馃攳
Ethics in Competitive Intelligence - YouTube
Channel: unknown
[10]
hello class of adm 3316 my name is Marysia and in聽
today's presentation my team and i will discuss聽聽
[16]
ethics when it comes to competitive intelligence聽
the agenda for the presentation will go as follows聽聽
[23]
first vanessa and mitchell will discuss聽
different methods of ethical data collection聽聽
[27]
then lauren and rakhi will go into the different聽
laws that govern competitive intelligence and聽聽
[32]
finally i will talk about the privacy and聽
security considerations when it comes to ci
[38]
so to start off we will discuss聽
ethical methods of data collection聽聽
[42]
as far as data collection is concerned there are聽
many extremely valuable sources of data available聽聽
[47]
to ci professionals this includes interviews聽
surveys focus groups online secondary research聽聽
[53]
web scraping online databases and much more聽
however the extensive collection and use of data聽聽
[59]
in our modern world can cause ethical dilemmas聽
particularly when it comes to protecting sensitive聽聽
[64]
or confidential information from individuals and聽
organizations therefore when using these data聽聽
[70]
sources it is important for ci professionals聽
to ensure that data is being collected and聽聽
[74]
used in an ethical manner it should be聽
noted though that most data collection聽聽
[77]
methods themselves are not unethical and under the聽
right conditions most data collection techniques聽聽
[83]
will yield great results without causing any聽
kind of harm however it is the kind it is the聽聽
[87]
way that these data collection techniques are聽
actually used which can cause ethical issues
[95]
yes in order to ensure ethical data collection we聽
created a list of data collection do's and do not聽聽
[100]
that ci agents can apply ethical principles to聽
data collection regardless of technique that is聽聽
[106]
being used so to begin with the dues do explicitly聽
explain who you are what your organization聽聽
[111]
represents and the reason why you're collecting聽
data this allows those who are providing you with聽聽
[115]
data or information to determine whether it's聽
in their best interest to participate do you聽聽
[119]
obtain full content from individuals sharing聽
information with you it is important that you聽聽
[123]
do not use information that you collected prior to聽
obtaining consent from the source otherwise you'll聽聽
[128]
be misrepresenting the facts do understand the聽
potential harm stemming from the collection and聽聽
[132]
use of the data asking questions such as who聽
will have access to this data and could this聽聽
[137]
data be interpreted and used in ways that other聽
than what i communicated with the source can help聽聽
[142]
identify the potential harm and risk and prevent聽
them do take necessary precautions to remove bias聽聽
[148]
from data collection and analysis as this could聽
lead to misleading results for example biases聽聽
[153]
can be removed from data collection by avoiding聽
by search engine settings and preferences asking聽聽
[157]
clear questions and ensuring that the population聽
type and the size used for data collection are聽聽
[162]
appropriate that do not include do not include聽
personal identifiers and data collection if聽聽
[167]
unnecessary before using personal identifiers and聽
data collection stop and ask yourself do i really聽聽
[172]
need to add personal identifiers in my data do聽
personal identifiers add any value to my data do i聽聽
[178]
need to follow up with the respondents if personal聽
identifiers aren't necessary based on these聽聽
[183]
questions you should most likely omit them from聽
your results do not store sensitive information聽聽
[190]
include in locations that are publicly accessible聽
or easily compromised these this includes聽聽
[195]
information that can be considered sensitive聽
by either an individual or an organization聽聽
[200]
do not accept information that was collected聽
or shared with you through unethical means for聽聽
[204]
example if an individual from a competing company聽
came to you with valuable internal information聽聽
[208]
you should refuse it as the company did not聽
provide you with the permission or access to this聽聽
[212]
information do not attempt to deceive informants聽
or hide what you or your company will be using聽聽
[217]
the data for it this leads to misleading results聽
for you and loss of faith from the participants
[227]
we'll now move on to some of the laws that govern聽
competitive intelligence so when discussing the聽聽
[233]
laws that govern competitive intelligence one聽
first needs to differentiate between competitive聽聽
[237]
intelligence and espionage one of which is an聽
illegal activity and the other of which is legal聽聽
[242]
so competitive intelligence refers to the聽
gathering analyzing and use of information聽聽
[246]
collected on stakeholders such as competitors聽
and customers as well as other market factors聽聽
[251]
that contribute to a business's competitive聽
advantage in contrast espionage refers to聽聽
[256]
the illegal and unethical theft of business trade聽
secrets so an example of competitive intelligence聽聽
[261]
might be conducting research at a trade show聽
while on the other hand an example of espionage聽聽
[266]
might be trespassing on a competitor's property聽
or snooping through someone's compute computer聽聽
[272]
um so next now that you know what espionage聽
is and that it's illegal you might wonder聽聽
[275]
what are some of the laws related to governing聽
espionage so espionage relates to trade secrets聽聽
[280]
which are a form of intellectual property and聽
lauren will be going more into this shortly聽聽
[285]
unlike the united states which has both federal聽
and state trade legislation in canada trade聽聽
[290]
secret rights are not protected under statute聽
or through any formal registration process聽聽
[295]
there is an act that protects against聽
economic espionage which is a nationwide thing聽聽
[300]
so this was updated last in 2001 and this act聽
prohibits the use of trade secret for the benefit聽聽
[305]
of a foreign economic entity as mentioned though聽
there is no set law or act relating to corporate聽聽
[310]
espionage in canada and rather trade secrets聽
are protected through contract or by tort where聽聽
[315]
a duty of confidence or fiduciary duties owed聽
by a recipient to a disclosure of confidential聽聽
[320]
business information in this case misappropriation聽
of confidential information can lead to criminal聽聽
[326]
sanctions for fraud now we'll go into a little聽
more detail about the security of information act聽聽
[331]
so as a part of this you are guilty if um of an聽
offense if at the direction of or for the benefit聽聽
[338]
of a foreign economic entity you either a聽
communicate a trade secret to another person聽聽
[343]
group or organization or b obtain retain alter or聽
destroy a trade secret if found guilty one can be聽聽
[349]
imprisoned for up to 10 years and i'll pass it聽
over to lauren to talk more about trade secrets聽聽
[356]
a trade secret can be any business information聽
that derives its value from secrecy聽聽
[360]
methods processes formulas recipes and devices are聽
only few examples of things that can be protected聽聽
[366]
by a trade secret trade secrets are not聽
registered with any government authorities聽聽
[370]
but can be maintained indefinitely provided that聽
the trade secrets are kept confidential this is聽聽
[375]
typically done through a combination of physical聽
technological and legal means these methods can聽聽
[380]
include non-disclosure agreements a locked door聽
password protection encryptions or confidentiality聽聽
[386]
clause in an employment agreement it's not only聽
unethical to misuse or expose this information聽聽
[391]
it can be illegal in canada it's an offense to聽
knowingly obtain a trade secret or communicate or聽聽
[397]
make available trade secret by a deceit falsehood聽
or other fraudulent means if found guilty one may聽聽
[403]
be liable to imprisonment for up to 14 years now聽
leads us to security consideration in competitive聽聽
[411]
intelligence as previously mentioned competitive聽
intelligence is completely legal if done ethically聽聽
[417]
however there has been and still is concerned聽
for when it comes to privacy and security聽聽
[423]
protecting the privacy of a business can be聽
seen as a competitive advantage not only does聽聽
[428]
caring for the privacy of both your business and聽
consumer data increase customer loyalty but it聽聽
[433]
also enables customers to build trust within that聽
company in terms of competitive intelligence which聽聽
[438]
is in essence a way to gather information from聽
competitors in a non-interfering and subtle manner聽聽
[443]
giving some sort of access to competitors聽
to get their hands on this information聽聽
[447]
could be a disadvantage when looking at聽
it from an individual business perspective聽聽
[452]
as a result many business undergo what is聽
called counter competitive intelligence聽聽
[457]
this process goes hand in hand with protecting聽
viable information that could be used by聽聽
[461]
competitors to gain competitive advantage counter聽
competitive intelligence starts with i starts聽聽
[467]
with identifying vulnerabilities in the business聽
starting with operational vulnerabilities such as聽聽
[472]
social engineering and unchecked internet聽
usage next the business can look at the聽聽
[477]
physical vulnerabilities such as the lack of聽
computer passwords and easy building access聽聽
[483]
then there are personnel vulnerabilities such as聽
not doing proper background checks on new hires聽聽
[488]
and susceptibility to crime the last vulnerability聽
is technical such as bugs in a system and easily聽聽
[494]
broken passwords counter-competitive intelligence聽
then acts as either an active or passive tool聽聽
[500]
uh to avoid and fix these vulnerabilities to聽
the business that would be easily accessed by聽聽
[507]
competitors in either an ethical or unethical way聽
passive counter competitive intelligence would use聽聽
[513]
defense tactics that go along the lines of finding聽
software solutions practicing counter surveillance聽聽
[519]
and penetration testing to find weaknesses聽
active counter competitive intelligence uses more聽聽
[526]
offensive tactics to investigate any potential聽
illegal and unethical threatening activities聽聽
[532]
this also goes hand in hand with risk management聽
which acts as a safeguard to protect against聽聽
[537]
security threats and changes so what privacy聽
measures can do can a business take as a聽聽
[544]
preventative measure first training employees is聽
crucial security education raises their awareness聽聽
[552]
and helps straighten their situational awareness聽
of hacking and or of corporate espionage another聽聽
[558]
measure to protect privacy and ensure聽
security is encryption specifically a聽聽
[563]
company-wide single key encryption to secure聽
information finally requiring third parties and聽聽
[568]
executive employees to sign non-disclosure聽
agreements or ndas can also help minimize聽聽
[574]
external disclosure of confidential business聽
information that could be used by competitors
[583]
congratulations as a ci professional you now聽
understand the basics of ethics and competitive聽聽
[587]
intelligence and can you see the importance of聽
these ethical principles have in your own work聽聽
[592]
as you continue your work as a ci professional be聽聽
[595]
sure to integrate the principles of聽
ethical methods and data collection聽聽
[598]
the laws that govern competitive聽
intelligence and privacy considerations聽聽
[603]
thank you for your time and please leave any聽
comments or questions in the comment section below
Most Recent Videos:
You can go back to the homepage right here: Homepage





