Since the web is hinged on the collection of information It Is a real threat to privacy. Information is shared online daily but often the designated receiver Is not the only receiver of that shared Information. In BIB situations everything from employee records and payroll to customer accounts and payments can be handled online which makes it subject to interception which could potentially lead to numerous problems. Within the business setting, emails containing private information are also potential problems in two unique ways.
When employees send personal information and receive personal information in email, there Is a possibility that some of the content may be less than professional in tauter. Another potential problem Is that the email could be sent to the wrong recipient within the company or without. Security is another area of concern. In home based e-businesses computers and files need to be properly stored and locked. In the event of any home burglary or ethically-challenged house guests, mechanisms need to be in place to guard and protect electronically stored information and files.
The problem with setting policies on ethics In Web based businesses Is that the standards are unclear. There Is a relatively short track record to use as a model and even that is too inconsistent because the technological advancements are so dynamic that they keep evolving. Once some procedure or rule had been set, it quickly becomes obsolete when the potential threat becomes even bigger. There use to be only viruses to contend with, but now there are worms and spam too. Some of the policies already In place have been set forth from government regulations.
In his book, Ethics and the Conduct of Business, John Bethought states that there are principles that are set by the Federal Trade coronals (FTC) that choc the numerous documents of privacy on the Internet which is a large part of the World Wide Web (2007). “The five principles representative of the many documents on Internet privacy are: 1. Notice/Awareness. Disclose the identity of the collecting party, the information collected, the means for collecting it, and the uses to which the information will be put 2.
Chloe/Consent. Provide a mechanism for choosing whether to allow Information to be collected. 3. Access/Proclamation. Allow consumers access to the information collected about them and the opportunity to enters the accuracy or completeness of the data. 4. Integrity/Security. Inform users of the steps taken to protect against the alteration, misappropriation, or destruction of data and of the action that will be taken in the event of a breach of security. . Enforcement/Redress. Assure consumers that the company follows responsible Information practices and that there are consequences for falling to do so. Reach encompasses many and crosses many borders so with that in mind a universal set of directives would never be possible. With that in mind certain policies are adhered to within specific industries. Consequently, things that might be deemed UN-ethical in one arena might be acceptable in another.
Some e-commerce sites require consumers to read and accept certain terms before they officially enter while others don’t necessitate an acceptance until a purchase is actually being made. Rules need to be enforced or regulated to ensure they are being followed. For some penalty and punishment are the best motivators. Keeping all of the a fore mentioned things in mind, the Web environment requires a stringent set of ethical policies and procedures that should protect the business as well as the customer.