Ethical And Social Issues On Information Systems Information Technology Essay

An economy which tends to favor a do-more-with-less business faces more difficulty in managing Information Systems. However, with the introduction and rising popularity of extraordinary innovations such as cloud computing, IT professionals and business are beginning to be familiar with the value of comprehensive information management strategies which are more reliable, secure and cost-effective. The real challenge for them is to understand what’s available and how best they can take advantage for maximum business benefit. Information management is becoming highly vital element for organizations of all types and sizes. Moreover, it reduces the amount of time and money required for those types of services.

IBM has launched Information System Archive which is considered to be the next-generation information retention solution which is designed as a universal archiving storehouse for all types of content to help midsize and enterprise clients reduce cost, manage risk and address a complete set of information retention needs – business, legal, or regulatory. This type of flexible, smart Business Information System are considered to be valuable asset for the businesses who need to meet regulatory compliance mandates which govern the maintenance of information assets in non-erasable, non-rewriteable formats. At the same time it should preserve data in an environment that allow quick search and retrieval when required.

Moral, Ethical and Professional issues faced by managers of information systems in IBM:

Work environment

IBM maintains a healthy, safe and productive work environment which is completely avoid discrimination or harassment based on color, gender, race, religion, sexual orientation, nation genetics, nation origin disability, age, or other factors which are not related to IBM’s lawful business interests. Employees, who are engaged in discrimination or harassment, or have misused their positions of authority, will be subject to disciplinary measures, including dismissal.

Employee privacy

IBM collects and maintains personal information which relates to employment, including medical, compensation, and benefit information. IBM is an organization with management structures, business processes, and technical systems which cross country borders to run its business.

Protecting IBM’s assets

IBM has got an outsized range of assets. Many of those assets are of great value to IBM’s success and competitiveness. It includes physical assets and extremely valuable proprietary information, like IBM’s IBM confidential information and intellectual property.

It is very different to protect all of these assets. The future of IBM is dependent on these assets.Their losses, theft or misuse jeopardizes the future of IBM.

The company should be alert to any situations or incidents which could lead to the losses, theft or misuse of company property.

IBM information and communication systems

IBM’s information and communication systems, includes IBM connections to the Internet, which are very important to IBM’s business. IBM takes all necessary measures to protect the unauthorized use of its internet connections. Use of internet connection which interferes the productivity is not entertained in IBM. If the employees make personal use of internet, the systems manager has the authority to block the particular site from server.

IBM proprietary information

Any information which is owned by IBM is IBM proprietary information which includes information in IBM databases. IBM proprietary information is purely secret. These information’s are subject to copyright, patent or other intellectual property or legal rights. IBM proprietary information includes: IBM’s scientific or technical information relating to current and future products, services or research, earnings and other financial data, business or marketing plans or projections, personnel information including executive, software or source code form and organizational changes.

Read also  The Emerging Issues In Information Technology Information Technology Essay

IBM would be offended by unauthorized disclosures of its proprietary information to, or the unauthorized use of that information. For example, unauthorized disclosure of an unannounced IBM product can hurt IBM by giving competitors more time to match the product. Unauthorized disclosure of a proposed or an unannounced executive or organizational change can adversely affect employee morale and can interfere with IBM’s future plans.

IBM Intellectual Property rights

The intellectual property includes such things as ideas, inventions, computer programs and documents which relate to IBM’s actual or anticipated business, research or development, work or tasks employees perform on behalf of IBM.

Conducting IBM’s business

IBM conducts the business in ethical and lawful manner whether it is dealing with selling, buying or representing IBM in any other capacity.

At present, IBM is engaged in a variety of business relationships with other organizations, and companies including authorized business partners, original equipment manufacturers and alliance companies. No matter what type of organization IBM is dealing with, general standards are followed in any case.

Avoiding misrepresentation

IBM never makes misrepresentations or dishonest statements with anyone. IBM takes all initiatives to avoid the misunderstandings between the employees. Honesty based on clear communication is integral to ethical behavior which is completely adopted in IBM. IBM is constituted of trustworthy employees, which plays an essential role in forming and maintaining sound, lasting relationships.

Dealing with suppliers

IBM decides among their competing suppliers by weighing the facts about the suppliers impartially. While selecting the suppliers, special treatment is not at all entertained in IBM. Decisions regarding the selection of suppliers are based on the evaluation of suppliers. No other malpractice is encouraged in IBM regarding selection of suppliers.

Even to appear to do so can undermine the integrity of IBM’s established procedures. Employees and former employees may not use any of this information outside of IBM without written permission from management. IBM uses a competitive evaluation process to select the best suppliers. Prices and other information’s are submitted by suppliers and IBM’s evaluations of those information’s are confidential to IBM. It is essential that suppliers competing for IBM’s business have confidence in the integrity of IBM’s selection process.

Avoiding reciprocal dealing

IBM completely avoids reciprocal dealing. It is against the IBM policy. It is also unlawful. It means that IBM never tells a prospective supplier that the decision to buy its goods or services is conditioned on the supplier’s agreement to buy IBM products or services.

IBM’s decision to buy goods and services from a supplier is made independently from that supplier’s decision to buy IBM products and services.

Competing in the field

IBM will compete forcefully for business. If circumstances require modified pricing or service terms, the modifications must be specifically approved by the appropriate level of management.IBM never extend any modified services or contract terms to any client without prior authorization.

In performing marketing or service activity, IBM goes vigorously, but also lawful and ethical as well.

Avoiding false and misleading statements about competitors

Read also  Analysis Of Issue Cyber Crime Information Technology Essay

IBM’s policy is to sell products and services on their qualities. False or misleading statements about competitors, their products and services are improper. IBM completely ignores all such activities which invite disrespect from clients and complaints from competitors.

IBM believes that all comparisons to competitors and their products and services are substantiated. They are complete, correct and not ambiguous whenever they are made. Certain countries prohibit comparative advertising.

Selling against competitive orders

It is IBM practice not to market competing IBM products or services to that client until the competitor’s product is installed If a competitor already has a firm order (a legally enforceable contract) from a client for the competitor’s product or service.

Relationships with other organizations

IBM has multiple relationships with other organizations. A few organizations may even be suppliers, competitors, distributors and end users of IBM products. Another organization may be an IBM supplier and client at the same time. A distributor may be both an end user and a competitor. IBM also has relationships with many other types of organizations which continue to emerge in the industry, such as software houses, banks and other financial institutions, maintenance companies, systems integrators leasing companies, original equipment manufacturers, third-party programmers and others who compete with, buy from, or sell to, IBM. In dealings with them, IBM conducts business with them based on the relationships involved, and it acts accordingly.

Acquiring and using information

Acquiring and using information about others

IBM collects information on competitors from a variety of legitimate sources to evaluate the relative merits of its own products, services, and marketing methods. Doing so is a normal business activity and is not unethical in itself. In the normal course of business, it is usual to acquire information about many other organizations, including competitors. In fact, IBM quite properly gathers this kind of information for such purposes as extending credit and evaluating suppliers. This activity is proper and necessary in a competitive system.

Information about other companies should be treated with sensitivity and discretion. Such information is often about individuals. Other companies are rightly concerned about their reputations and the privacy of their people.

No company should use improper means to acquire a competitor’s trade secrets or other confidential information. Illegal practices such as trespassing, burglary, wiretapping, bribery and stealing are obviously wrong; so is attempting to acquire a competitor’s confidential information by hiring the competitor’s employees. There are, however, limits to the ways that information should be acquired and used, especially information about competitors. Improper solicitation or receipt of confidential data from a competitor’s employees or from IBM clients is wrong. IBM never tolerates any form of questionable intelligence-gathering.

Information about other companies and individuals should in the proper context. In presenting such information, IBM discloses the identity of the organization or individuals only if necessary. If specific, identifying information is not necessary, IBM used to present the information in the aggregate or by some other means.

Acquiring and using personal information about individuals

IBM collect, use, process, and disclose an individual’s personal information in accordance with applicable laws, any contractual commitments, and IBM’s privacy policies and guidelines, including IBM’s e-mail guidelines.

IBM remains committed to protect the privacy of personal information of others including their employees, suppliers and clients.

Read also  Management In Civil Engineering

9 Complying with laws

IBM’s policy is to comply with all laws and regulations that apply to its business. As you conduct IBM’s business, you may encounter a variety of legal issues, particularly in the areas described below. If you have questions on specific laws or regulations, contact IBM counsel.

4.9.1 Competition

There are certain laws regarding competitions like:

Companies may not enter into agreements with other companies, including their distributors and remarketers

These laws unreasonably restrict the functioning of the competitive system, such as price fixing or dividing clients or territories

Monopolizing or attempting to monopolize an industry or unlawfully abusing a dominant position is illegal.

IBM does business where laws governing competition exist. Prevention of interference with the functioning of a competitive market system is the main purpose of competition laws, which also may be known as antitrust, monopoly, fair trade or cartel laws. The purpose of such laws is primarily economic. Their effect is often seen as going beyond consumer welfare to protect other values of society, including individual freedoms.

To comply fully with competition laws throughout the world is IBM’s policy. IBM’s adheres business conduct guidelines, by being insightful to legal concerns under competition laws, and it raises any such concerns with IBM counsel.

The environment

Environment protection is one of the main concerns of IBM. IBM is committed to worldwide leadership in environmental protection. IBM complies with all environmental laws, but if there is no law or if the law does not protect the environment, IBM set and adheres to serve standards of their own. The employees of IBM try to comply with environmental laws and IBM’s environmental policies.

If IBM is involved in the processes that affect the environment, such as measuring, recording or reporting discharges and emissions to the environment or handling hazardous wastes, it surely comply with environmental regulations and permits. IBM maintains standards and ensures that reports are accurate and complete.

Employees of IBM play an important role in protecting the environment. If the employees are aware of any violation of environmental law or any action that may appear to conceal such a violation, they should immediately report the matter to your manager or to IBM counsel. IBM has well established group of people who can efficiently manage all activities which are against the environment laws and acts.

Data privacy laws

IBM has established measures to meet privacy-related requirements and expectations everywhere we do business. IBM has uniform practices for collecting, using, disclosing, storing, and accessing, transferring or otherwise processing personal information to enable IBM to handle personal information fairly and appropriately and to reduce the risk of misuse.

Almost all the countries impose legal requirements on companies relating to the manner in which they handle personal information about individuals like their employees, suppliers, customer’s clients etc.

IBM has made its employees aware of, and complies with, data privacy regulations and requirements. Non-compliance or inattention to privacy-related matters can damage IBM’s brand and reputation, impose restrictions on IBM’s operations, cause IBM to be in violation of laws or breach of contract with third parties, and in some countries, cause IBM and its employees to be liable to government fines and criminal penalties.

Order Now

Order Now

Type of Paper
Subject
Deadline
Number of Pages
(275 words)