XFER has been serving Michigan since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Why Your Business Needs to Define Its Ethical Code

Why Your Business Needs to Define Its Ethical Code

As the technology that businesses have available to them develops, so does the propensity for this technology to be used unethically. This has become especially apparent where data collection is concerned, and what that data is used for after it has been collected. How can you keep operations moving both productively, and ethically?

Collection Concerns
Data collection is one of the current big concerns in technology. With another newsworthy data breach practically every other day, companies that accumulate data for seemingly little reason effectively put their clients and customers at a greater risk of having this data stolen. Reflecting upon this, it is no wonder that 75 percent of consumers are concerned about brands keeping track of their browsing habits.

Facebook has been the focus of some negative attention in past months thanks to these concerns. In addition to the Cambridge Analytica situation, Facebook has adopted artificial intelligence technologies to analyze their users. This analysis is used to predict future behaviors, these insights being sold to advertisers. While this brings up many legitimate concerns about data privacy, it also introduces a different topic: the need for a code of ethics surrounding the use of collected data, as well as how much data is collected.

Why This Is a Real Issue
It should come as no surprise that businesses and individuals have different priorities, and that these different priorities shape their ethics in different ways. Likewise, the primary purpose of any business is to generate revenue through profit. Therefore, it only makes sense that a business as a unit would have the motivation to collect as much data as they can - after all, the more data available, the more insights that could be presumably be gleaned, and the more successful the business would be… in theory.

However, as mentioned above, many businesses seem to collect as much data as they can just so they can have it. This is not a great approach for them to take for a few reasons. Most obviously, because it just enables more data to be compromised if a breach was to occur.

Without the guidance of a code of ethics leading your business decisions, the likelihood of risking your clients’ data for the sake of advancement - be it more insight, improved automation and artificial intelligence, or another business goal - becomes much higher.

Enforcing Ethics
In order to create a workplace that is in alignment with your determined ethics, you need to make sure of two things. One, that you clearly establish and share them within your business so that your employees are on the same page as you are, and two, that you stand by these ethics.

To accomplish this, learning your company’s ethics should be a part of an employee’s onboarding process, with a written document leaving no questions as to what will and won’t be tolerated. Then, you need to make sure that you not only listen when ethical violations are reported, but also allow those reporting them to remain anonymous.

What would be the most important aspect of your policy for employees to follow? Share it in the comments!

Tip of the Week: Technology Has Your Business Cove...
The New Version of Chrome has Interesting Changes


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, January 17 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Technology Tip of the Week Privacy Microsoft Internet Cloud Best Practices Saving Money Backup Workplace Tips Software Business Computing Managed Service Provider Hosted Solutions Hackers Data Small Business Google Hardware Mobile Devices Productivity VoIP Mobile Office Malware Email Gadgets Quick Tips Network Security Efficiency Network Innovation IT Support IT Services Social Media Business Business Management Business Continuity Miscellaneous Smartphones Server Upgrade Communication Virtualization Windows Disaster Recovery User Tips Data Backup Communications Computer Managed IT Services Microsoft Office Smartphone Users Passwords Browser Mobile Device Management Data Recovery Android Holiday WiFi Marketing Save Money Ransomware Outsourced IT Alert Tech Term BDR Cybercrime Internet of Things Vendor Management Mobile Computing Chrome Remote Monitoring Cloud Computing Router Windows 10 Operating System Computers Automation Bring Your Own Device Apple BYOD Information Technology Artificial Intelligence Avoiding Downtime Current Events Cybersecurity Telephone Systems Best Practice History Spam Big Data Remote Computing Going Green Firewall IT Solutions The Internet of Things Managed IT Services VPN Health Collaboration Hacking Phone System Wireless Technology Social Engineering IT Consultant Employer-Employee Relationship Printer Facebook Trending Application Money Bandwidth Proactive IT Lithium-ion Battery Productivity Excel App Windows 10 Office Budget Mobility Fax Server iPhone How To Maintenance Mouse Windows 8 Content Filtering Business Intelligence Networking Office 365 Phishing Applications Mobile Device IT Support Two-factor Authentication Unified Threat Management Business Managament Recovery Value Sports Customer Relationship Management Training Hard Drives Private Cloud Data Protection Website Redundancy Blockchain Law Enforcement Antivirus Word Encryption Gmail Analytics Data Security User Error Apps Settings Humor Access Control Outlook PowerPoint Google Drive Tutorials Virus Managed IT Information Tablet Analysis Search Twitter Wi-Fi Managed Service Save Time Document Management Software as a Service Inbound Marketing Streaming Media Risk Management Social Data Management Office Tips Connectivity Tech Support Compliance Scam Administration Saving Time Flexibility Entertainment Digital Payment Identity Theft Social Networking Computer Repair Downtime Retail Voice over Internet Protocol File Sharing Memory Vulnerability Human Resources Conferencing IT Management Machine Learning Servers Network Congestion Hacker Administrator Computer Accessories Workers IT Plan PDF Online Currency HaaS End of Support Help Desk Safety Paperless Office Government Robot Point of Sale YouTube USB Recycling Content Management Unsupported Software Education Data loss Infrastructure Meetings Statistics DDoS Spam Blocking Update Touchscreen Skype Virtual Assistant Solid State Drive Programming Comparison Telephony Black Market Google Docs Running Cable Windows 7 Augmented Reality Intranet Instant Messaging Telephone System Cleaning Password Wearable Technology Botnet Wireless Physical Security Video Surveillance Public Cloud OneNote Environment SaaS Biometrics Best Available Credit Cards Smart Tech Display Data Storage Piracy Keyboard IT service IBM Bluetooth Data storage Data Breach Leadership People Work/Life Balance eWaste Samsung Fraud Internet Exlporer Webinar CES 3D Workforce Safe Mode Managing Stress Domains Scheduling Root Cause Analysis Professional Services Google Apps Storage Monitor Bloatware Supercomputer Lifestyle HVAC Security Cameras Computer Fan Flash Fiber-Optic Nanotechnology Remote Worker Science eBay Search Engine Alerts Tip of the week Amazon Practices Entrepreneur Telecommuting Accountants Business Technology IT Security Tools Addiction Virtual Private Network Reputation Knowledge Enterprise Content Management Internet exploMicrosoft Print Server FENG Sync Cables Wiring Tablets Text Messaging Students Bing Windows Media Player Virtual Desktop Work Station nternet Patch Management Crowdfunding Windows Server 2008 Amazon Web Services Hosted Computing Proactive NarrowBand Hiring/Firing Gaming Console Remote Support Cost Management 360 Emails Software Tips Remote Work Uninterrupted Power Supply Screen Mirroring Password Manager Cache Project Management Customers Company Culture Password Management Advertising Law Firm IT Electronic Medical Records Unified Communications Devices GDPR Upgrades Analyitcs Macro Staff Healthcare Shortcuts Distributed Denial of Service Files Customer Service Windows 10s Online Shopping Inventory Remote Monitoring and Maintenance Chromecast Co-managed IT Business Owner LinkedIn IoT Consultant Charger Cast Business Mangement Wireless Internet Warranty HIPAA Net Neutrality Data Warehousing Specifications NIST Notifications Hiring/Firing Start Menu Theft Thought Leadership E-Commerce Digital Signature Electronic Health Records eCommerce Colocation Cameras Regulations Evernote Line of Business Laptop Windows 8.1 Update Hosted Solution HBO Shadow IT Licensing Webcam Computer Care Travel Criminal Wire Microchip SharePoint Millennials Cryptocurrency Hybrid Cloud WIndows 7 Debate Mobile Cortana Content Filter Camera Virtual Reality Multi-Factor Security Strategy Vendor IaaS Computing Infrastructure Printer Server Shortcut Audit Wireless Charging Authentication MSP Touchpad Relocation Worker Commute PC Care Netflix Frequently Asked Questions Insurance Legal User Smart Office Experience Printers Content Two Factor Authentication Thank You Emergency Music Worker Audiobook Employee/Employer Relationship Battery Congratulations Video Games Assessment Rootkit Politics Smartwatch Transportation Scalability Television Troubleshooting Webinar Benefits How to Automobile Public Computer IT solutions Regulation Techology Employer Employee Relationship CrashOverride Smart Technology Utility Computing Books Loyalty

Sign up for our Newsletter!

  • Company Name *
  • First Name *
  • Last Name *