Shared Practice Why It Is Important to Have a Code of Conduct Part II

SHARED PRACTICE: WHY IT IS IMPORTANT TO HAVE A OF CONDUCT PART II Response to DANIELLE WHITE The of conduct you shared, though not very directly the same as the ones I shared have helped in enlightening my thought about the relevance of code of conduct and how these may be used in solving everyday problems found within the organization. For example with the code of conduct on the restriction on the use of system access within the organization, I am very confident this will help in protecting the privacy status of the organization and people within the organization (Ashford, 2013). This is a very crucial thing to achieve because when information from the organization gets into wrong hands, it can be used against the organization in the long run (Brooks, 2010). In a very specific example, my research has showed organizations where it is totally impossible to launch into some aspects of system access from any company IT platform.
References
Ashford, W. (2013). Putting security in context. Computer Weekly, 17–20.
Brooks, R. (2010). The development of a code of ethics: An online classroom approach to making connections between ethical foundation and the challenges presented by information technology. American Journal of Business Education, 3(10), 1–13.
Response to JOHN PEREZ
I really share in the position you have taken about the role of code of conduct in ensuring that things are done in a more orderly and even manner (Ashford, 2013). This is indeed something that I also made mention of in my post. From the examples of code of conduct you gave also, I am fully convinced that it is important in protecting the information of the organization. This has to do with taking organizational work home and completing it with one’s personal computer. This is certainly an unacceptable situation, which can expose the company’s vital information to the public. As I indicated in my post, there are instances where insider threat could harm the organization (De George, 2000). It is therefore important that there will be such code of conduct to protect such negative acts of insider threat.
References
Ashford, W. (2013). Putting security in context. Computer Weekly, 17–20.
De George, R. T. (2000). Business ethics and the challenge of the information age. Business Ethics Quarterly, 10(1), 63–72.