SlideShare une entreprise Scribd logo
1  sur  13
COMPUTER ETHICS
IN THE WORKPLACE
(INDUSTRY)

Reported by: Jackielyn M. Dulce
Code of Ethics in a Workplace
A workplace code of ethics is the
result of a company analysis where
practices are analyzed in light of right
behavior and wrong behavior. The code
of ethics defines right behavior and
encourages, or requires, employees to
engage in that behavior.
Purpose
Ideally, a code of workplace ethics
would be implemented for the primary
purpose of encouraging ethical behavior.
However, avoiding lawsuits can also be a
driving force behind a code of ethics. A
workplace code of ethics delineates
behavior that is ethically unacceptable,
and many of those unacceptable
behaviors are also violations of law.
Content
A workplace code of ethics can
contain a number of areas to help avoid
management dilemmas, such as
potential conflicts of interest or illegal
activities. In some cases, a code of
ethics can define proper use of
company resources. If a company is
very large and has a number of subcontracts, a code of ethics could define
the proper relationship between the
company
and
its
contractors.
For example, if sub-contracting
to a company filling a government
contract, you are not allowed to buy
gifts or buy lunch for employees of the
general
contractor.
This
is
contractually defined in a code of
workplace ethics for government
contracts.
Legal Issues
Most workplace code of ethics
specifically prohibits illegal behavior.
Theft from a supplier would be a breach of
the code of ethics because it is a clear
violation of law. Other things sometimes
covered in a workplace code of ethics
include
sexual
harassment,
racial
harassment, discrimination, and issues
relating to hostile workplace regulations.
Implementation
In very large companies, an outside
contractor or agency specializing in business
ethics may be helpful in developing a code of
ethics. Large organizations often have many
smaller
internal
organizations.
Those
smaller organizations may not be aware of
the activities and needs of other internal
organizations. An outside company can
sometimes see commonalities and potential
conflicts between departments, and help to
create an effective code of ethics.
Workplace and Computer Ethics Abuse

Ethics in the workplace is a
combination of morality and rules.
Ethics involve trust between
employees and the employer, and
between
employees.
While
technology (specifically computers
and Internet access) can be a huge
boon to any business, it can also be
a major source of ethics abuse, or
the temptation for abuse.
Appropriate Use
The rules of the workplace
generally state computers are to be used
for work only. While you may have
access to the Internet (perhaps because
your office's file search function is hosted
on an Internet server), that means you
shouldn't use your computer for nonwork related functions such as surfing,
keeping a private diary or reading
Webcomics.
Personal Time
An ethical question is whether or
not you can use company equipment on
personal time. For instance, if you're on
your lunch break, should you be able to
check your personal email account? Your
workplace will often have a policy on that.
However, if you're not sure, it might be
best to talk to your supervisor and put the
question forward.
Spyware
A question of computer ethics and
privacy falls onto management in the
workplace. Spyware such as keyloggers or
other programs that watch what a user is
doing on a given computer are common at
work. However, does the management have
the right to eavesdrop on employees? It
creates a breach of trust that employees
aren't doing their job without an electronic
babysitter, but at the same time, it provides
proof that no one is misusing computers while
on the job.
Authorization
Related to privacy issues is a person's
authorization to use a computer. For instance,
say that you are given your own computer at
work, but for some reason, you can't access
your computer. Do you use a coworker's
computer, or do you wait for your issue to be
solved? Also, if your manager is using your
computer while you're not present, is that a
violation of ethics or simply a convenience for
the manager? Questions about whether or not
people can only use their own computer should
be answered firmly.
Doing Harm
One of the most blatant violations of
computer ethics in the workplace is to use
the computer to do harm. This could be done
by hacking into another person's computer
and deleting important files, by spreading
computer viruses through the office network
or a variety of other potential options for
causing havoc. Intent is a part of doing harm,
but even if you cause harm accidentally, you
may still be ethically in the wrong.

Contenu connexe

Tendances

Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
msolis0710
 

Tendances (20)

Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law Computer Miss-use and Criminal Law
Computer Miss-use and Criminal Law
 
Ethics in using computer
Ethics in using computerEthics in using computer
Ethics in using computer
 
Identify ethical use of computers
Identify ethical use of computersIdentify ethical use of computers
Identify ethical use of computers
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Computers and society
Computers and societyComputers and society
Computers and society
 
Internet Ethics
Internet EthicsInternet Ethics
Internet Ethics
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
How technology has changed our lives
How technology has changed our livesHow technology has changed our lives
How technology has changed our lives
 
Copyright and open source licensing
Copyright and open source licensingCopyright and open source licensing
Copyright and open source licensing
 
Ethics in IT Security
Ethics in IT SecurityEthics in IT Security
Ethics in IT Security
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
COMPUTER ETHICS
COMPUTER ETHICSCOMPUTER ETHICS
COMPUTER ETHICS
 
Software Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEESoftware Engineering code of ethics and professional practice of IEEE
Software Engineering code of ethics and professional practice of IEEE
 
Internet History
Internet HistoryInternet History
Internet History
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Evolution of the World Wide Web
Evolution of the World Wide Web Evolution of the World Wide Web
Evolution of the World Wide Web
 
introduction to cyber law and cyber crime
introduction to cyber law and cyber crimeintroduction to cyber law and cyber crime
introduction to cyber law and cyber crime
 

En vedette

Computers and the workplace
Computers and the workplaceComputers and the workplace
Computers and the workplace
kmodasia
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
Bhanja Kishor Samudra
 
Personal professional code of ethics
Personal professional code of ethicsPersonal professional code of ethics
Personal professional code of ethics
Toby P. Newstead
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
lsanford84
 
Module 4 Spirituality Slides
Module 4   Spirituality SlidesModule 4   Spirituality Slides
Module 4 Spirituality Slides
guest7fd03f
 

En vedette (20)

Computers and the workplace
Computers and the workplaceComputers and the workplace
Computers and the workplace
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Workplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint PresentationWorkplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint Presentation
 
Code of ethics industry
Code of ethics   industryCode of ethics   industry
Code of ethics industry
 
Bullying in the Workplace, by Loraleigh Keashly
Bullying in the Workplace, by Loraleigh KeashlyBullying in the Workplace, by Loraleigh Keashly
Bullying in the Workplace, by Loraleigh Keashly
 
Women empowerment
Women empowerment Women empowerment
Women empowerment
 
Lesson 10
Lesson 10Lesson 10
Lesson 10
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
 
Personal professional code of ethics
Personal professional code of ethicsPersonal professional code of ethics
Personal professional code of ethics
 
Quadrennial REALTOR® Ethics Training Powerpoint
Quadrennial REALTOR® Ethics Training PowerpointQuadrennial REALTOR® Ethics Training Powerpoint
Quadrennial REALTOR® Ethics Training Powerpoint
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
 
Workplace Ethics
Workplace EthicsWorkplace Ethics
Workplace Ethics
 
Professional ethical conduct
Professional ethical conductProfessional ethical conduct
Professional ethical conduct
 
Ethics
EthicsEthics
Ethics
 
Module 4 Spirituality Slides
Module 4   Spirituality SlidesModule 4   Spirituality Slides
Module 4 Spirituality Slides
 
Workplace ethics
Workplace ethicsWorkplace ethics
Workplace ethics
 
Ethics and professionalism
Ethics and professionalismEthics and professionalism
Ethics and professionalism
 
Ethic and professionalism
Ethic and professionalismEthic and professionalism
Ethic and professionalism
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
 

Similaire à Computer ethics in the workplace (industry)

AssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxAssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docx
normanibarber20063
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
susanschei
 
Group assignment 2
Group assignment 2Group assignment 2
Group assignment 2
Farah Azudin
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
ambersalomon88660
 
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docxBUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
humphrieskalyn
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
aryan532920
 
Employment
EmploymentEmployment
Employment
ZenaTaha
 
The Role of Business Ethics in Employee Engagement Novembe.docx
The Role of Business Ethics in Employee Engagement Novembe.docxThe Role of Business Ethics in Employee Engagement Novembe.docx
The Role of Business Ethics in Employee Engagement Novembe.docx
oreo10
 
Response 1A code of    conduct is a guide that a company uses.docx
Response 1A code of    conduct is a guide that a company uses.docxResponse 1A code of    conduct is a guide that a company uses.docx
Response 1A code of    conduct is a guide that a company uses.docx
carlstromcurtis
 

Similaire à Computer ethics in the workplace (industry) (20)

Liabilty
LiabiltyLiabilty
Liabilty
 
AssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxAssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docx
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
 
Group assignment 2
Group assignment 2Group assignment 2
Group assignment 2
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docxBUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
 
Employment
EmploymentEmployment
Employment
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
The Role of Business Ethics in Employee Engagement Novembe.docx
The Role of Business Ethics in Employee Engagement Novembe.docxThe Role of Business Ethics in Employee Engagement Novembe.docx
The Role of Business Ethics in Employee Engagement Novembe.docx
 
Gr 3 ethical implication of it
Gr 3   ethical implication of itGr 3   ethical implication of it
Gr 3 ethical implication of it
 
Ethical Implications of IT
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
 
Response 1A code of    conduct is a guide that a company uses.docx
Response 1A code of    conduct is a guide that a company uses.docxResponse 1A code of    conduct is a guide that a company uses.docx
Response 1A code of    conduct is a guide that a company uses.docx
 
P.practices-week-2.pptx
P.practices-week-2.pptxP.practices-week-2.pptx
P.practices-week-2.pptx
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Dernier (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 

Computer ethics in the workplace (industry)

  • 1. COMPUTER ETHICS IN THE WORKPLACE (INDUSTRY) Reported by: Jackielyn M. Dulce
  • 2. Code of Ethics in a Workplace A workplace code of ethics is the result of a company analysis where practices are analyzed in light of right behavior and wrong behavior. The code of ethics defines right behavior and encourages, or requires, employees to engage in that behavior.
  • 3. Purpose Ideally, a code of workplace ethics would be implemented for the primary purpose of encouraging ethical behavior. However, avoiding lawsuits can also be a driving force behind a code of ethics. A workplace code of ethics delineates behavior that is ethically unacceptable, and many of those unacceptable behaviors are also violations of law.
  • 4. Content A workplace code of ethics can contain a number of areas to help avoid management dilemmas, such as potential conflicts of interest or illegal activities. In some cases, a code of ethics can define proper use of company resources. If a company is very large and has a number of subcontracts, a code of ethics could define the proper relationship between the company and its contractors.
  • 5. For example, if sub-contracting to a company filling a government contract, you are not allowed to buy gifts or buy lunch for employees of the general contractor. This is contractually defined in a code of workplace ethics for government contracts.
  • 6. Legal Issues Most workplace code of ethics specifically prohibits illegal behavior. Theft from a supplier would be a breach of the code of ethics because it is a clear violation of law. Other things sometimes covered in a workplace code of ethics include sexual harassment, racial harassment, discrimination, and issues relating to hostile workplace regulations.
  • 7. Implementation In very large companies, an outside contractor or agency specializing in business ethics may be helpful in developing a code of ethics. Large organizations often have many smaller internal organizations. Those smaller organizations may not be aware of the activities and needs of other internal organizations. An outside company can sometimes see commonalities and potential conflicts between departments, and help to create an effective code of ethics.
  • 8. Workplace and Computer Ethics Abuse Ethics in the workplace is a combination of morality and rules. Ethics involve trust between employees and the employer, and between employees. While technology (specifically computers and Internet access) can be a huge boon to any business, it can also be a major source of ethics abuse, or the temptation for abuse.
  • 9. Appropriate Use The rules of the workplace generally state computers are to be used for work only. While you may have access to the Internet (perhaps because your office's file search function is hosted on an Internet server), that means you shouldn't use your computer for nonwork related functions such as surfing, keeping a private diary or reading Webcomics.
  • 10. Personal Time An ethical question is whether or not you can use company equipment on personal time. For instance, if you're on your lunch break, should you be able to check your personal email account? Your workplace will often have a policy on that. However, if you're not sure, it might be best to talk to your supervisor and put the question forward.
  • 11. Spyware A question of computer ethics and privacy falls onto management in the workplace. Spyware such as keyloggers or other programs that watch what a user is doing on a given computer are common at work. However, does the management have the right to eavesdrop on employees? It creates a breach of trust that employees aren't doing their job without an electronic babysitter, but at the same time, it provides proof that no one is misusing computers while on the job.
  • 12. Authorization Related to privacy issues is a person's authorization to use a computer. For instance, say that you are given your own computer at work, but for some reason, you can't access your computer. Do you use a coworker's computer, or do you wait for your issue to be solved? Also, if your manager is using your computer while you're not present, is that a violation of ethics or simply a convenience for the manager? Questions about whether or not people can only use their own computer should be answered firmly.
  • 13. Doing Harm One of the most blatant violations of computer ethics in the workplace is to use the computer to do harm. This could be done by hacking into another person's computer and deleting important files, by spreading computer viruses through the office network or a variety of other potential options for causing havoc. Intent is a part of doing harm, but even if you cause harm accidentally, you may still be ethically in the wrong.