This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Remember the public shaming – and heavy sentences — heaped on Enron and Worldcom for their accounting (and more importantly, ethical) failures? But a relatively unknown, unbranded intellectualproperty company – with far less to lose – might be much more aggressive in minimizing taxes.
The company last entered China in 2006 with a censored search engine, but pulled the plug on the operation four years later after it discovered that human-rights activists’ Gmail accounts had been hacked. Intellectualproperty theft. The ethical case for resisting Chinese regulation is clear.
These issues include legislation, regulation, litigation, enforcement, investigations, geopolitical risk, demands for ethical actions, and public criticism, affecting all the functions of the corporation in their interaction with all levels of global governments (central, regional, local).
The answers to these and hundreds of other questions should be documented and considered integra l to the operations of all organizations, especially in industries where work product and client data are highly sensitive, and highly valuable. Is it acceptable to use your family computer to access your firm’s work product?
The consultant, subsequently, spent hours of (unpaid) time writing the proposal, which they emailed, and, in the process of creating ‘credibility’ gave away their time and their intellectualproperty with no expectation of reciprocity, i.e., paying consulting engagement, from the possible client. This is for your protection.”
Kalanick and other top executives signal by example what is and is not acceptable behavior, and they are clearly responsible for the company’s ethically and legally questionable decisions and practices. These have certainly contributed to the company’s problems, and his resignation is probably appropriate.
Who should be involved in decisions regarding business impact, regulatory compliance, technical approach, and even ethical values when companies integrate machine learning into business operations? Often, the reason given is to protect intellectualproperty or prevent a security breach.
And you can opt for strategies going forward that depend less on keeping information secret — that depend, perhaps, on difficult-to-imitate operational or sales capabilities, rather than trade secrets. Partly this is an operational capability — how do you quickly shut down avenues through which information is escaping?
Most of us operate in the 1:1 client service only world. We can unzip the intellectualproperty we use in our 1:1 world and create valuable courses, toolkits, webinars, etc. It’s not a question of your work ethic. . – We can deliver BVFLS products using leverage to get more time, money, and freedom.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content