Chapter 14: Corporate and Individual Accountability: Ethical, Legal, and Social Issues
Chapter 14: Corporate and Individual Accountability: Ethical, Legal, and Social Issues
Definition of Ethics:
Ethics is the set of principles regarding what is right and wrong that individuals utilize to guide their decisions and choices.
Definition of Morals:
Morals are the principles or standards of right and wrong behavior that govern an individual’s or society’s beliefs, values, and actions.
Mnemonic for Differentiation:
"Morals are for Me; Ethics are for Everyone" helps to remember the general difference between morals and ethics.
Ethical Versus Legal (1 of 2)
Definition of Law:
Law is a comprehensive system of rules defining what actions are permissible and impermissible.
Influence of Law on Economic Systems:
Economic systems are shaped by the legal frameworks that exist in society.
Business Legal Frameworks:
The legal frameworks in which businesses operate are created by political systems that establish the laws and regulations.
Conformance:
Legal acts conform to the law, while ethical acts align with individual beliefs about what is right.
It is crucial to note that legality does not imply ethicality; an action can be legal yet unethical.
Ethical Versus Legal (2 of 2)
Figure 14-1:
Illustrates acting ethically versus legally.
Complex Issues:
Laws present complex issues related to equality, fairness, and justice but do not offer a complete ethical guide.
The Trolley Problem
Figure 14-2:
Depicts the Trolley Problem; a classic ethical dilemma illustrating that the correct moral choice may not always be clear.
The Purpose of a Corporation
Commitments for a Virtuous Cycle:
Deliver value to customers.
Invest in employees.
Deal fairly and ethically with suppliers.
Support the communities where they operate.
Generate long-term value for shareholders.
Including Ethical Considerations in Decision Making (1 of 4)
Structured Decision-Making Approach:
Complex ethical dilemmas necessitate a structured decision-making process applying critical thinking skills. Steps include:
Gather information.
Develop a clear problem statement.
Consult with involved parties and appropriate resources.
Identify potential options.
Evaluate those options.
Select an option and implement it.
Review the results.
Including Ethical Considerations in Decision Making (2 of 4)
Figure 14-3:
Shows a detailed decision-making process involving eight steps.
Including Ethical Considerations in Decision Making (3 of 4)
Definition of a Problem Statement:
A problem statement provides a clear and concise description of the issue that needs addressing.
Key Questions for an Effective Problem Statement:
What observations indicate a problem?
Who is directly affected, and is anyone else affected?
Frequency of the issue’s occurrence?
What is the impact and seriousness of the problem?
Urgency of addressing the problem?
What ethical issues are involved?
Including Ethical Considerations in Decision Making (4 of 4)
Figure 14-5:
Depicts various decision-making factors influencing understanding and options available.
Professional Code of Ethics
Definition:
A professional code of ethics articulates the principles and core values a professional organization seeks to cultivate among members and leaders.
Benefits of a Code of Ethics:
Improves ethical decision-making.
Establishes high standards of practice and ethical behavior.
Builds trust and respect with the public.
Serves as a benchmark for evaluation.
Information Systems and Privacy (1 of 2)
Balancing Needs and Rights:
The utilization of information systems in governance and business necessitates balancing user needs with the rights and desires of individuals whose information is utilized.
Impact of Global Marketplace:
There's an increased emphasis on understanding consumer purchasing habits and financial conditions.
Objections to Data Collection:
A significant number of individuals express concern regarding data collection policies.
Solutions for Balancing Privacy:
New laws, technical solutions, and privacy policies are necessary to strike a balance and reclaim control over personal data—including how it is collected, utilized, safeguarded, sold, and disposed of.
Information Systems and Privacy (2 of 2)
Figure 14-6:
Illustrates the diverse sources from which organizations gather data on individuals.
Measures Protecting Personal Data
Fair Information Practices:
This refers to guidelines that govern the collection and utilization of personal data.
General Data Protection Regulation (GDPR):
The GDPR constitutes a framework for data privacy and protection that applies to all entities processing personal data of EU citizens.
California Consumer Privacy Act (CCPA) and Privacy Rights Act (CPRA):
These acts are closely modeled after the GDPR to ensure data protection.
Florida Privacy Prevention Act (FPPA):
This legislation prohibits data sales involving individuals under the age of 16.
Data Protection Categories (1 of 3)
Federal Laws on Data Privacy:
These laws can be classified into topics such as financial data, health information, and children’s personal data.
Data Protection Categories (2 of 3)
Financial Data Regulations:
Fair Credit Reporting Act (FCRA).
Right to Financial Privacy Act (RFPA).
Fair and Accurate Credit Transactions Act (FACTA).
Health Information Regulations:
Health Insurance Portability and Accountability Act (HIPAA).
Health Information Technology for Economic and Clinical Health Act (HITECH).
Data Protection Categories (3 of 3)
Children’s Personal Data Regulations:
Family Educational Rights and Privacy Act (FERPA).
Children’s Online Privacy Protection Act (COPPA).
Website Privacy Policy
Better Business Bureau Recommendations:
A privacy notice should include:
Notice: What personal information is being collected.
Choice: Options available to customers regarding data collection and usage.
Access: How customers can review their collected data.
Security: Measures for data storage and protection.
Redress: Steps customers can take if privacy policy provisions are violated.
Individual Efforts to Protect Privacy
Steps to Safeguard Personal Privacy:
Discover what personal information is stored about you in existing databases.
Exercise caution when sharing personal information.
Actively take measures to secure your privacy.
Be vigilant when purchasing online.
Data Collection Standards (1 of 3)
Surveillance Capitalism:
This term describes the practice of corporations profiting from collecting personal data from online activities.
Data Brokers:
Companies that assemble profiles on individuals from aggregated data across multiple sources.
Business Practices for Data Handling:
Implement privacy-by-design practices.
Rigorously comply with data privacy laws.
Default to opting out of other data collections.
Data Collection Standards (2 of 3)
Additional Data Handling Practices:
Maintain transparency about data collection.
Collect only necessary data.
Use collected data solely for its intended purpose.
Encrypt Personally Identifiable Information (PII).
Limit access to sensitive data.
Notify users promptly of data breaches.
Retain data only as long as necessary for its purpose.
Data Collection Standards (3 of 3)
Remaining Practices for Effective Data Handling:
When sharing data with third parties, ensure you understand and validate their privacy policies.
Securely dispose of data and backups when no longer required.
Continuously train employees on proper data handling procedures.
Regularly audit data collection, storage, handling, and destruction practices.
Knowledge Check Activity 14-1
Question:
___ are companies that create profiles on people based on aggregated data from multiple sources including arrest records, business directories, social media networks, and product registrations.
Options:
a. Data providers
b. Data brokers
c. Data analysts
d. Data administrators
Answer:
b. Data brokers
Information Systems and Surveillance
Fourth Amendment Text:
"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated…"
Legal Rulings:
Courts have established that without a reasonable expectation of privacy, there is no privacy right.
Government Surveillance (1 of 2)
Authorized U.S. Government Surveillance Agencies:
Bureau of Alcohol, Tobacco, and Firearms, CIA, Department of Treasury, Department of Homeland Security, Drug Enforcement Agency, FBI.
Government Surveillance (2 of 2)
Surveillance-Enabling Laws:
Foreign Intelligence Surveillance Act (FISA): Allows federal intelligence agencies to seek warrants.
US PATRIOT Act: Expanded use of National Security Letters (NSL), allowing federal agencies to issue information requests.
Corporate and Private Surveillance (1 of 3)
Video Doorbell Policies:
Ring altered their policy in 2023, requiring a warrant for police to access data unless in emergencies.
Automated License Plate Readers (ALPRs):
Capture license plate images using optical character recognition (OCR) technology.
California imposes restrictions on sharing and retaining ALPR data.
Corporate and Private Surveillance (2 of 3)
Figure 14-8:
Visual representation of ALPR technology, which captures license plates with timestamps and location data.
Corporate and Private Surveillance (3 of 3)
Cellular Location Tracking:
Cell service providers maintain records of device connections, which can be subpoenaed.
Additional Personal Data Collection Devices:
Personal fitness trackers, vehicle performance trackers, home security cameras.
Privacy by Design
Core Principles of Privacy by Design:
Proactive, not reactive.
Privacy as the default setting.
Privacy embedded into design.
Full functionality.
End-to-end security.
Visibility and transparency.
Respect for user privacy.
Information Systems and Freedom of Expression
Ethical Decisions:
Individuals must often navigate ethical decisions concerning internet freedoms and the power it entails.
Organizational and Government Policy Aims:
Policies seek to protect interests while guiding user behavior.
Corporations often limit non-business use of IT resources to ensure productivity and minimize legal liability.
Measures Protecting Freedom of Speech
Importance of Freedom of Expression:
It is a fundamental right in democratic societies, encompassing various forms such as nonverbal, visual, and symbolic expression.
Anonymous expression allows opinions to be shared without fear of repercussion, yet it can be misused.
Internet Censorship (1 of 6)
Definition of Internet Censorship:
Control or suppression of information publishing and access on the internet, including blocking content and intimidating authors.
Web Hosting Services:
Can face claims requiring prompt removal of content for alleged defamation or copyright infringement.
Internet Censorship (2 of 6)
Figure 14-11:
Illustrates internet censorship and content suppression actions.
Internet Censorship (3 of 6)
Communications Decency Act (CDA):
Intended to protect children from inappropriate online content; parts ruled unconstitutional due to vague language.
Internet Filters:
Software tools that restrict access to objectionable material.
Children’s Internet Protection Act (CIPA):
Mandates technological protections for federally funded schools and libraries against obscene material.
Internet Censorship (4 of 6)
Definition of Defamation:
Making false statements about an individual causing harm, often prompting lawsuits aimed at censoring speech.
Hate Speech:
Harassment directed toward individuals based on protected class status, which ISPs may remove in accordance with standards.
Internet Censorship (5 of 6)
Censorship of Internet Pornography:
Federal laws target child pornography possession and distribution, enforceable via significant penalties.
Internet Censorship (6 of 6)
Definition of Fake News:
False information presented misleadingly as factual news.
Strategies for Creating Fake News:
Making unfounded claims, omitting critical information, withholding facts, partial accounts, and misleading corrections.
Ethical Issues in Developing Quality Information Systems
Characteristics of High-Quality Information Systems:
Systems must be reliable, efficient, user-centered, secure, maintainable, scalable, and compliant with laws.
Definition of Software Defect:
Any error leading to system failure or security vulnerabilities.
Developer Ethical Dilemmas:
Developers must decide on investment ratios in ensuring the development of high-quality systems.
Safety-Critical Systems (1 of 2)
Definition of Safety-Critical Systems:
Systems whose failure can result in injury or death.
Necessity of Extreme Measures:
Essential to identify and mitigate defects starting from early design phases to prevent catastrophic failures.
Safety-Critical Systems (2 of 2)
Developer Responsibilities:
Assess cost versus safety in design, determine when sufficient testing is adequate, and ensure rigorous scrutiny throughout.
Whistleblower Definition:
Individuals reporting unethical or illegal actions, acting as safeguards against misconduct in organizations.
Knowledge Check Activity 14-2
Question:
Systems that perform reliably, meet user needs effectively, and comply with regulations are referred to as:
a. Standard information systems
b. High-quality information systems
c. Defective information systems
d. Expensive information systems
Answer:
b. High-quality information systems.
Self Assessment
Be familiar with the differences between ethics and morals.
Understand the relationship between ethics and laws.
Differentiate between harmful and distasteful speech.
Summary
Now that the lesson has concluded, you should be able to:
Differentiate between morals, ethics, and laws.
Describe steps for customer data protection.
Distinguish between government and corporate surveillance.
Explain measures for protecting freedom of expression.
Define high-quality information systems and safety-critical systems.