SlideShare una empresa de Scribd logo
1 de 13
COMPUTER ETHICS
IN THE WORKPLACE
(INDUSTRY)

Reported by: Jackielyn M. Dulce
Code of Ethics in a Workplace
A workplace code of ethics is the
result of a company analysis where
practices are analyzed in light of right
behavior and wrong behavior. The code
of ethics defines right behavior and
encourages, or requires, employees to
engage in that behavior.
Purpose
Ideally, a code of workplace ethics
would be implemented for the primary
purpose of encouraging ethical behavior.
However, avoiding lawsuits can also be a
driving force behind a code of ethics. A
workplace code of ethics delineates
behavior that is ethically unacceptable,
and many of those unacceptable
behaviors are also violations of law.
Content
A workplace code of ethics can
contain a number of areas to help avoid
management dilemmas, such as
potential conflicts of interest or illegal
activities. In some cases, a code of
ethics can define proper use of
company resources. If a company is
very large and has a number of subcontracts, a code of ethics could define
the proper relationship between the
company
and
its
contractors.
For example, if sub-contracting
to a company filling a government
contract, you are not allowed to buy
gifts or buy lunch for employees of the
general
contractor.
This
is
contractually defined in a code of
workplace ethics for government
contracts.
Legal Issues
Most workplace code of ethics
specifically prohibits illegal behavior.
Theft from a supplier would be a breach of
the code of ethics because it is a clear
violation of law. Other things sometimes
covered in a workplace code of ethics
include
sexual
harassment,
racial
harassment, discrimination, and issues
relating to hostile workplace regulations.
Implementation
In very large companies, an outside
contractor or agency specializing in business
ethics may be helpful in developing a code of
ethics. Large organizations often have many
smaller
internal
organizations.
Those
smaller organizations may not be aware of
the activities and needs of other internal
organizations. An outside company can
sometimes see commonalities and potential
conflicts between departments, and help to
create an effective code of ethics.
Workplace and Computer Ethics Abuse

Ethics in the workplace is a
combination of morality and rules.
Ethics involve trust between
employees and the employer, and
between
employees.
While
technology (specifically computers
and Internet access) can be a huge
boon to any business, it can also be
a major source of ethics abuse, or
the temptation for abuse.
Appropriate Use
The rules of the workplace
generally state computers are to be used
for work only. While you may have
access to the Internet (perhaps because
your office's file search function is hosted
on an Internet server), that means you
shouldn't use your computer for nonwork related functions such as surfing,
keeping a private diary or reading
Webcomics.
Personal Time
An ethical question is whether or
not you can use company equipment on
personal time. For instance, if you're on
your lunch break, should you be able to
check your personal email account? Your
workplace will often have a policy on that.
However, if you're not sure, it might be
best to talk to your supervisor and put the
question forward.
Spyware
A question of computer ethics and
privacy falls onto management in the
workplace. Spyware such as keyloggers or
other programs that watch what a user is
doing on a given computer are common at
work. However, does the management have
the right to eavesdrop on employees? It
creates a breach of trust that employees
aren't doing their job without an electronic
babysitter, but at the same time, it provides
proof that no one is misusing computers while
on the job.
Authorization
Related to privacy issues is a person's
authorization to use a computer. For instance,
say that you are given your own computer at
work, but for some reason, you can't access
your computer. Do you use a coworker's
computer, or do you wait for your issue to be
solved? Also, if your manager is using your
computer while you're not present, is that a
violation of ethics or simply a convenience for
the manager? Questions about whether or not
people can only use their own computer should
be answered firmly.
Doing Harm
One of the most blatant violations of
computer ethics in the workplace is to use
the computer to do harm. This could be done
by hacking into another person's computer
and deleting important files, by spreading
computer viruses through the office network
or a variety of other potential options for
causing havoc. Intent is a part of doing harm,
but even if you cause harm accidentally, you
may still be ethically in the wrong.

Más contenido relacionado

La actualidad más candente

Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Worklorensr12
 
Professional Practices Week1.pptx
Professional Practices Week1.pptxProfessional Practices Week1.pptx
Professional Practices Week1.pptxTechBasti
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentationguest65a1c4
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindSaurabh Kheni
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICTRoshanMaharjan13
 
Computer crime
Computer crimeComputer crime
Computer crimeUc Man
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxRambilashTudu
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crimeAman Kumar
 
Introduction to information technology
Introduction to information technologyIntroduction to information technology
Introduction to information technologyHaider Ali Malik
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xiArchana Dwivedi
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethicsSKS
 
information technology
information technology information technology
information technology rukhsarqazi1
 

La actualidad más candente (20)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Ethics Final Work
Computer Ethics Final WorkComputer Ethics Final Work
Computer Ethics Final Work
 
Professional Practices Week1.pptx
Professional Practices Week1.pptxProfessional Practices Week1.pptx
Professional Practices Week1.pptx
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Professional Ethics of IT
Professional Ethics of ITProfessional Ethics of IT
Professional Ethics of IT
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ethical and Social Issues in ICT
Ethical and Social Issues in ICTEthical and Social Issues in ICT
Ethical and Social Issues in ICT
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Introduction to information technology
Introduction to information technologyIntroduction to information technology
Introduction to information technology
 
Cyber ethics cbse class xi
Cyber ethics cbse class xiCyber ethics cbse class xi
Cyber ethics cbse class xi
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 
information technology
information technology information technology
information technology
 

Destacado

Destacado (20)

Computers and the workplace
Computers and the workplaceComputers and the workplace
Computers and the workplace
 
Workplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint PresentationWorkplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint Presentation
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Code of ethics industry
Code of ethics   industryCode of ethics   industry
Code of ethics industry
 
Bullying in the Workplace, by Loraleigh Keashly
Bullying in the Workplace, by Loraleigh KeashlyBullying in the Workplace, by Loraleigh Keashly
Bullying in the Workplace, by Loraleigh Keashly
 
Women empowerment
Women empowerment Women empowerment
Women empowerment
 
Lesson 10
Lesson 10Lesson 10
Lesson 10
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
 
Personal professional code of ethics
Personal professional code of ethicsPersonal professional code of ethics
Personal professional code of ethics
 
Quadrennial REALTOR® Ethics Training Powerpoint
Quadrennial REALTOR® Ethics Training PowerpointQuadrennial REALTOR® Ethics Training Powerpoint
Quadrennial REALTOR® Ethics Training Powerpoint
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
 
Workplace Ethics
Workplace EthicsWorkplace Ethics
Workplace Ethics
 
Professional ethical conduct
Professional ethical conductProfessional ethical conduct
Professional ethical conduct
 
Ethics
EthicsEthics
Ethics
 
Module 4 Spirituality Slides
Module 4   Spirituality SlidesModule 4   Spirituality Slides
Module 4 Spirituality Slides
 
Workplace ethics
Workplace ethicsWorkplace ethics
Workplace ethics
 
Ethics and professionalism
Ethics and professionalismEthics and professionalism
Ethics and professionalism
 
Ethic and professionalism
Ethic and professionalismEthic and professionalism
Ethic and professionalism
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
 

Similar a Computer ethics in the workplace (industry)

AssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxAssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxnormanibarber20063
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxsusanschei
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Matthew Charles
 
Group assignment 2
Group assignment 2Group assignment 2
Group assignment 2Farah Azudin
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docxambersalomon88660
 
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docxBUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docxhumphrieskalyn
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9sajida zafar
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docxaryan532920
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Human Resources & Payroll
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
Employment
EmploymentEmployment
EmploymentZenaTaha
 
The Role of Business Ethics in Employee Engagement Novembe.docx
The Role of Business Ethics in Employee Engagement Novembe.docxThe Role of Business Ethics in Employee Engagement Novembe.docx
The Role of Business Ethics in Employee Engagement Novembe.docxoreo10
 
Response 1A code of    conduct is a guide that a company uses.docx
Response 1A code of    conduct is a guide that a company uses.docxResponse 1A code of    conduct is a guide that a company uses.docx
Response 1A code of    conduct is a guide that a company uses.docxcarlstromcurtis
 

Similar a Computer ethics in the workplace (industry) (20)

Liabilty
LiabiltyLiabilty
Liabilty
 
AssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxAssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docx
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
 
Group assignment 2
Group assignment 2Group assignment 2
Group assignment 2
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docxBUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
 
Employment
EmploymentEmployment
Employment
 
The Role of Business Ethics in Employee Engagement Novembe.docx
The Role of Business Ethics in Employee Engagement Novembe.docxThe Role of Business Ethics in Employee Engagement Novembe.docx
The Role of Business Ethics in Employee Engagement Novembe.docx
 
Gr 3 ethical implication of it
Gr 3   ethical implication of itGr 3   ethical implication of it
Gr 3 ethical implication of it
 
Ethical Implications of IT
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
 
Response 1A code of    conduct is a guide that a company uses.docx
Response 1A code of    conduct is a guide that a company uses.docxResponse 1A code of    conduct is a guide that a company uses.docx
Response 1A code of    conduct is a guide that a company uses.docx
 
P.practices-week-2.pptx
P.practices-week-2.pptxP.practices-week-2.pptx
P.practices-week-2.pptx
 
Chapter 1- Lesson 2 Notes.pdf
Chapter 1- Lesson 2 Notes.pdfChapter 1- Lesson 2 Notes.pdf
Chapter 1- Lesson 2 Notes.pdf
 

Último

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Último (20)

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

Computer ethics in the workplace (industry)

  • 1. COMPUTER ETHICS IN THE WORKPLACE (INDUSTRY) Reported by: Jackielyn M. Dulce
  • 2. Code of Ethics in a Workplace A workplace code of ethics is the result of a company analysis where practices are analyzed in light of right behavior and wrong behavior. The code of ethics defines right behavior and encourages, or requires, employees to engage in that behavior.
  • 3. Purpose Ideally, a code of workplace ethics would be implemented for the primary purpose of encouraging ethical behavior. However, avoiding lawsuits can also be a driving force behind a code of ethics. A workplace code of ethics delineates behavior that is ethically unacceptable, and many of those unacceptable behaviors are also violations of law.
  • 4. Content A workplace code of ethics can contain a number of areas to help avoid management dilemmas, such as potential conflicts of interest or illegal activities. In some cases, a code of ethics can define proper use of company resources. If a company is very large and has a number of subcontracts, a code of ethics could define the proper relationship between the company and its contractors.
  • 5. For example, if sub-contracting to a company filling a government contract, you are not allowed to buy gifts or buy lunch for employees of the general contractor. This is contractually defined in a code of workplace ethics for government contracts.
  • 6. Legal Issues Most workplace code of ethics specifically prohibits illegal behavior. Theft from a supplier would be a breach of the code of ethics because it is a clear violation of law. Other things sometimes covered in a workplace code of ethics include sexual harassment, racial harassment, discrimination, and issues relating to hostile workplace regulations.
  • 7. Implementation In very large companies, an outside contractor or agency specializing in business ethics may be helpful in developing a code of ethics. Large organizations often have many smaller internal organizations. Those smaller organizations may not be aware of the activities and needs of other internal organizations. An outside company can sometimes see commonalities and potential conflicts between departments, and help to create an effective code of ethics.
  • 8. Workplace and Computer Ethics Abuse Ethics in the workplace is a combination of morality and rules. Ethics involve trust between employees and the employer, and between employees. While technology (specifically computers and Internet access) can be a huge boon to any business, it can also be a major source of ethics abuse, or the temptation for abuse.
  • 9. Appropriate Use The rules of the workplace generally state computers are to be used for work only. While you may have access to the Internet (perhaps because your office's file search function is hosted on an Internet server), that means you shouldn't use your computer for nonwork related functions such as surfing, keeping a private diary or reading Webcomics.
  • 10. Personal Time An ethical question is whether or not you can use company equipment on personal time. For instance, if you're on your lunch break, should you be able to check your personal email account? Your workplace will often have a policy on that. However, if you're not sure, it might be best to talk to your supervisor and put the question forward.
  • 11. Spyware A question of computer ethics and privacy falls onto management in the workplace. Spyware such as keyloggers or other programs that watch what a user is doing on a given computer are common at work. However, does the management have the right to eavesdrop on employees? It creates a breach of trust that employees aren't doing their job without an electronic babysitter, but at the same time, it provides proof that no one is misusing computers while on the job.
  • 12. Authorization Related to privacy issues is a person's authorization to use a computer. For instance, say that you are given your own computer at work, but for some reason, you can't access your computer. Do you use a coworker's computer, or do you wait for your issue to be solved? Also, if your manager is using your computer while you're not present, is that a violation of ethics or simply a convenience for the manager? Questions about whether or not people can only use their own computer should be answered firmly.
  • 13. Doing Harm One of the most blatant violations of computer ethics in the workplace is to use the computer to do harm. This could be done by hacking into another person's computer and deleting important files, by spreading computer viruses through the office network or a variety of other potential options for causing havoc. Intent is a part of doing harm, but even if you cause harm accidentally, you may still be ethically in the wrong.