YOU’RE IN BUSINESS YOUR PEOPLE ETHICS IN BUSINESS.

Slides:



Advertisements
Similar presentations
Northside I.S.D. Acceptable Use Policy
Advertisements

Manager ethics Sample of Code of Ethical Business Conduct Slovak University of Technology Faculty of Material Science and Technology in Trnava.
Integrity and impartiality
HIPAA Basic Training for Privacy & Information Security Vanderbilt University Medical Center VUMC HIPAA Website:
The Health Insurance Portability and Accountability Act of 1996– charged the Department of Health and Human Services (DHHS) with creating health information.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
Core principles in the ASX CGC document. Which one do you think is the most important and least important? Presented by Casey Chan Ethics Governance &
Sizewise Code of Ethics, Conflict of Interest and Disclosure HR-CECID.
4. Intellectual Property and Ethics on the Web 59.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Policy 6460 Staff Use of Computerized Information Resources Regulation 6460 R-Staff Use of Computerized Information Resources Regulation 6460 R.2 Staff.
CODE OF ETHICS South Australian Public Sector Public Sector Act, 2009.
The AMA Code of Ethics Could Egyptian Marketing Professionals Agree on a List of Rules, Perhaps Similar to This? The IMI Journal. Members of the AMA are.
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Copyright 2014 TOP TEN LEGAL ISSUES WITH. NUMBER 10: Are we friends?
Chapter 29 Ethics in Accounting
Riverside Community School District
Understanding Business Ethics
Business Plug-In B7 Ethics.
ICAICT202A - Work and communicate effectively in an IT environment
Chapter 14: Ethics, Justice and Fair Treatment at Work
INTERNET and CODE OF CONDUCT
Year 11 R and S Ethics Great Ethical Thinkers. Codes of Ethics in Society.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
Data Protection for Church of Scotland Congregations
24 Legal and Ethical Considerations. 24 Legal and Ethical Considerations.
CPS Acceptable Use Policy Day 2 – Technology Session.
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Moffatt Thomas Practical Suggestions for Electronic Device and Internet Use in the Workplace C. Clayton Gill December 18, 2012.
Corporate governance: Asia Pacific. JAPAN  The Japan corporate governance committee published its revised code in The Code had six chapters, which.
Ethics and professional Conducts for Civil engineers
HIPAA PRIVACY AND SECURITY AWARENESS.
An Educational Computer Based Training Program CBTCBT.
Electronic Use Policies.   Social Media  Internet.
Home. Copyright © by The McGraw-Hill Companies, Inc. All rights reserved.Glencoe Accounting The accounting profession requires its members to follow a.
1 Welcome to the International Right of Way Association’s Course 104 Standards of Practice for the Right of Way Professional 104-PT – Revision 3 – INT.
A cceptable U se P olicy A student’s guide to using technological tools safely and responsibly. Please see BOE Policy #7314 and Regulation #7314R * This.
Next ETCH Confidentiality and HIPAA Annual Review What you need to know. The Privacy Rule 1.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
Coding Compliance Plan July 12, Benefits of a compliance program  To demonstrate our commitment to honest and responsible conduct, decrease the.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
Computers Are Your Future Tenth Edition Spotlight 1: Ethics Copyright © 2009 Pearson Education, Inc. Publishing as Prentice Hall1.
Characteristics and role of the professional nurse in upholding ethical nursing practice By Dr. Hanan Said Ali.
Digital Citizenship Created By: Kelli Stinson June 2011.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
CODE OF CONDUCT TRAINING. We conduct our global business honestly, ethically and legally, believing that good ethics is good business. The Company’s Philosophy.
ETHICS, POLICY & SECURITY ISSUES
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
Standards of Conduct  Training today will give you talking points  You need to read through the book and get comfortable with the information  This.
Ethical Decision Making , Ethical Theories
HOSPITALITY & TOURISM 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
School Accounts Presented by: Mrs. Mazzola.
CAROBELL, INC. CODE OF ETHICAL STANDARDS. Code of Ethical Standards All Carobell representatives (Board Members, Administration, Staff members, Contractors,
Implementation of legislation (Chapter 47) By Haley Court.
IT depends on several codes of ethics 1. PUBLIC - IT engineers shall act consistently with the public interest. 2. CLIENT AND EMPLOYER - IT engineers shall.
F8: Audit and Assurance. 2 Designed to give you knowledge and application of: Section A: Audit Framework and Regulation Section B: Internal audit Section.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
The Medical College of Georgia HIPAA Privacy Rule Orientation.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Clark Holt Limited (Co. No ), Hardwick House, Prospect Place, Swindon, SN1 3LJ Authorised and regulated by the Solicitors Regulation.
The accounting profession requires its members to follow a code of ethics.
Ogletree, Deakins, Nash, Smoak & Stewart PC
Chapter 9 Ethics and Professional Practice in IT
Privacy principles Individual written policies
Welcome Back Glencoe Accounting.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Presentation transcript:

YOU’RE IN BUSINESS YOUR PEOPLE ETHICS IN BUSINESS

YOUR PEOPLE YOU’RE IN BUSINESS LESSON 5: PART A - ATTRIBUTES AND ACTIONS Let’s Discuss our Work Experience… How important is the employee to the success of a business? Why are employees so important?

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART A - ATTRIBUTES AND ACTIONS MODEL EMPLOYEE loyal diligent hard-working honest sensible tactful discreet appropriate punctual generous friendly good-humoured

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART A - ATTRIBUTES AND ACTIONS ETHICAL EMPLOYER fair discreet honest law-abiding responsible objective possessing integrity impartial

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART A - ATTRIBUTES AND ACTIONS SEVEN GUIDING PRINCIPLES Principle One: Fairness Conduct business according to high standards of honesty and fairness and treat people fairly, carefully weighing our responsibilities to all stakeholders, who, in the same circumstances, would demand the same treatment for themselves. Principle Two: Integrity Tell the truth in all our communications and do not mislead by error or omission in order to openly represent and disclose all aspects of our relationships. Principle Three: Corporate and Social Responsibility Add value to society and take responsibility – social, environmental and economic – as a corporate citizen for the effects of our actions.

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART A - ATTRIBUTES AND ACTIONS Principle Four: Confidentiality Respect and preserve the right of customers and employees to privacy and to the security of their personal information. Principle Five: Individual Responsibility Treat each other with respect as responsible men and women to ensure our working relationship is based on candour and openness and our commitment to empower others. Principle Six: Objectivity Make judgments independent of personal interests that may arise from other business dealings or obligations created by social relationships or personal favours. Principle Seven: Upholding the Law Abide by the laws, rules and regulations governing the insurance industry and business in general and respect these in letter and in spirit in the best interests of our customers, employees and shareholders.

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART A - ATTRIBUTES AND ACTIONS Recall the attributes of our ethical persons: Employer fair objective responsible discreet honest impartial possessing integrity law-abiding Employee loyal diligent hard-working honest sensible tactful discreet appropriate punctual good-humoured friendly generous

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART A - ATTRIBUTES AND ACTIONS How do these attributes translate into action in the workplace? Why is it so important that the company’s leader demonstrates the attributes of the guiding principles in all of his or her actions? What is the purpose of having “guiding principles” for a code of conduct? What are the likely consequences if an employee does not follow these guiding principles? What are the consequences if an employer does not follow the principles?

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART B – CODIFY THE CONDUCT Why does your school have a code of conduct? What happens when you sign a code of conduct or any other document? It means that you are committed to what has been read – that you are ethically, if not legally, committed. What happens if you do something against the code after you have signed it? Some form of disciplinary action takes place.

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART A - ATTRIBUTES AND ACTIONS ELECTRONIC COMMUNICATIONS STUDENT ACTIVITY

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART B – CODIFY THE CONDUCT “Because these systems are owned by Insurance CO. and are to be used for business reasons, the contents of any communications transmitted through or stored within these systems are company property and are subject to review by and disclosure to Insurance Co. Furthermore, in some situations (eg. litigation involving insurance Co.) these communications may be subject to disclosure to a third party outside Insurance Co.” What is the MAIN IDEA of this section of the code? What is the GUIDING PRINCIPLE? What actions would breach this section of the code?

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART B – CODIFY THE CONDUCT “In order to assure that the systems are being used properly and in compliance with this policy, Insurance Co., without notice, may periodically access, display, copy, delete or listen to any messages or communications sent, received, created deleted or stored through or in its systems. Occasional personal use of the systems is permissible. Occasional personal use means minimal and infrequent use that does not interfere with Insurance Co. business or job performance. Any employee communicating personal messages should do so with the understanding that his or her messages or communications are subject to being heard or read by Insurance Co. You should not expect that any of these messages or communications will be confidential or private. Insurance Co. technology resources may not be used for personal commercial or profit-generating activities unrelated to Insurance Co.’s business.” What is the MAIN IDEA of this section of the code? What is the GUIDING PRINCIPLE? What actions would breach this section of the code?

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART B – CODIFY THE CONDUCT “Insurance Co. may monitor Internet use, including reviewing the list of sites accessed by any individual terminal. Your Internet use is not private. No employee should have any expectation of privacy regarding Internet usage. Insurance Co. reserves the right to inspect an employee’s computer anytime or to use monitoring software in order to monitor Internet and computer use. These systems may not be used to access or transmit material that could embarrass, harass or offend other persons. Additionally, Insurance Co. strictly prohibits the use of its systems to communicate sexually offensive material or comments or anything that might offend or disparage another person because of his or her race, ancestry, place of origin, colour, ethnic origin, citizenship, creed, sex, sexual orientation, same-sex partnership status, age, record of offences, marital status, family status or handicap.” What is the MAIN IDEA of this section of the code? What is the GUIDING PRINCIPLE? What actions would breach this section of the code?

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART B – CODIFY THE CONDUCT “Consistent with existing company policies, employees are not to use the system for solicitation of any kind, including the distribution of chain letters. Employees have the responsibility to safeguard passwords and codes in order to protect proprietary or confidential business information. Employees must also take adequate measures to ensure that their company account on the Internet is not used by any other individual, including other members of their household.” What is the MAIN IDEA of this section of the code? What is the GUIDING PRINCIPLE? What actions would breach this section of the code?

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART B – CODIFY THE CONDUCT “No employee shall use the passwords or codes of another employee in order to gain access to that employee’s , voice mail or Internet communications unless first authorized to do so by that employee. All passwords and codes used in connection with these systems are the property of Insurance Co. No employee shall use a password or code that is not readily available to Insurance Co. at all times.” What is the MAIN IDEA of this section of the code? What is the GUIDING PRINCIPLE? What actions would breach this section of the code?

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART B – CODIFY THE CONDUCT “Only software purchased by Insurance Co. for its use may be installed on Insurance Co. computers. Insurance Co. may, at any time, conduct an audit of computers for installed software and related printed material that is not included on a then-current inventory of Insurance Co.-authorized software. All unauthorized software will be removed and destroyed. In addition, employees may not post, download or otherwise misuse any copyright-protected material without the prior permission of the copyright owner.” What is the MAIN IDEA of this section of the code? What is the GUIDING PRINCIPLE? What actions would breach this section of the code?

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART B – CODIFY THE CONDUCT “For security reasons, employees accessing the Internet for business use must only do so through the Insurance co. authorized connection and must not utilize any other connection paths to the Internet.” What is the MAIN IDEA of this section of the code? What is the GUIDING PRINCIPLE? What actions would breach this section of the code?

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART B – CODIFY THE CONDUCT “Any breach of this policy will lead to disciplinary action up to and including dismissal.” What is the MAIN IDEA of this section of the code? What is the GUIDING PRINCIPLE? What actions would breach this section of the code?

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART B – CODIFY THE CONDUCT Why is an electronic code of conduct or communications policy important? What purpose does it achieve? What protection does a code of conduct such as this provide for employees? For employers? Why is this particularly necessary in an insurance company? What can happen if you breach the code? What electronic devices/issues would you add to this code of conduct to keep it up-to-date?

YOU’RE IN BUSINESS YOUR PEOPLE LESSON 5: PART C – CLEAR COMMUNICATIONS Did each employee breach the electronic communications policy or other code of conduct? How? Who was harmed by their actions? What did you choose to do as a result of this breach? Why? Were the employee’s actions morally wrong? What are the ethical implications of what they did? As their boss, what were your obligations? To whom did you owe these obligations?

YOU’RE IN BUSINESS YOUR PEOPLE THE END Visit to learn more! Brought to you by: