XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Your Business Needs to Define Its Ethical Code

Why Your Business Needs to Define Its Ethical Code

As the technology that businesses have available to them develops, so does the propensity for this technology to be used unethically. This has become especially apparent where data collection is concerned, and what that data is used for after it has been collected. How can you keep operations moving both productively, and ethically?

Collection Concerns
Data collection is one of the current big concerns in technology. With another newsworthy data breach practically every other day, companies that accumulate data for seemingly little reason effectively put their clients and customers at a greater risk of having this data stolen. Reflecting upon this, it is no wonder that 75 percent of consumers are concerned about brands keeping track of their browsing habits.

Facebook has been the focus of some negative attention in past months thanks to these concerns. In addition to the Cambridge Analytica situation, Facebook has adopted artificial intelligence technologies to analyze their users. This analysis is used to predict future behaviors, these insights being sold to advertisers. While this brings up many legitimate concerns about data privacy, it also introduces a different topic: the need for a code of ethics surrounding the use of collected data, as well as how much data is collected.

Why This Is a Real Issue
It should come as no surprise that businesses and individuals have different priorities, and that these different priorities shape their ethics in different ways. Likewise, the primary purpose of any business is to generate revenue through profit. Therefore, it only makes sense that a business as a unit would have the motivation to collect as much data as they can - after all, the more data available, the more insights that could be presumably be gleaned, and the more successful the business would be… in theory.

However, as mentioned above, many businesses seem to collect as much data as they can just so they can have it. This is not a great approach for them to take for a few reasons. Most obviously, because it just enables more data to be compromised if a breach was to occur.

Without the guidance of a code of ethics leading your business decisions, the likelihood of risking your clients’ data for the sake of advancement - be it more insight, improved automation and artificial intelligence, or another business goal - becomes much higher.

Enforcing Ethics
In order to create a workplace that is in alignment with your determined ethics, you need to make sure of two things. One, that you clearly establish and share them within your business so that your employees are on the same page as you are, and two, that you stand by these ethics.

To accomplish this, learning your company’s ethics should be a part of an employee’s onboarding process, with a written document leaving no questions as to what will and won’t be tolerated. Then, you need to make sure that you not only listen when ethical violations are reported, but also allow those reporting them to remain anonymous.

What would be the most important aspect of your policy for employees to follow? Share it in the comments!

Tip of the Week: Technology Has Your Business Cove...
The New Version of Chrome has Interesting Changes


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, November 14 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Managed Service Provider Business Computing Hackers Data Small Business Hardware Hosted Solutions Google Mobile Devices Productivity Mobile Office VoIP Email Gadgets Malware Quick Tips Network Network Security IT Support Efficiency Innovation Social Media Business Management IT Services Miscellaneous Business Continuity Smartphones Server Business Upgrade Virtualization Communication Windows Disaster Recovery Computer Communications Managed IT Services Microsoft Office Data Backup User Tips Users Browser Mobile Device Management Passwords Android Save Money WiFi Smartphone Marketing Data Recovery Holiday Ransomware Alert Outsourced IT Tech Term Mobile Computing Vendor Management Chrome Cybercrime Internet of Things Operating System Windows 10 Remote Monitoring BDR Computers Bring Your Own Device Cloud Computing Apple BYOD Information Technology Avoiding Downtime The Internet of Things History Telephone Systems Artificial Intelligence Best Practice Router Automation Going Green Firewall Big Data Remote Computing VPN IT Solutions Current Events Phone System Application Cybersecurity Wireless Technology Collaboration Hacking IT Consultant Printer Social Engineering Facebook Spam Employer-Employee Relationship Health Trending Managed IT Services Lithium-ion Battery Excel App Bandwidth Money Proactive IT Office Budget Maintenance Mouse Recovery Windows 8 Content Filtering How To Productivity Applications Networking Windows 10 Unified Threat Management Business Intelligence Business Managament Two-factor Authentication Mobility Fax Server iPhone Training Hard Drives Private Cloud Redundancy Data Security Sports Law Enforcement Value Office 365 Website User Error Apps Humor Gmail Phishing Outlook PowerPoint Antivirus Information Tutorials Virus Managed IT Analytics Data Protection Customer Relationship Management Connectivity Network Congestion Word Conferencing Inbound Marketing Tech Support Identity Theft Data Management Search Scam Save Time Tablet Twitter Administration Mobile Device Office Tips Document Management Encryption Digital Payment IT Management Social Networking Streaming Media Risk Management Computer Repair Servers Compliance Flexibility Entertainment Google Drive Saving Time Analysis Settings IT Support Administrator Retail Vulnerability Downtime Blockchain File Sharing Memory Best Available Safety Wi-Fi Work/Life Balance Data Breach Hacker HaaS End of Support YouTube Comparison Bluetooth Social Government People Virtual Assistant Meetings Windows 7 Workers Samsung Touchscreen Robot USB DDoS Solid State Drive Voice over Internet Protocol Data loss Telephone System Online Currency Point of Sale Black Market Credit Cards Recycling Education Access Control Spam Blocking Cleaning Password Statistics Smart Tech Wireless Physical Security Video Surveillance CES Fraud Public Cloud Machine Learning IT Plan Programming SaaS Skype Instant Messaging IBM Piracy Content Management Running Cable OneNote Leadership Data storage Augmented Reality Intranet Environment Unsupported Software Wearable Technology Webinar Human Resources Infrastructure Biometrics Internet Exlporer Data Storage Managed Service eWaste Computer Accessories Paperless Office Update IT service Keyboard PDF Audit Alerts Enterprise Content Management Printer Server Shortcut Software Tips Remote Work Display Wiring Password Manager Students Bing Worker Commute Debate Hosted Computing Proactive User Telephony Unified Communications Netflix Google Docs Staff Root Cause Analysis Managing Stress Domains Reputation Online Shopping Text Messaging Cache Project Management Bloatware Business Mangement Computer Fan Work Station Password Management Supercomputer Gaming Console Devices GDPR Science Internet exploMicrosoft Botnet Healthcare NarrowBand Data Warehousing Specifications Inventory Remote Monitoring and Maintenance Start Menu Theft Uninterrupted Power Supply Digital Signature IoT Customers Regulations Evernote Macro Wireless Internet Warranty Entrepreneur Travel Criminal FENG NIST HBO Knowledge Co-managed IT Thought Leadership E-Commerce Tablets Advertising Electronic Health Records Windows Media Player Virtual Desktop Chromecast Millennials IT Security Line of Business Hiring/Firing Distributed Denial of Service Files Mobile Cortana Patch Management Multi-Factor Security Strategy Print Server Screen Mirroring Wireless Charging 360 Emails Wire Microchip Cost Management nternet Crowdfunding Electronic Medical Records Cryptocurrency Frequently Asked Questions Remote Support Content Filter Camera Upgrades Analyitcs Notifications Customer Service Laptop Workforce Business Owner Webcam Authentication MSP Colocation Professional Services Google Apps Windows 10s Shadow IT Lifestyle Law Firm IT Charger Cast Insurance Consultant SharePoint Flash Fiber-Optic Company Culture Smart Office Software as a Service Hiring/Firing Safe Mode Tip of the week Amazon HIPAA Storage Hybrid Cloud PC Care HVAC Cameras Touchpad Telecommuting Nanotechnology Remote Worker IaaS Computing Infrastructure Tools LinkedIn Search Engine Legal Computer Care Scheduling Practices Licensing Relocation Sync Cables Net Neutrality Hosted Solution 3D Help Desk Accountants Business Technology WIndows 7 Monitor Windows Server 2008 Amazon Web Services Windows 8.1 Update eBay Addiction Virtual Private Network Virtual Reality Smart Technology Thank You Loyalty Books Experience Two Factor Authentication Congratulations Battery Content Video Games Emergency Worker Music Audiobook Scalability Assessment Rootkit Regulation Politics How to Television Transportation Techology Troubleshooting Webinar Utility Computing Printers Benefits Automobile Public Computer IT solutions Employer Employee Relationship CrashOverride

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *
      • Company Name
      • First Name *
      • Last Name *
      • Phone *
      • Phone Ext.
      • Comments:
      • Yes, subscribe me to: