window._mfq = window._mfq || []; (function() { var mf = document.createElement("script"); mf.type = "text/javascript"; mf.async = true; mf.src = "//cdn.mouseflow.com/projects/0148bb62-7ff8-46ae-a466-bf3fd13c7d09.js"; document.getElementsByTagName("head")[0].appendChild(mf); })();
407-478-6600    Get SUPPORT

TaylorWorks Blog

Why Your Business Needs to Define Its Ethical Code

Why Your Business Needs to Define Its Ethical Code

As the technology that businesses have available to them develops, so does the propensity for this technology to be used unethically. This has become especially apparent where data collection is concerned, and what that data is used for after it has been collected. How can you keep operations moving both productively, and ethically?

Collection Concerns
Data collection is one of the current big concerns in technology. With another newsworthy data breach practically every other day, companies that accumulate data for seemingly little reason effectively put their clients and customers at a greater risk of having this data stolen. Reflecting upon this, it is no wonder that 75 percent of consumers are concerned about brands keeping track of their browsing habits.

Facebook has been the focus of some negative attention in past months thanks to these concerns. In addition to the Cambridge Analytica situation, Facebook has adopted artificial intelligence technologies to analyze their users. This analysis is used to predict future behaviors, these insights being sold to advertisers. While this brings up many legitimate concerns about data privacy, it also introduces a different topic: the need for a code of ethics surrounding the use of collected data, as well as how much data is collected.

Why This Is a Real Issue
It should come as no surprise that businesses and individuals have different priorities, and that these different priorities shape their ethics in different ways. Likewise, the primary purpose of any business is to generate revenue through profit. Therefore, it only makes sense that a business as a unit would have the motivation to collect as much data as they can - after all, the more data available, the more insights that could be presumably be gleaned, and the more successful the business would be… in theory.

However, as mentioned above, many businesses seem to collect as much data as they can just so they can have it. This is not a great approach for them to take for a few reasons. Most obviously, because it just enables more data to be compromised if a breach was to occur.

Without the guidance of a code of ethics leading your business decisions, the likelihood of risking your clients’ data for the sake of advancement - be it more insight, improved automation and artificial intelligence, or another business goal - becomes much higher.

Enforcing Ethics
In order to create a workplace that is in alignment with your determined ethics, you need to make sure of two things. One, that you clearly establish and share them within your business so that your employees are on the same page as you are, and two, that you stand by these ethics.

To accomplish this, learning your company’s ethics should be a part of an employee’s onboarding process, with a written document leaving no questions as to what will and won’t be tolerated. Then, you need to make sure that you not only listen when ethical violations are reported, but also allow those reporting them to remain anonymous.

What would be the most important aspect of your policy for employees to follow? Share it in the comments!

Tip of the Week: Technology Has Your Business Cove...
The New Version of Chrome has Interesting Changes
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, January 16 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Network Security Cloud Best Practices Business Computing Managed IT Services Privacy Data Backup Hackers Hosted Solutions Malware Data Recovery VoIP Mobile Devices Email Data Google Outsourced IT Tech Term Innovation User Tips Internet Microsoft Internet of Things Backup Cloud Computing Business Continuity Hardware Communications IT Services Software Saving Money Business BDR Ransomware Efficiency Cybersecurity Communication Productivity Router Artificial Intelligence Small Business Managed IT Services Cybercrime Smartphone Smartphones IT Support Android Disaster Recovery IT Support Browser Windows 10 Applications Chrome Workplace Tips Network Computer Business Management Gadgets Phishing Law Enforcement Managed IT How To Two-factor Authentication BYOD Business Intelligence Holiday Data Security Avoiding Downtime Mobility Blockchain Access Control Mobile Device Collaboration Data Protection Office 365 Virtualization Windows Server Spam Money Save Money Word Computers Information Mobile Device Management Alert Automation Wi-Fi Servers Connectivity Managed Service Passwords Bandwidth Social Engineering Encryption Machine Learning Proactive IT Telephone Systems Apps Productivity IT Management Redundancy App Remote Monitoring Document Management Vulnerability Facebook Voice over Internet Protocol Analysis Settings Software as a Service Training Miscellaneous Compliance Upgrade Social Media Firewall Identity Theft Spam Blocking Update Credit Cards Botnet CES Sports File Sharing Value Operating System Fraud Data loss Content Management Business Owner Virtual Assistant Hacker Mobile Computing Education Bring Your Own Device Networking Budget Google Docs Unified Threat Management Microsoft Office Employer-Employee Relationship Keyboard Paperless Office Workers Google Drive Telephone System Smart Tech Big Data Flexibility IT Plan Website Solid State Drive Work/Life Balance Password Human Resources Information Technology Windows 7 OneNote Private Cloud Comparison Infrastructure Unsupported Software VPN Telephony Data Storage Data Breach Scam Display Password Manager Storage Network Congestion Software Tips Trending Black Market Content Filtering Accountants HVAC Samsung Cortana Skype Evernote Downtime Instant Messaging Remote Worker Digital Signature Electronic Health Records Charger Hacking Help Desk Cables Meetings HIPAA Managed Service Provider Excel Millennials Worker Commute Administrator Hosted Computing Computer Fan Entertainment Business Technology Security Cameras Business Mangement Electronic Medical Records IT Consultant End of Support Physical Security Lifestyle Battery Virtual Private Network Enterprise Content Management Augmented Reality Start Menu Legal Wireless Charging Data Warehousing WiFi USB Wiring Wireless Technology Flash Shortcuts Unified Communications Devices Health Office Tips Travel Remote Computing Proactive Smart Office PDF Tip of the week Workforce Microchip Inventory FENG Gmail Addiction Leadership Marketing Project Management IoT Password Management Windows 10s The Internet of Things Technology Tips Mobile eCommerce Theft Thought Leadership HaaS Recovery GDPR Strategy YouTube Netflix Amazon Data Management Screen Mirroring Remote Monitoring and Maintenance Windows Server 2008 Telecommuting Professional Services Recycling Cache HBO Warranty NIST SaaS Social Google Apps Streaming Media Current Events Users E-Commerce Cleaning Sync Amazon Web Services Cast Line of Business Students Hard Drives Remote Work Save Time Search Engine Authentication Tools Risk Management eWaste Wireless Internet webinar Outlook Patch Management Printer Insurance Cryptocurrency Audit Vendor Content Filter Knowledge Computing Infrastructure Multi-Factor Security Camera Computer Care Online Shopping Government MSP Staff Healthcare Emails Wireless Regulations Bing Fiber-Optic Nanotechnology Root Cause Analysis Criminal Wire Conferencing Public Cloud Frequently Asked Questions Specifications Virtual Reality Mouse Practices Safe Mode Windows 10 Internet Exlporer Printers Public Speaking Audiobook User Error Wearable Technology Webinar Presentation Video Games Lithium-ion battery Hybrid Cloud Transportation Television Twitter Books Tech Support How to IT solutions 5G Hiring/Firing Automobile Worker Safety Benefits Public Computer IBM Best Practice Employee/Employer Relationship Fun Internet exploMicrosoft Loyalty Quick Tips Troubleshooting Customer Relationship Management Files Scalability Rootkit Competition Smart Technology Utility Computing Smartwatch Employer Employee Relationship IP Address Advertising Emergency Office Colocation Shadow IT Hosted Solution Company Culture Customer Service History Experience Regulation Computer Accessories Mobile Office Search Relocation Two Factor Authentication Managing Stress Domains Content CrashOverride Techology Music Vendor Management Humor Politics Bluetooth Assessment

Mobile? Grab this Article!

QR-Code dieser Seite