Ethics in Competitive Intelligence - YouTube

Channel: unknown

[10]
hello class of adm 3316 my name is Marysia and in聽 today's presentation my team and i will discuss聽聽
[16]
ethics when it comes to competitive intelligence聽 the agenda for the presentation will go as follows聽聽
[23]
first vanessa and mitchell will discuss聽 different methods of ethical data collection聽聽
[27]
then lauren and rakhi will go into the different聽 laws that govern competitive intelligence and聽聽
[32]
finally i will talk about the privacy and聽 security considerations when it comes to ci
[38]
so to start off we will discuss聽 ethical methods of data collection聽聽
[42]
as far as data collection is concerned there are聽 many extremely valuable sources of data available聽聽
[47]
to ci professionals this includes interviews聽 surveys focus groups online secondary research聽聽
[53]
web scraping online databases and much more聽 however the extensive collection and use of data聽聽
[59]
in our modern world can cause ethical dilemmas聽 particularly when it comes to protecting sensitive聽聽
[64]
or confidential information from individuals and聽 organizations therefore when using these data聽聽
[70]
sources it is important for ci professionals聽 to ensure that data is being collected and聽聽
[74]
used in an ethical manner it should be聽 noted though that most data collection聽聽
[77]
methods themselves are not unethical and under the聽 right conditions most data collection techniques聽聽
[83]
will yield great results without causing any聽 kind of harm however it is the kind it is the聽聽
[87]
way that these data collection techniques are聽 actually used which can cause ethical issues
[95]
yes in order to ensure ethical data collection we聽 created a list of data collection do's and do not聽聽
[100]
that ci agents can apply ethical principles to聽 data collection regardless of technique that is聽聽
[106]
being used so to begin with the dues do explicitly聽 explain who you are what your organization聽聽
[111]
represents and the reason why you're collecting聽 data this allows those who are providing you with聽聽
[115]
data or information to determine whether it's聽 in their best interest to participate do you聽聽
[119]
obtain full content from individuals sharing聽 information with you it is important that you聽聽
[123]
do not use information that you collected prior to聽 obtaining consent from the source otherwise you'll聽聽
[128]
be misrepresenting the facts do understand the聽 potential harm stemming from the collection and聽聽
[132]
use of the data asking questions such as who聽 will have access to this data and could this聽聽
[137]
data be interpreted and used in ways that other聽 than what i communicated with the source can help聽聽
[142]
identify the potential harm and risk and prevent聽 them do take necessary precautions to remove bias聽聽
[148]
from data collection and analysis as this could聽 lead to misleading results for example biases聽聽
[153]
can be removed from data collection by avoiding聽 by search engine settings and preferences asking聽聽
[157]
clear questions and ensuring that the population聽 type and the size used for data collection are聽聽
[162]
appropriate that do not include do not include聽 personal identifiers and data collection if聽聽
[167]
unnecessary before using personal identifiers and聽 data collection stop and ask yourself do i really聽聽
[172]
need to add personal identifiers in my data do聽 personal identifiers add any value to my data do i聽聽
[178]
need to follow up with the respondents if personal聽 identifiers aren't necessary based on these聽聽
[183]
questions you should most likely omit them from聽 your results do not store sensitive information聽聽
[190]
include in locations that are publicly accessible聽 or easily compromised these this includes聽聽
[195]
information that can be considered sensitive聽 by either an individual or an organization聽聽
[200]
do not accept information that was collected聽 or shared with you through unethical means for聽聽
[204]
example if an individual from a competing company聽 came to you with valuable internal information聽聽
[208]
you should refuse it as the company did not聽 provide you with the permission or access to this聽聽
[212]
information do not attempt to deceive informants聽 or hide what you or your company will be using聽聽
[217]
the data for it this leads to misleading results聽 for you and loss of faith from the participants
[227]
we'll now move on to some of the laws that govern聽 competitive intelligence so when discussing the聽聽
[233]
laws that govern competitive intelligence one聽 first needs to differentiate between competitive聽聽
[237]
intelligence and espionage one of which is an聽 illegal activity and the other of which is legal聽聽
[242]
so competitive intelligence refers to the聽 gathering analyzing and use of information聽聽
[246]
collected on stakeholders such as competitors聽 and customers as well as other market factors聽聽
[251]
that contribute to a business's competitive聽 advantage in contrast espionage refers to聽聽
[256]
the illegal and unethical theft of business trade聽 secrets so an example of competitive intelligence聽聽
[261]
might be conducting research at a trade show聽 while on the other hand an example of espionage聽聽
[266]
might be trespassing on a competitor's property聽 or snooping through someone's compute computer聽聽
[272]
um so next now that you know what espionage聽 is and that it's illegal you might wonder聽聽
[275]
what are some of the laws related to governing聽 espionage so espionage relates to trade secrets聽聽
[280]
which are a form of intellectual property and聽 lauren will be going more into this shortly聽聽
[285]
unlike the united states which has both federal聽 and state trade legislation in canada trade聽聽
[290]
secret rights are not protected under statute聽 or through any formal registration process聽聽
[295]
there is an act that protects against聽 economic espionage which is a nationwide thing聽聽
[300]
so this was updated last in 2001 and this act聽 prohibits the use of trade secret for the benefit聽聽
[305]
of a foreign economic entity as mentioned though聽 there is no set law or act relating to corporate聽聽
[310]
espionage in canada and rather trade secrets聽 are protected through contract or by tort where聽聽
[315]
a duty of confidence or fiduciary duties owed聽 by a recipient to a disclosure of confidential聽聽
[320]
business information in this case misappropriation聽 of confidential information can lead to criminal聽聽
[326]
sanctions for fraud now we'll go into a little聽 more detail about the security of information act聽聽
[331]
so as a part of this you are guilty if um of an聽 offense if at the direction of or for the benefit聽聽
[338]
of a foreign economic entity you either a聽 communicate a trade secret to another person聽聽
[343]
group or organization or b obtain retain alter or聽 destroy a trade secret if found guilty one can be聽聽
[349]
imprisoned for up to 10 years and i'll pass it聽 over to lauren to talk more about trade secrets聽聽
[356]
a trade secret can be any business information聽 that derives its value from secrecy聽聽
[360]
methods processes formulas recipes and devices are聽 only few examples of things that can be protected聽聽
[366]
by a trade secret trade secrets are not聽 registered with any government authorities聽聽
[370]
but can be maintained indefinitely provided that聽 the trade secrets are kept confidential this is聽聽
[375]
typically done through a combination of physical聽 technological and legal means these methods can聽聽
[380]
include non-disclosure agreements a locked door聽 password protection encryptions or confidentiality聽聽
[386]
clause in an employment agreement it's not only聽 unethical to misuse or expose this information聽聽
[391]
it can be illegal in canada it's an offense to聽 knowingly obtain a trade secret or communicate or聽聽
[397]
make available trade secret by a deceit falsehood聽 or other fraudulent means if found guilty one may聽聽
[403]
be liable to imprisonment for up to 14 years now聽 leads us to security consideration in competitive聽聽
[411]
intelligence as previously mentioned competitive聽 intelligence is completely legal if done ethically聽聽
[417]
however there has been and still is concerned聽 for when it comes to privacy and security聽聽
[423]
protecting the privacy of a business can be聽 seen as a competitive advantage not only does聽聽
[428]
caring for the privacy of both your business and聽 consumer data increase customer loyalty but it聽聽
[433]
also enables customers to build trust within that聽 company in terms of competitive intelligence which聽聽
[438]
is in essence a way to gather information from聽 competitors in a non-interfering and subtle manner聽聽
[443]
giving some sort of access to competitors聽 to get their hands on this information聽聽
[447]
could be a disadvantage when looking at聽 it from an individual business perspective聽聽
[452]
as a result many business undergo what is聽 called counter competitive intelligence聽聽
[457]
this process goes hand in hand with protecting聽 viable information that could be used by聽聽
[461]
competitors to gain competitive advantage counter聽 competitive intelligence starts with i starts聽聽
[467]
with identifying vulnerabilities in the business聽 starting with operational vulnerabilities such as聽聽
[472]
social engineering and unchecked internet聽 usage next the business can look at the聽聽
[477]
physical vulnerabilities such as the lack of聽 computer passwords and easy building access聽聽
[483]
then there are personnel vulnerabilities such as聽 not doing proper background checks on new hires聽聽
[488]
and susceptibility to crime the last vulnerability聽 is technical such as bugs in a system and easily聽聽
[494]
broken passwords counter-competitive intelligence聽 then acts as either an active or passive tool聽聽
[500]
uh to avoid and fix these vulnerabilities to聽 the business that would be easily accessed by聽聽
[507]
competitors in either an ethical or unethical way聽 passive counter competitive intelligence would use聽聽
[513]
defense tactics that go along the lines of finding聽 software solutions practicing counter surveillance聽聽
[519]
and penetration testing to find weaknesses聽 active counter competitive intelligence uses more聽聽
[526]
offensive tactics to investigate any potential聽 illegal and unethical threatening activities聽聽
[532]
this also goes hand in hand with risk management聽 which acts as a safeguard to protect against聽聽
[537]
security threats and changes so what privacy聽 measures can do can a business take as a聽聽
[544]
preventative measure first training employees is聽 crucial security education raises their awareness聽聽
[552]
and helps straighten their situational awareness聽 of hacking and or of corporate espionage another聽聽
[558]
measure to protect privacy and ensure聽 security is encryption specifically a聽聽
[563]
company-wide single key encryption to secure聽 information finally requiring third parties and聽聽
[568]
executive employees to sign non-disclosure聽 agreements or ndas can also help minimize聽聽
[574]
external disclosure of confidential business聽 information that could be used by competitors
[583]
congratulations as a ci professional you now聽 understand the basics of ethics and competitive聽聽
[587]
intelligence and can you see the importance of聽 these ethical principles have in your own work聽聽
[592]
as you continue your work as a ci professional be聽聽
[595]
sure to integrate the principles of聽 ethical methods and data collection聽聽
[598]
the laws that govern competitive聽 intelligence and privacy considerations聽聽
[603]
thank you for your time and please leave any聽 comments or questions in the comment section below