating System Remote Monitoring Chrome Automation Bring Your Own Device Apple Remote Computing BYOD Information Technology Avoiding Downtime Cybersecurity Computers Spam History Best Practice Big Data Going Green Telephone Systems IT Solutions Firewall The Internet of Things Managed IT Services VPN Collaboration Health Current Events Hacking Phone System Wireless Technology Proactive IT Social Engineering Windows 10 IT Consultant Employer-Employee Relationship Printer Trending Facebook Application Money Bandwidth Lithium-ion Battery Excel App Mobile Device Office IT Support Mobility Budget Encryption Training How To Mouse Maintenance Windows 8 Content Filtering Business Intelligence Networking Phishing Private Cloud Two-factor Authentication Unified Threat Management Office 365 Business Managament Applications Recovery iPhone Fax Server Save Time Hard Drives Data Protection Google Drive Website Blockchain Word Information Antivirus Managed IT Gmail Data Security Analytics Apps User Error Settings File Sharing Redundancy Humor PowerPoint Outlook Law Enforcement Tutorials Virus Value Sports Access Control Customer Relationship Management Document Management Inbound Marketing Streaming Media Risk Management Social Machine Learning Office Tips Tech Support Compliance Analysis Administration Saving Time Scam Flexibility Augmented Reality Identity Theft Paperless Office Entertainment Managed Service Wi-Fi Digital Payment Social Networking Business Technology Connectivity Retail Computer Repair Downtime Voice over Internet Protocol Vulnerability Meetings Human Resources Memory IT Management Data Management Conferencing Servers Network Congestion Hacker Administrator Tablet Search Twitter Software as a Service Recycling Unsupported Software USB Help Desk Point of Sale Public Cloud Infrastructure Robot Smart Tech Data loss SaaS Cryptocurrency Education Statistics Update Data storage Spam Blocking Touchscreen Skype Telephony Programming Comparison eWaste Windows 7 Internet Exlporer Google Docs Intranet Running Cable Botnet PDF Safety Virtual Private Network HaaS End of Support Instant Messaging Wearable Technology Video Surveillance OneNote Net Neutrality Government Environment YouTube Credit Cards Data Storage Best Available Biometrics Virtual Assistant Display Piracy DDoS IBM Keyboard Bluetooth IT service Fraud Leadership Healthcare Work/Life Balance Data Breach People Solid State Drive CES IT Plan Black Market Samsung Telephone System Computer Accessories Webinar Workers Online Currency Wireless Physical Security Manufacturing Cleaning Password Content Management Telecommuting Alerts Wire Microchip Backup and Disaster Recovery Notifications Tools Content Filter Camera Google Search Sync Colocation Cables Entrepreneur IT Security Laptop Text Messaging Authentication MSP FENG SharePoint Windows Server 2008 Amazon Web Services Tablets Vendor Knowledge Print Server Shadow IT Remote Support Software Tips Hiring/Firing Remote Work Work Station Smart Office Cryptomining nternet Crowdfunding Windows Media Player Hybrid Cloud Password Manager Virtual Desktop Gaming Console Insurance Patch Management Storage Screen Mirroring ISP IaaS Computing Infrastructure Unified Communications Cost Management Safe Mode 360 Emails Touchpad Nanotechnology Remote Worker Electronic Medical Records Company Culture Upgrades Relocation Online Shopping Analyitcs HVAC Security Cameras Law Firm IT Legal Staff Windows 10s Monitor Business Owner Search Engine Database Business Mangement Customer Service Macro Practices Specifications Consultant Addiction Charger Cast File Versioning LinkedIn Start Menu Theft Co-managed IT Accountants Data Warehousing Wiring Hiring/Firing Smartwatch Regulations Evernote Enterprise Content Management HIPAA Employee/Employer Relationship Digital Signature Windows 8.1 Update HBO Reputation Students Bing Distribution Travel Cameras Criminal Hosted Computing Proactive Licensing Millennials Cache Project Management Computer Care Multiple Versions Mobile Internet exploMicrosoft Cortana Webcam Hosted Solution Devices GDPR Employee Wireless Charging Virtual Reality Password Management Debate NarrowBand Multi-Factor Security WIndows 7 Strategy Remote Monitoring and Maintenance Audit Frequently Asked Questions Customers Shortcuts Logistics Uninterrupted Power Supply Printer Server Shortcut Inventory Workforce User PC Care Wireless Internet Warranty Restore Data Professional Services Worker Commute Advertising Google Apps IoT Netflix 3D Thought Leadership E-Commerce Root Cause Analysis Digital Signage Distributed Denial of Service Flash Files Fiber-Optic Bloatware Scheduling NIST Chromecast Lifestyle Managing Stress Domains eBay Line of Business Computer Fan Tip of the week Amazon Science Electronic Health Records eCommerce Supercomputer Regulation Emergency Thank You Worker Music How to Audiobook Biometric Security Techology Utility Computing Assessment Congratulations Printers Rootkit Politics Television Transportation Troubleshooting Webinar Benefits Automobile Public Computer Battery IT solutions Employer Employee Relationship CrashOverride Video Games Smart Technology Loyalty Books Experience Scalability Two Factor Authentication Content

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *