Understanding Business Ethics

Slides:



Advertisements
Similar presentations
Janis Gatewood EDU689 January 27, Faculty and Staff COMPUTER CRIME ACT Section of the Code of Laws of S.C. states that: 1. It is unlawful.
Advertisements

Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
HIPAA. What Why Who How When What Is HIPAA? Health Insurance Portability & Accountability Act of 1996.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
ICT Ethics 2 ICT 139.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
Marketing Ethics and Social Responsibility in Strategic Planning
Chapter 29 Ethics in Accounting
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 8: Developing an Effective Ethics Program.
Business, Accounting and Personal Ethics. Sources Used Trevino, Linda, Gary Weaver, David Gibson, and Barbara Ley Toffler, “Managing Ethics and Legal.
Supplier Ethics: Program Checklist
Legal and Ethical Considerations
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Ethics and Security ISSA International Ethics Committee V2.1 4/27/07.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
© IBE....doing business ethically makes for better business…. Business Ethics: the essential components Philippa Foster Back OBE Director Institute of.
Computer ethics.
Loescher & Associates Pro-Active Solutions Credit Unions with a Conscience: Creating an Ethical Work Environment Presented.
Possible WebQuest type links  
Describe ethical considerations resulting from technological advances.
Computer Ethics.
Christie Stelling, CPA, CIA Assoc. Director, Finance Financial Controls.
Developing an Effective Ethics Program.  The responsibility of the corporation as a moral agent  The need for organizational ethics programs  An effective.
Developing an Effective Ethics Program
Computer Ethics for Computer Users
Laws, Investigations & Ethical Issues in Security (CIM3562)
Marketing Ethics and Social Responsibility
COMPUTER ETHICS Do you know the difference between right and wrong?
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Unit 3- Introduction to Computer Ethics
Ethics in Computers. Top 12 Ways to Protect Your Online Privacy 1) Do not reveal personal information inadvertently 2) Turn on cookie notices in your.
Page 1 of 23 DMC’S COMMITMENT TO COMPLIANCE: COMPLIANCE PROGRAM CODE OF CONDUCT 2009 DMC Corporate Audit and Compliance Department Detroit Medical Center©
Ethics & Codes of Conduct. Learning Outcomes: By the end of this topic you should be able to: discuss ethics and ICT describe the nature of a Code.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
Schermerhorn - Chapter 41 Chapter 4 Ethical Behavior and Social Responsibility 4 Planning Ahead –What is ethical behavior? –How do ethical dilemmas complicate.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Ethics Business Law Sunny Hills High School Mrs. Larsen.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
HOSPITALITY & TOURISM 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
C ENTURY 21 A CCOUNTING © South-Western, Cengage Learning C H A R A C T E R C O U N T S CHAPTER 9 Walking on Ethical Ice.
Copyright © Houghton Mifflin Company. All rights reserved.8-1 Chapter 8 Developing an Effective Ethics Program.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.
Computer Ethics IT Fundamentals Battlefield High School.
Internet Etiquette or Netiquette
Computers Are Your Future Twelfth Edition
Chapter 16 – Careers in Information Technology
Internet Etiquette or Netiquette
MGMT 452 Corporate Social Responsibility
Developing an Effective Ethics Program
Hospitality & Tourism 5.02A Interpret the nature of business ethics and social responsibility 5.02B Exemplify legal issues affecting businesses.
Unit 3- Introduction to Computer Ethics
THE IMPORTANCE OF ETHICS IN FUNERAL SERVICE Presented by: Ken Whittaker Whittaker Funeral Support Services.
Chapter 8 Developing an Effective Ethics Program
Computer Ethics.
Ethics IN PRIVATE SECURITY
CHAPTER 3: ETHICS AND CORPORATE SOCIAL RESPONSIBILITY
Presentation transcript:

Understanding Business Ethics An Introduction

Business Ethics Process (KPMG) Program/ Practices/ Systems Designed to motivate, measure, and monitor an organization’s ethical performance

Business Ethics and Business Reputation Strong link between business ethics and business reputation TV Rule Management needs to take an active role in ‘managing’ ethics

Role of Management Top Management is responsible for establishing, developing, and enforcing a code of ethical conduct Shows all employees top management’s commitment to ethical behavior

Development of Code of Ethics Ensures employees and the company can’t be challenged on their ethical integrity. Establishes course of action for unethical behavior by employees Need to establish a procedure for reporting unethical behavior

Educating Employees Texas Instruments established a Quick Test for educating employees about what is right or wrong: Is the action legal? Does it comply with our values? If you do it, will you feel bad? How does it look in the newspaper? If you know it is wrong, don’t do it. If you aren’t sure, ask. Keep asking until you get an answer.

Lockheed Martin established a quick quiz…When in doubt, ask yourself: Are my actions legal? Am I being fair and honest? Will my action stand the test of time? How will I feel about myself afterwards? How will it look in the newspaper? Will I sleep soundly tonight? What would I tell my children to do? How would I feel if my family, friends, and neighbors knew what I was doing?

Developing a Code of Ethics Need to incorporate individual and corporate values when facing ethical dilemmas Nortel states this clearly to all employees in their Ethical Business Practices document: You have a personal responsibility to make sure that all your words and actions live up to these statements You have a responsibility to ask questions when you have doubts about the ethical implications of any given situation or proposed course of action. You have a responsibility to report any concerns about business practices within the corporation that may violate this code of business conduct.

Cost of Managing Ethics Estimated $100 billion is spent each year for companies in North American to deal with ethical problems (KPMG) investigating and resolving ethical dilemmas establishing mechanisms to ensure the problem doesn’t happen again Federal Sentencing Guidelines (est 1991) fines from $5K to 72.5K for violation of ethical actions Total penalties for a single company could approach $290 million

Federal Sentencing Guidelines - Minimum Requirements for Effective Ethics Compliance Program 1. Establish compliance standards and procedures 2. Assign top level management overall responsibility for compliance 3. Don’t delegate responsibility to employees who are not trustworthy 4. Communicate standards and procedures to all employees 5. Monitoring and audit systems used to detect unethical activities 6. Enforce ethical standards through appropriate disciplinary mechanisms 7. Make adjustment to ethical process if unethical behavior has occurred

Comprehensive Ethics Program May Include: 1. Codes of conduct 2. Mission statement 3. Training and awareness program 4. Town meeting 5. Ethics officers 6. Compliance hotlines 7. Ethics offices

Ethics and Information Technology 1. Property Rights and Obligations 2. Policies Pertaining to Customer Information 3. Employee E-Mail Privacy 4. Workplace Monitoring

The Ten Commandments of Computer Ethics (Computer Ethics Institute) 1. Thou shalt not use a computer to harm other people. 2. Thou shalt not interfere with other people’s computer work. 3. Thou shalt not snoop around in other people’s computer files. 4. Thou shalt not use a computer to steal. 5. Thou shalt not use a computer to bear false witness. 6. Thou shalt not copy or use proprietary software for which you have not paid. 7. Thou shalt not use other people’s computer resources without authorization or proper compensation. 8. Thou shalt not appropriate other people’s intellectual output. 9. Thou shalt think about the social consequences of the program you are writing or the system you are designing. 10. Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans.

Developing Policies to Address IT Issues 1. Understanding Privacy Laws Federal Privacy Act of 1974 Fair Credit Reporting Act of 1970 Right to Financial Privacy Act of 1978 Privacy Protection Act of 1980 Cable Communications Policy Act of 1984 Electronic Communications Privacy Act of 1986 2. Establishing a Privacy Code 3. Policy Content

Policy Content should include: Technology equipment owned by the company gives the company exclusive rights to control and monitor Private databases and emails developed using the company’s equipment can be reviewed Deletion of a file/email does not guarantee that it has been permanently destroyed

Policy Content should include: Guidelines on what is appropriate and inappropriate material Guidelines for using emails for solicitation of employees Violation of ethics policy will result in disciplinary action Description of ethical treatment of information from external sources including customers

Policy Content should include: Summary of types of disciplinary actions should be included in the written policy Employees need to acknowledge content of policy by signing a written agreement

Using Ethical Policies for a Competitive Advantage Internally: help motivation of employees -- they know what behavior is expected of them reduce company costs by reducing disciplinary actions including dismissal and reducing fines for ethical violations

Using Ethical Policies for a Competitive Advantage Externally: use the privacy policy to ensure customers that their personal information will not be misused establish opt in/ opt out option -- allow customers to determine whether they agree to have their information available to other companies

Lockheed Martin Ethical Policy: “While maintaining sensitivity to the diverse social and cultural settings in which we conduct our business, Lockheed Martin aims to set the standard for ethical conduct at all of our locations throughout the world. We will achieve this through behavior in accordance with six virtues: Honesty, Integrity, Respect, Trust, Responsibility, and Citizenship.”

You’re on Ethical Thin Ice When You Hear (Lockheed Martin): Well, maybe just this once… No one will ever know… It doesn’t matter how it gets done as long as it gets done. It sounds too good to be true. Everyone does it. Shred that document. We can hide it. No one will get hurt What’s in it for me? This will destroy the competition. We didn’t have this conversation.