Professional Documents
Culture Documents
Technology is a body of knowledge devoted to creating tools, processing actions and extracting
of materials. The term Technology is wide and everyone has their own way of understanding
the meaning of technology. We use technology to accomplish various tasks in our daily lives, in
brief; we can describe technology as products, processes or organizations. We use technology to
extend our abilities, and that makes people as the most important part of any technological
system.
Technology is also an application of
science to solve a problem. But what you
have to know is that technology and
science are different subjects which work
hand-in-hand to accomplish a specific task
or solve a particular problem.
We apply technology in almost everything
we do in our lives, we use technology at
work, we use it to , extract materials , we
use technology for communication,
transportation, learning, manufacturing,
creating artifacts, securing data, scaling
businesses and so much more. Technology
is human knowledge which involves tools, materials and systems. The application of technology
results in artifacts or products. If technology is well applied, it can benefit humans, but if it is
wrongly applied, it can cause harm to human beings.
Many businesses are using technology to stay competitive, they create new products and services
using technology, and they also use technology to deliver those products and services to their
customers on time. A good example is, mobile phones companies like Apple & Samsung, these
two electronics companies, use high end technology to create new smart phones and other
electronic devices to stay competitive. This competitive edge is gained through employing
advanced technology.
Lets take a simple example on how people use technology on a daily basis,
See figure (1) below:
ADVANCING TECHNOLOGY:
Technology is dynamic; it keeps on improving because even our needs and demands for
technology keep on changing. We have moved from the industrial age (industrial revolution) to
an information age. During the industrial age, companies with large sums of capital had the
potential of employing expensive technological tools to gain competitive advantage; small
businesses had less potential because they could not afford expensive manufacturing or
processing technological tools. But, the advancement in technology has created a new economic
environment which depends on information and that is what I call INFORMATION AGE, the
information age provides a different work environment and this has helped small businesses gain
position in highly competitive markets.
Lets take a simple example and see how technology has advanced;
See figure (2) below;
the
or
is
so
The ethical questions that are exacerbated by the ways in which technology extends or
curtails the power of individualshow standard ethical questions are changed by the new
powers.
In the former case, ethics of such things as computer security and computer viruses asks whether
the very act of innovation is an ethically right or wrong act. Similarly, does a scientist have an
ethical obligation to produce or fail to produce a nuclear weapon? What are the ethical questions
surrounding the production of technologies that waste or conserve energy and resources? What
are the ethical questions surrounding the production of new manufacturing processes that might
inhibit employment, or might inflict suffering in the third world?
In the latter case, the ethics of technology quickly break down into the ethics of various human
endeavors as they are altered by new technologies. For example, bioethics is now largely
consumed with questions that have been exacerbated by the new life-preserving technologies,
new cloning technologies, and new technologies for implantation. In law, the right of privacy is
being continually attenuated by the emergence of new forms of surveillance and anonymity. The
old ethical questions of privacy and free speech are given new shape and urgency in
an Internet age. Such tracing devices as RFID, biometric analysis and identification, genetic
screening, all take old ethical questions and amplify their significance.
Business Technology:
This is the type of technology
which is made up of various hardware tools and software applications used to run a business
and enhance various business operations. Many businesses are using technology to scale and
grow big. Small businesses have used technology to create new ways of competing with well
established companies. To some extent, some business technologies can make a small
company look like a big company and this can help a small business gain position in a
competitive market.
Example of business technology:
3D Printer Created by formlabs
This is an affordable 3D printer which can help designers create advanced 3D objects. Its size
and design is good, so it can fit well on your office desk. With this 3D printer, you can create as
many 3D models as you want. Use its software to generate thin, breakable support structures.
Learn more about this FORM1 3D printer here:
As humans, we use both technology and science together, that is why we confuse these two to be
the same. Science is knowledge of the natural world while technology is human-made world
determined by processing, development and management.
For
you to understand the difference between science and technology, see example in figure
Look closely at image (a), it shows you a volcanic mountain erupting, this is a natural state of
our world, and it is only science which explains how this volcanic activity happens basing on
extensive research and data gathered by scientist. In image (b) , we see a scientist using a
microscope to make research and gather data. A microscope is human-made technology designed
to help scientists make research. So that means that both concepts work hand in hand, but they
are completely different. Humans have developed various technological tools to help us solve
problems during our daily lives, but also this technology can affect the natural setup of our
environment if applied wrongly.
humans, so we can use it to accomplish almost every task; it makes the impossible look
possible. However, for you to understand the advantage and disadvantage of technology today,
we can use an example in figure (4) below:
Figure (4)
As you can see in the photo above, if technology is well implemented it can be of great use to
humanity, but it can also cause harm. Below I have detailed points on the advantage and
disadvantage of technology inbusiness, classroom or education.
Advantages of Technology in Business:
Increases production: Technology helps businesses automate most tasks and this process
results into increased production and efficiency. Business can automate tasks in the accounting
department by using accounting software likeQUICKBOOKS . Bakeries can automate the
temperature room by using temperature sensors to detect a drop or an increase in temperature.
Saves time: Since most of the activities in the business are automated, time is saved
during the process. Computers can be used to perform various business tasks, for example a
computer can be used to record data, it can be used in video conferencing, and much more.
Technology accelerates innovation: The only way small businesses can succeed in todays
competitive world is by using technology to create new products or services. Small businesses
can use internet technology to collect information about targeted consumers, so that they
understand their needs and wants, this information can be used when tailoring new products or
services.
It improves sharing of information: Many businesses use internal networks to facilitate
the flow of information with in the organization. This internal network can help in the transfer
of information among different departments at work. Also employees can share different
technologies like printers, fax machines and internet via an internal network. This easy flow
of information also improves on the speed at which decisions are made in a business.
It improves on data storage: It is very important to keep business data secure, because a
disaster can strike your business and you lose all important information. The use of databases
and remote storage facilities helps in keeping business information and data secure and
accessible from anywhere.
Technology simplifies business communication: Every business survives on
communication; you need to communicate with yourSUPPLIERS , business partners and
employees, so technology will make this all process simple. Many businesses use
communication technologies like mobile phones, video conferencing applications
like SKYPE, text messaging services and electronic mail to exchange important business
information.
Its expensive: Technology comes at a price, not every small business can manage to use
technology. After buying and integrating technology in business, you will have to pay another
cost of maintaining that technology, monthly maintenance is recommended and this can be
expensive.
Not Safe: Technology is not safe; it is very easy to lose business data through internet
technology. Hackers can easily access your remote database and use your business data for
their own personal needs.
Information technology ethics raises new and unique moral problems because information
technology itself has brought about dramatic social, political, and conceptual change. Because
information technology affects not only how we do things but how we think about them, it
challenges some of the basic organizing concepts of moral and political philosophy such as
property, privacy, the distribution of power, basic liberties and moral responsibility.
Specific questions include the following. What are the moral responsibilities of computer
professionals? Who is to blame when computer software failure causes harm? Is computer
hacking immoral? Is it immoral to make unauthorized copies of software? Questions related to
public policy include: what constitutes just policy with respect to freedom of speech, association,
and the exercise of other civil liberties over computer networks? What determines the extent and
limits of property rights over computer software and electronic information? What policies
adequately protect a right to privacy?
The list of questions shifts in response to developments in information technology. One
noteworthy example is the rise in prominence of questions about communication and information
in response to the explosive growth of high-speed digital networks. This shift has subsumed the
field commonly called computer ethics under the broader rubric of information technology
ethics.
Security: With tools like the internet, hackers have found it very easy to hack into any
computer or system as long as it is connected on internet. Hackers can easily use an IP
(Internet Protocol) address to access a users computer and collect data for selfish reasons.
Also the wide spread of internet cookies which collect information whenever we use the
internet , has exposed IT users to high risks of fraud and conflicting interests. Many big
companies use these cookies to determine which products or service they can advertise to us.
When it comes to online banking, the transfer of money can easily be interrupted by a hacker
and all the money will be transferred to their desired accounts , which affects both the bank
and the customers who is using online banking technology.
Copyright
Infringement: Information
technology has made it easy
for users to access any
information or artifact at any
given time. With the
increased development of
music sharing networks and
photo bookmarking sites, many original creators of these works are losing the credibility of
their works, because users of IT can easily gain access and share that data with friends. Free
music and file downloading sites are popping up on internet every day , lots of original work
like music albums, books , are being downloaded for free. In this case one legitimate user
will purchase the book , software, web template or music album, and they will submit it to a
free download site where others will simply just download that data for free. It is good news
for the users because it saves them money, but it harms the original creator of these works.
The government has closed some of these sites likeMEGAUPLOAD.COM , but many are
popping up using funny URLs.
Increased pressure on IT experts. Since information technology systems have to run all
the time, pressure is mounted on IT experts to ensure the accuracy and availability of these
systems. Many big organizations which need to operate 24 hours will require a standby IT
team to cater for any issues which might arise during the course of operation. This pressure
results into stress and work overload which sometimes results into Imperfection.
Digital divide: Information technology has many opportunities and it has shaped many
industries in developed countries; however, developing countries have difficulties of enjoying
the same benefits of Information technology. To get these benefits they have to train their
labor and users should also adopt the new culture which is a bit costly in these developing
countries. In some remote areas they do not even have power, so information technology
tools like computers cannot be used. In other sectors like education, most of these developing
countries have poor old education systems, so a student will not be aware of new information
technologies.
Ethical Issues in Information Technology There are a great variety of ethical issues in I.T.: 1
Ethical dilemma there are various ethical dilemmas in relation to I.T. that need to be addressed.
What are and are not ethical issues in I.T.? In regard to hackers, for example, are they testing the
system or performing an immoral action? Will genetic engineering improve the quality of
peoples lives or start to destroy it? How do we recognize when an ethical dilemma exists? There
are, indeed, many grey ethical areas. 2 Plagiarism is where the work of others is copied, but the
author presents it as his or her own work. This is a highly unethical practice, but happens quite
frequently, and with all the information that is now available on the Internet it is much easier to
do and is happening more often. 3 Piracy, the illegal copying of software, is a very serious
problem, and it is estimated that approximately 50% of all programs on PCs are pirated copies.
Programmers spend hours and hours designing programs, using elaborate code, and surely need
to be protected. Although some might argue that some pirating at least should be permitted as it
can help to lead to a more computer literate population. But, for corporations, in particular, this is
a very serious issue, and can significantly damage profit margins. 4 Hacking Hackers break into,
or hack into a system. Hacking can be undertaken for a variety of reasons, such as the wish to
damage a system or the wish to understand how a system works, so that money can be made out
of it. Alternatively, there might be a desire to alert people to the fact that a system is insecure and
needs improving. Due to this some argue that there are hacker ethics. Hacking can present a
moral dilemma. This is because reformed hackers sometimes offer their expertise to help
organizations protect themselves against other hackers. Hackers cannot just wander into a
system, as they could into an unlocked door. Instead, it requires a lot of skill. With this skill
hackers can demonstrate that a system is insecure and needs improving. In this way, it could be
argued that hackers play a valuable role. Many argue that hacking might lead to some
improvements, but that it causes such a lot of disruption that it is not worth it in the long-run.
5 Computer crime many different computer crimes are committed, which clearly poses ethical
questions for society. Various illegal acts are performed on computers, such as fraud and
embezzlement. This includes, for example, using imaging and desktop publishing to create, copy
or alter official documents and graphic images. There are also various ethical dilemmas, such as
whether copying such files is as bad as stealing something. 6 Viruses Clearly writing and
spreading virus programs are unethical acts; they have very serious consequences, and cause
systems to crash and organisations to cease operating for certain periods. One of the most
concerning consequences of such actions is when viruses interrupt the smooth functioning of an
organisation such as a hospital, which could in extreme cases even cause people to die. Logic
bombs are also sometimes planted. There is obviously a lot of anti-virus software on the market
now though that helps to deal with this ever-growing problem. 7 Ergonomics/health issues There
are many ergonomic/health issues related to I.T. Responsible/ethically-minded employers will,
hopefully, give due consideration to this, as indeed should all employers. This includes issues
such as the importance of taking adequate breaks from using the computer and ensuring that the
screens comply with the regulations. Also, ensuring that the positioning of the chair and the
computer is appropriate for the user and providing foot rests, when required. Some organisations
will give special advice to their employees on these matters. When I worked at Clifford Chance,
an international law company, for example, they had specialised staff who would come round to
each employee individually, and discuss their ergonomic needs, if the employee requested this.
Having enough light and having plants in the room can also be important factors. Without such
ethical/moral awareness and taking the necessary action, many workers will suffer health
problems directly from I.T., such as back problems, eyestrain and eye infections and repetitive
strain injury (RSI). 8 Job displacement/work pressures imposed on computer professionals
Computers are changing the face of the work scene. For some people, their jobs are becoming
redundant or they have to play quite different roles, and others are suffering increasing levels of
stress from work pressures. Others are, obviously, reaping the benefits of having more rewarding
jobs, and there is certainly more emphasis on knowledge, information and I.T. skills than ever
before. However, this all clearly poses various ethical issues. Should those that lose their jobs be
compensated? How can the pressure be eased on those that are suffering stress? Is it acceptable
for computer programmers to be made redundant on the spot etc? There are many ethical issues
that need to be addressed here. 9 Digital divide The digital divide poses a serious problem today.
A new breed of haves and have nots are being created, between those that have access and can
use a computer and the Internet, and those that do not have such access. There are clearly serious
ethical implications here. Those that do not have such access may well be discriminated against,
feel socially excluded and miss out on many life opportunities. 10 Gender There are also ethical
issues in regard to gender and computers, given the fact that females are often discriminated
against in various ways in this new I.T. age. The number of females in computing academia is
low. Furthermore, when females do work closely with computers, it is often in the lower level of
work. Also, computer screens and layouts are frequently designed and programmed by men, and
they might not be ideally suited to women, which could affect the quality of the work that
women produce. Men tend to obtain the better quality I.T. jobs, earn more money, and make far
more of the important decisions in relation to I.T. Basically, men are driving the I.T. age forward,
whereas females are playing more passive roles, confined to working with the systems that men
have already created, but which might not be ideally suited to them. These are all ethical issues
that people should be made more aware of, and efforts need to be made to try to remedy the
situation. 11 Nanotechnology presents a new set of ethical dilemmas. Nanotechnology could help
humankind and help to provide adequate food and shelter. On the other hand, it could be very
dangerous. There are also various environmental issues to consider, such as the effect that
nonmaterials have on living systems. There is a relatively low investment in environmental
nanotechnology, which must surely give us cause for concern. These are all very serious ethical
issues that need to be confronted sooner rather than later. If it appears to be the case that
advanced aspects of I.T. are seriously threatening our way of life, then something surely needs to
be done about it as soon as possible. 12 Expert systems Expert systems are a body of information
in a specific field that is held in an electronic format, such as a doctor expert system, that
houses detailed medical information on a database. Various questions can be posed in regard to
expert systems, such as what is the basis of ownership? Is it the different elements that comprise
the total system or the total package? These issues are related to intellectual property rights and
the moral aspects in regard to this. There are also wider ethical issues in regard to expert systems
that need to be explored. In regard to a 'doctor expert system, for example, such a system can
provide accurate information, but the face-to-face contact is missing. Such face-to-face contact
might prove to be essential in order to ensure that the right diagnosis is made, and it is possible
that some individuals could even die as a result of a wrong diagnosis given through this lack of
face-to-face contact. In other ways expert systems could help to save lives. The patient might, for
example, be given a speedier response. All these ethical issues need to be considered further. 13
Genetic engineering and the patenting of life- forms Many ethical issues are raised in regard to
genetic engineering and the patenting of life forms. Is such behaviour morally acceptable? Such
debates can sit alongside debates on subjects such as euthanasia and abortion. 14 Netiquette
There are also ethical/moral codes that should be adhered to, in the use of networks and email
correspondence. As already indicated, the setting up of such codes has become necessary as
people have not always addressed each other in an appropriate manner through this means of
communication, and in this way they have behaved unethically. For example, not wasting
peoples time and not taking up network storage with large files. Furthermore, not looking at
other peoples files or using other systems without permission and not using capital letters, as
this denotes shouting (unless one does actually want to shout at someone through email!). Also,
people that become too obnoxious can be banned or ignored. A kill file can be set-up, which
will automatically, erases messages from that person. 15 Intellectual property rights: the moral
rights There are moral rights embedded within much intellectual property rights legislation,
agreements and directives, for the benefit of creators of works and copyright holders.
Furthermore, there are penalties for those that violate such legislation, (such as violating
copyright legislation), although this can sometimes be difficult to enforce in practice. The
legislation, though, is often complex and difficult to understand, which means that some creators
of works do not obtain the moral rights that they are entitled to. However, sometimes, moral
rights are actually excluded from agreements. 16 Issues of data collection, storage and access
there are many moral issues that need to be considered in regard to the collect.
Security
Companies monitor employees and visitors and collect much additional information in the name
of security. Ethical issues arise from the continuous monitoring of employee activity and the
recording of security camera images. An unjustified level of employee surveillance is ethically
questionable; the ethical company must try to establish a level of monitoring it can justify. The
Communication
Where it used to be difficult to monitor telephone conversations due to the nature of the analog
signal, companies and governments can easily monitor digital, text-based communication, such
as email. Computers can scan the text of millions of messages for words that are of interest to
investigators and identify the sender. Companies that employ such technologies must ask
themselves about the ethical implications of such surveillance, especially if it is carried out
without the knowledge or explicit agreement of employees.
Content
With new technologies allowing the easy creation and distribution of images and videos, both
individual employees and companies need guidelines as to what is acceptable. Without such
guidelines, some of this content will be offensive to some of the company staff and to some
members of the public. When developing such guidelines, companies may be quite restrictive in
terms of what is permissible within the business. Such restrictions only become ethical issues
when the company tries to extend them into the employees' private lives. The interaction of such
restrictions with legal limits on hate speech and pornography, as well as with community
standards, make this a particularly delicate area for business ethics.
Privacy
Individual privacy is one area that has been identified clearly as a base for unethical business
behavior through the application of technologies. Companies can track Internet usage, buying
habits and individual movement as well as collect personal information about millions of
customers or even potential clients. While governments have passed legislation restricting the
collection of personal data and allowing individuals some control over what companies can
collect and store, ethical businesses must decide -- independently of legislation -- what is
appropriate behavior.
Privacy may be lessened by surveillance in this case through CCTV.
Privacy is the ability of an individual or group to seclude themselves, or information about
themselves, and thereby express them selectively. The boundaries and content of what is
considered private differ among cultures and individuals, but share common themes. When
something is private to a person, it usually means that something is inherently special or sensitive
to them. The domain of privacy partially overlaps security (confidentiality), which can include
Privacy Issues: As much as information technology has enabled us to share and find relevant
information online, It has also exploited our freedom of privacy. Their so many ways our
privacy is exploited, (1) use of internet webcams, experienced computer users can turn on any
webcam of any computer online and they will have access to your private life, many
celebrities have been victims of these online stalkers. A good example is Dharun Ravia
former Rutgers University student who was spying on his roommate through a webcam. Read
more on this story here . (2) use of social networks, the main concept of these networks
is to connect with new and old friends then share your life with them, however, the loop hole
in this , is that when ever someone access your shared life data like photos , they can like it
and send it their friends who are not your friends, which might expose you to users with
wrong intentions to use your data, also some companies are known for spying on their
employees via these social networks.
Privacy in Computing
The conflict between personal privacy and company surveillance of e-mail communications and
other computer activity was one of the most widely publicized computer-ethical controversies in
the late 1990s and early 2000s. More on privacy Computer Ethics, Laws, Privacy Issues
4. Browser History: The history in your browser is a useful feature. But it also
tells a lot about you and your browsing habits.
5. Typed URL history: This features is used by most of the modern browsers to
auto-complete or guess the web site or page when you type the URL of a
previously visited site. It add to the user convenience and make your web surfing
a lot quicker. But it is privacy concern for your computer and a quick look at your
Types URL History can tell a lot about your browsing habits.
6. Saved Passwords and AutoComplete Information: This is crucial. Most
modern browsers allow you to save your passwords and private information
through their AutoComplete feature. It saves a lot of time whenever you visit the
website next time. As you do not have to remember your password and other
information every time as it gets filled in the appropriate boxes automatically.
7. Recent Documents: Recent Documents feature of Windows gives you a quick
access to the most recent documents you have used. It is nice features, but allows
an unauthorized person also to quickly know, what you are upto.
8. Usage history of Start/Run, Search: These things contain vital traces about
how you use your computer and what are the things you usually do on your
computer. These important bits pf private information is stored on your computer
and you can tweak the windows registry keys to wipe them out.
9. Temporary Directories and Temporary Files: Windows temporary directory
(Temp folders) stores Windows and other programs temporary files. This
directory can contain files from programs you no longer have installed or files
which may violate your privacy. If you know where these files are located in your
computer, you can manually delete them through Windows Explorer. Otherwise
there are lots of free tools available on Internet, which can do the job for you.
Ethics in the workplace is a combination of morality and rules. Ethics involve trust
between employees and the employer, and between employees. While technology
(specifically computers and Internet access) can be a huge boon to any business, it
can also be a major source of ethics abuse, or the temptation for abuse.
Spyware
A question of computer ethics and privacy falls onto management in the
workplace. Spyware such as key loggers or other programs that watch what a user is
doing on a given computer are common at work. However, does the management
have the right to eavesdrop on employees? It creates a breach of trust that employees
aren't doing their job without an electronic babysitter, but at the same time, it provides
proof that no one is misusing computers while on the job.
Email privacy
Email privacy is the broad topic dealing with
issues of unauthorized access and inspection
of electronic mail. This unauthorized access
can happen while an email is in transit, as well
as when it is stored on email servers or on a
user computer. In countries with a
constitutional guarantee of the secrecy of
correspondence, whether email can be equated
with letters and get legal protection from all
forms of eavesdropping comes under question
because of the very nature of email. This is
especially important as more and more communication occurs via email compared to postal mail.
Email has to go through potentially untrusted intermediate computers (email servers, ISPs)
before reaching its destination, and there is no way to tell if it was accessed by an unauthorized
entity. This is different from a letter sealed in an envelope, where by close inspection of the
envelope, it might be possible to tell if someone opened it. In that sense, an email is much like a
postcard whose contents are visible to everyone who handles it.
There are certain technological workarounds that make unauthorized access to email hard, if not
impossible. However, since email messages frequently cross nation boundaries, and different
countries have different rules and regulations governing who can access an email, email privacy
is a complicated issue.
Facebook
Face book is a corporation and an online service headquartered in Menlo Park, California, in
the United States. Its website was launched on February 4, 2004 by Mark Zuckerberg with
his College roommates and fellow students Eduardo Saver in, Andrew McCollum, Dustin
Moskovitz, and Chris Hughes. The founders had initially limited the website's membership to
Harvard students, but later expanded it to colleges in the Boston area, the Ivy League,
and Stanford University. It gradually added support for students at various other universities and
later to high school students. Since 2006, anyone in general aged 13 and older has been allowed
to become a registered user of the website, though variations exist in the minimum age
requirement, depending on applicable local laws. Its name comes from the face book directories
often given to American university students.
After registering to use the site, users can create a user profile, add other users as "friends",
exchange messages, post status updates and photos, share videos, use various apps, and receive
notifications when others update their profiles. Additionally, users may join common-interest
user groups organized by workplace, school, or other characteristics, and categorize their friends
into lists such as "People from Work" or "Close Friends". Also, users can complain or block
unpleasant people. Facebook had over 1.59 billion monthly active users as of August 2015.
Because of the large volume of data that users submit to the service, Facebook has come under
scrutiny for their privacy policies. Facebook, Inc. held its initial public offering in February 2012
and began selling stock to the public three months later, reaching an original peak market
capitalization of $104 billion. On July 13, 2015, Facebook became the fastest company in
the Standard & Poor's 500 Index to reach a market cap of $250 billion following its Q3 earnings
call in 2015, Facebooks market cap exceeded $300 billion.
People Share their Data on their profiles and inbox, Due to Harmful acts Accounts are Hacked
and misused.Personal information are stolen.
Workplace privacy
A workplace code of ethics is the result of a company analysis where practices are analyzed in
light of right behavior and wrong behavior. The code of ethics defines right behavior and
encourages, or requires, employees to engage in that behavior.
Employees typically must relinquish some of their privacy while at the workplace, but how much
they must do so can be a contentious issue. The debate rages on as to whether it is moral, ethical
and legal for employers to monitor the actions of their employees. Employers believe that
monitoring is necessary both to discourage illicit activity and to limit liability. Although, with
this problem of monitoring of employees, many are experiencing a negative effect on emotional
and physical stress including fatigue and lack of motivation within the workplace. Employers
might choose to monitor employees activities using surveillance cameras, or may wish to record
employees activities while using company owned computers or telephones. Courts are finding
that disputes between workplace privacy and freedom are being complicated with the
advancement of technology as traditional rules that govern areas of privacy law are debatable
and becoming less important. Purpose. Ideally, a code of workplace ethics would be
implemented for the primary purpose of encouraging ethical behavior. However, avoiding
lawsuits can also be a driving force behind a code of ethics. A workplace code of ethics
delineates behavior that is ethically unacceptable, and many of those unacceptable behaviors are
also violations of law.
it is essential to communicate
ethical values to employees as you
are giving them the authority to
take appropriate ethical decision
in any given situations.
How do you train your employees
to be ethical to one and all, whether
in the professional area or personal?
Define ethics to be
maintained in an
organization.
Ethics in the workplace is a combination of morality and rules. Ethics involve trust between
employees and the employer, and between employees. While technology (specifically computers
and Internet access) can be a huge boon to any business, it can also be a major source of ethics
abuse, or the temptation for abuse.
Appropriate Use: The rules of the workplace generally state computers are to be used for work
only. While you may have access to the Internet (perhaps because your office's file search
function is hosted on an Internet server), that means you shouldn't use your computer for nonwork related functions such as surfing, keeping a private diary.
Personal Time An ethical question is whether or not you can use company equipment on
personal time. For instance, if you're on your lunch break, should you be able to check your
personal email account? Your workplace will often have a policy on that. However, if you're not
sure, it might be best to talk to your supervisor and put the question forward.
THIN CONSENT
If an employee receives formal notification that the company will be monitoring all e-mail and
Web activityeither at the time of hire or during employmentand it is made clear in that
notification that his or her continued employment with the company will be dependent on the
employees agreement to abide by that monitoring, then the employee may be said to have given
thin consent.
In other words, there are two options: agree to the monitoring or pursue other employment
opportunities.
You could argue that the employee has at least been notified of the policy, but the notification is
based on the assumption that jobs are hard to come by and the employee is not in a position to
quit on principle and risk temporary unemployment while seeking a position with another
company.
THICK CONSENT
If employment conditions are at the other end of the scalethat is, jobs are plentiful and the
employee would have no difficulty in finding another positionthen consent to the monitoring
policy could be classified as thick since the employee has a realistic alternative if he or she finds
the policy to be unacceptable.