SlideShare a Scribd company logo
COMPUTER ETHICS
IN THE WORKPLACE
(INDUSTRY)

Reported by: Jackielyn M. Dulce
Code of Ethics in a Workplace
A workplace code of ethics is the
result of a company analysis where
practices are analyzed in light of right
behavior and wrong behavior. The code
of ethics defines right behavior and
encourages, or requires, employees to
engage in that behavior.
Purpose
Ideally, a code of workplace ethics
would be implemented for the primary
purpose of encouraging ethical behavior.
However, avoiding lawsuits can also be a
driving force behind a code of ethics. A
workplace code of ethics delineates
behavior that is ethically unacceptable,
and many of those unacceptable
behaviors are also violations of law.
Content
A workplace code of ethics can
contain a number of areas to help avoid
management dilemmas, such as
potential conflicts of interest or illegal
activities. In some cases, a code of
ethics can define proper use of
company resources. If a company is
very large and has a number of subcontracts, a code of ethics could define
the proper relationship between the
company
and
its
contractors.
For example, if sub-contracting
to a company filling a government
contract, you are not allowed to buy
gifts or buy lunch for employees of the
general
contractor.
This
is
contractually defined in a code of
workplace ethics for government
contracts.
Legal Issues
Most workplace code of ethics
specifically prohibits illegal behavior.
Theft from a supplier would be a breach of
the code of ethics because it is a clear
violation of law. Other things sometimes
covered in a workplace code of ethics
include
sexual
harassment,
racial
harassment, discrimination, and issues
relating to hostile workplace regulations.
Implementation
In very large companies, an outside
contractor or agency specializing in business
ethics may be helpful in developing a code of
ethics. Large organizations often have many
smaller
internal
organizations.
Those
smaller organizations may not be aware of
the activities and needs of other internal
organizations. An outside company can
sometimes see commonalities and potential
conflicts between departments, and help to
create an effective code of ethics.
Workplace and Computer Ethics Abuse

Ethics in the workplace is a
combination of morality and rules.
Ethics involve trust between
employees and the employer, and
between
employees.
While
technology (specifically computers
and Internet access) can be a huge
boon to any business, it can also be
a major source of ethics abuse, or
the temptation for abuse.
Appropriate Use
The rules of the workplace
generally state computers are to be used
for work only. While you may have
access to the Internet (perhaps because
your office's file search function is hosted
on an Internet server), that means you
shouldn't use your computer for nonwork related functions such as surfing,
keeping a private diary or reading
Webcomics.
Personal Time
An ethical question is whether or
not you can use company equipment on
personal time. For instance, if you're on
your lunch break, should you be able to
check your personal email account? Your
workplace will often have a policy on that.
However, if you're not sure, it might be
best to talk to your supervisor and put the
question forward.
Spyware
A question of computer ethics and
privacy falls onto management in the
workplace. Spyware such as keyloggers or
other programs that watch what a user is
doing on a given computer are common at
work. However, does the management have
the right to eavesdrop on employees? It
creates a breach of trust that employees
aren't doing their job without an electronic
babysitter, but at the same time, it provides
proof that no one is misusing computers while
on the job.
Authorization
Related to privacy issues is a person's
authorization to use a computer. For instance,
say that you are given your own computer at
work, but for some reason, you can't access
your computer. Do you use a coworker's
computer, or do you wait for your issue to be
solved? Also, if your manager is using your
computer while you're not present, is that a
violation of ethics or simply a convenience for
the manager? Questions about whether or not
people can only use their own computer should
be answered firmly.
Doing Harm
One of the most blatant violations of
computer ethics in the workplace is to use
the computer to do harm. This could be done
by hacking into another person's computer
and deleting important files, by spreading
computer viruses through the office network
or a variety of other potential options for
causing havoc. Intent is a part of doing harm,
but even if you cause harm accidentally, you
may still be ethically in the wrong.

More Related Content

What's hot

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Sahil Vashishtha
 
مبادئ الإنترنت
مبادئ الإنترنتمبادئ الإنترنت
مبادئ الإنترنتAhmed Osama
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
Siemplify
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
Gracy Joseph
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Faraz Ahmed
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
Aglaia Connect
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
Chitra Mudunuru
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
Alexander Zhuravlev
 
Cyber crime
Cyber crimeCyber crime
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
Ayush Upadhyay
 
Cyber security
Cyber securityCyber security
Cyber security
Sajid Hasan
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
Lakshan Bamunusinghe
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
Shreeraj Nair
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
Alomgir Hossain
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
Muhammad Haroon
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
glorysunny
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
Georgekutty Francis
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
samina khan
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
iallen
 
Ci prog tolgoi file хичээл 2
Ci prog tolgoi file хичээл 2Ci prog tolgoi file хичээл 2
Ci prog tolgoi file хичээл 2
Urantuya Purevtseren
 

What's hot (20)

CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
مبادئ الإنترنت
مبادئ الإنترنتمبادئ الإنترنت
مبادئ الإنترنت
 
Cyber Security Vulnerabilities
Cyber Security VulnerabilitiesCyber Security Vulnerabilities
Cyber Security Vulnerabilities
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Computer ethics
Computer ethics Computer ethics
Computer ethics
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
presentation on hacking
presentation on hackingpresentation on hacking
presentation on hacking
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
cyber ethics
 cyber ethics cyber ethics
cyber ethics
 
ACM code of ethics
ACM code of ethicsACM code of ethics
ACM code of ethics
 
computer ethics.pptx
computer ethics.pptxcomputer ethics.pptx
computer ethics.pptx
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Computer security & ethics
Computer security  & ethicsComputer security  & ethics
Computer security & ethics
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Ci prog tolgoi file хичээл 2
Ci prog tolgoi file хичээл 2Ci prog tolgoi file хичээл 2
Ci prog tolgoi file хичээл 2
 

Viewers also liked

Computers and the workplace
Computers and the workplaceComputers and the workplace
Computers and the workplace
kmodasia
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
Jagan Nath
 
Workplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint PresentationWorkplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint Presentation
Andrew Schwartz
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
Ramki M
 
Code of ethics industry
Code of ethics   industryCode of ethics   industry
Code of ethics industry
Nicole Joy Juliane
 
Bullying in the Workplace, by Loraleigh Keashly
Bullying in the Workplace, by Loraleigh KeashlyBullying in the Workplace, by Loraleigh Keashly
Bullying in the Workplace, by Loraleigh Keashly
University of Michigan Taubman Health Sciences Library
 
Women empowerment
Women empowerment Women empowerment
Lesson 10
Lesson 10Lesson 10
Lesson 10
yesandfox
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
Bhanja Kishor Samudra
 
Personal professional code of ethics
Personal professional code of ethicsPersonal professional code of ethics
Personal professional code of ethics
Toby P. Newstead
 
Quadrennial REALTOR® Ethics Training Powerpoint
Quadrennial REALTOR® Ethics Training PowerpointQuadrennial REALTOR® Ethics Training Powerpoint
Quadrennial REALTOR® Ethics Training Powerpoint
JessKern
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
lsanford84
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
Junaid Qadir
 
Workplace Ethics
Workplace EthicsWorkplace Ethics
Workplace Ethics
aleathia
 
Professional ethical conduct
Professional ethical conductProfessional ethical conduct
Professional ethical conduct
Moatasem Mabrouk
 
Ethics
EthicsEthics
Ethics
Roy Lunsford
 
Module 4 Spirituality Slides
Module 4   Spirituality SlidesModule 4   Spirituality Slides
Module 4 Spirituality Slides
guest7fd03f
 
Workplace ethics
Workplace ethicsWorkplace ethics
Workplace ethics
Dinesh Mani
 
Ethics and professionalism
Ethics and professionalismEthics and professionalism
Ethics and professionalism
Uc Man
 
Ethic and professionalism
Ethic and professionalismEthic and professionalism
Ethic and professionalism
Adra Suhartini
 

Viewers also liked (20)

Computers and the workplace
Computers and the workplaceComputers and the workplace
Computers and the workplace
 
Computer ethics
Computer ethicsComputer ethics
Computer ethics
 
Workplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint PresentationWorkplace Ethics PowerPoint Presentation
Workplace Ethics PowerPoint Presentation
 
Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Code of ethics industry
Code of ethics   industryCode of ethics   industry
Code of ethics industry
 
Bullying in the Workplace, by Loraleigh Keashly
Bullying in the Workplace, by Loraleigh KeashlyBullying in the Workplace, by Loraleigh Keashly
Bullying in the Workplace, by Loraleigh Keashly
 
Women empowerment
Women empowerment Women empowerment
Women empowerment
 
Lesson 10
Lesson 10Lesson 10
Lesson 10
 
Ethics for it professionals and it users
Ethics for it professionals and it usersEthics for it professionals and it users
Ethics for it professionals and it users
 
Personal professional code of ethics
Personal professional code of ethicsPersonal professional code of ethics
Personal professional code of ethics
 
Quadrennial REALTOR® Ethics Training Powerpoint
Quadrennial REALTOR® Ethics Training PowerpointQuadrennial REALTOR® Ethics Training Powerpoint
Quadrennial REALTOR® Ethics Training Powerpoint
 
Ten commandments
Ten commandmentsTen commandments
Ten commandments
 
ICT code of ethics
ICT code of ethicsICT code of ethics
ICT code of ethics
 
Workplace Ethics
Workplace EthicsWorkplace Ethics
Workplace Ethics
 
Professional ethical conduct
Professional ethical conductProfessional ethical conduct
Professional ethical conduct
 
Ethics
EthicsEthics
Ethics
 
Module 4 Spirituality Slides
Module 4   Spirituality SlidesModule 4   Spirituality Slides
Module 4 Spirituality Slides
 
Workplace ethics
Workplace ethicsWorkplace ethics
Workplace ethics
 
Ethics and professionalism
Ethics and professionalismEthics and professionalism
Ethics and professionalism
 
Ethic and professionalism
Ethic and professionalismEthic and professionalism
Ethic and professionalism
 

Similar to Computer ethics in the workplace (industry)

Liabilty
LiabiltyLiabilty
Liabilty
Laura Breese
 
AssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxAssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docx
normanibarber20063
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
susanschei
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
Matthew Charles
 
Group assignment 2
Group assignment 2Group assignment 2
Group assignment 2
Farah Azudin
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
ambersalomon88660
 
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docxBUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
humphrieskalyn
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
sajida zafar
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
aryan532920
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?
Human Resources & Payroll
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
adabotor7
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
Melvin DCruz
 
Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
SikanderAnsari4
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
Eyelean xilef
 
Employment
EmploymentEmployment
Employment
ZenaTaha
 
The Role of Business Ethics in Employee Engagement Novembe.docx
The Role of Business Ethics in Employee Engagement Novembe.docxThe Role of Business Ethics in Employee Engagement Novembe.docx
The Role of Business Ethics in Employee Engagement Novembe.docx
oreo10
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
guest65a1c4
 
Gr 3 ethical implication of it
Gr 3   ethical implication of itGr 3   ethical implication of it
Gr 3 ethical implication of it
university of education,Lahore
 
Ethical Implications of IT
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
university of education,Lahore
 
Response 1A code of    conduct is a guide that a company uses.docx
Response 1A code of    conduct is a guide that a company uses.docxResponse 1A code of    conduct is a guide that a company uses.docx
Response 1A code of    conduct is a guide that a company uses.docx
carlstromcurtis
 

Similar to Computer ethics in the workplace (industry) (20)

Liabilty
LiabiltyLiabilty
Liabilty
 
AssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docxAssignmentRespond to two or more of your classmates in one or m.docx
AssignmentRespond to two or more of your classmates in one or m.docx
 
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docxRunning head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
Running head EMPLOYEE USE OF INTERNET AT WORK POLICY PROPOSALS.docx
 
Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)Internet Policy Final Project (Group 6)
Internet Policy Final Project (Group 6)
 
Group assignment 2
Group assignment 2Group assignment 2
Group assignment 2
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docxBUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
 
Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9Computer ethics-presentation-1221139444034074-9
Computer ethics-presentation-1221139444034074-9
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?Can You Monitor Your Employees’ Communications?
Can You Monitor Your Employees’ Communications?
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
Corporate ethics
Corporate ethicsCorporate ethics
Corporate ethics
 
Ethics in IT.pptx
Ethics in IT.pptxEthics in IT.pptx
Ethics in IT.pptx
 
Codes of ethics
Codes of ethicsCodes of ethics
Codes of ethics
 
Employment
EmploymentEmployment
Employment
 
The Role of Business Ethics in Employee Engagement Novembe.docx
The Role of Business Ethics in Employee Engagement Novembe.docxThe Role of Business Ethics in Employee Engagement Novembe.docx
The Role of Business Ethics in Employee Engagement Novembe.docx
 
Computer Ethics Presentation
Computer Ethics PresentationComputer Ethics Presentation
Computer Ethics Presentation
 
Gr 3 ethical implication of it
Gr 3   ethical implication of itGr 3   ethical implication of it
Gr 3 ethical implication of it
 
Ethical Implications of IT
Ethical Implications of ITEthical Implications of IT
Ethical Implications of IT
 
Response 1A code of    conduct is a guide that a company uses.docx
Response 1A code of    conduct is a guide that a company uses.docxResponse 1A code of    conduct is a guide that a company uses.docx
Response 1A code of    conduct is a guide that a company uses.docx
 

Recently uploaded

Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
Chevonnese Chevers Whyte, MBA, B.Sc.
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
haiqairshad
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 

Recently uploaded (20)

Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Constructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective CommunicationConstructing Your Course Container for Effective Communication
Constructing Your Course Container for Effective Communication
 
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skillsspot a liar (Haiqa 146).pptx Technical writhing and presentation skills
spot a liar (Haiqa 146).pptx Technical writhing and presentation skills
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 

Computer ethics in the workplace (industry)

  • 1. COMPUTER ETHICS IN THE WORKPLACE (INDUSTRY) Reported by: Jackielyn M. Dulce
  • 2. Code of Ethics in a Workplace A workplace code of ethics is the result of a company analysis where practices are analyzed in light of right behavior and wrong behavior. The code of ethics defines right behavior and encourages, or requires, employees to engage in that behavior.
  • 3. Purpose Ideally, a code of workplace ethics would be implemented for the primary purpose of encouraging ethical behavior. However, avoiding lawsuits can also be a driving force behind a code of ethics. A workplace code of ethics delineates behavior that is ethically unacceptable, and many of those unacceptable behaviors are also violations of law.
  • 4. Content A workplace code of ethics can contain a number of areas to help avoid management dilemmas, such as potential conflicts of interest or illegal activities. In some cases, a code of ethics can define proper use of company resources. If a company is very large and has a number of subcontracts, a code of ethics could define the proper relationship between the company and its contractors.
  • 5. For example, if sub-contracting to a company filling a government contract, you are not allowed to buy gifts or buy lunch for employees of the general contractor. This is contractually defined in a code of workplace ethics for government contracts.
  • 6. Legal Issues Most workplace code of ethics specifically prohibits illegal behavior. Theft from a supplier would be a breach of the code of ethics because it is a clear violation of law. Other things sometimes covered in a workplace code of ethics include sexual harassment, racial harassment, discrimination, and issues relating to hostile workplace regulations.
  • 7. Implementation In very large companies, an outside contractor or agency specializing in business ethics may be helpful in developing a code of ethics. Large organizations often have many smaller internal organizations. Those smaller organizations may not be aware of the activities and needs of other internal organizations. An outside company can sometimes see commonalities and potential conflicts between departments, and help to create an effective code of ethics.
  • 8. Workplace and Computer Ethics Abuse Ethics in the workplace is a combination of morality and rules. Ethics involve trust between employees and the employer, and between employees. While technology (specifically computers and Internet access) can be a huge boon to any business, it can also be a major source of ethics abuse, or the temptation for abuse.
  • 9. Appropriate Use The rules of the workplace generally state computers are to be used for work only. While you may have access to the Internet (perhaps because your office's file search function is hosted on an Internet server), that means you shouldn't use your computer for nonwork related functions such as surfing, keeping a private diary or reading Webcomics.
  • 10. Personal Time An ethical question is whether or not you can use company equipment on personal time. For instance, if you're on your lunch break, should you be able to check your personal email account? Your workplace will often have a policy on that. However, if you're not sure, it might be best to talk to your supervisor and put the question forward.
  • 11. Spyware A question of computer ethics and privacy falls onto management in the workplace. Spyware such as keyloggers or other programs that watch what a user is doing on a given computer are common at work. However, does the management have the right to eavesdrop on employees? It creates a breach of trust that employees aren't doing their job without an electronic babysitter, but at the same time, it provides proof that no one is misusing computers while on the job.
  • 12. Authorization Related to privacy issues is a person's authorization to use a computer. For instance, say that you are given your own computer at work, but for some reason, you can't access your computer. Do you use a coworker's computer, or do you wait for your issue to be solved? Also, if your manager is using your computer while you're not present, is that a violation of ethics or simply a convenience for the manager? Questions about whether or not people can only use their own computer should be answered firmly.
  • 13. Doing Harm One of the most blatant violations of computer ethics in the workplace is to use the computer to do harm. This could be done by hacking into another person's computer and deleting important files, by spreading computer viruses through the office network or a variety of other potential options for causing havoc. Intent is a part of doing harm, but even if you cause harm accidentally, you may still be ethically in the wrong.