preview

Game of Ethics Eth/316 Essay

Decent Essays

The Ethics Game Dilemma
Ethics 316
September 30, 2012

The Ethics Game Dilemma
The Ethics Game Simulation is a tool created to teach how the decision-making process affects various stakeholders, and the ethical value of the decision determinations. Business organizations have encountered new challenges of ethical awareness with the increased globalization of industries and markets. People of many cultures, social statuses, and religions are joined in various business opportunities and projects via the World Wide Web. Core values of many companies must consider general humanity as the employee versus specific geographic regions of people and societies.
The various results of the Ethics Game Dilemma placed values on decisions made …show more content…

Therefore, we consider it your responsibility to safeguard confidential information regarding the Company, its suppliers, its contractors, its licensees, its licensors, its investors, its corporate partners, its board members, its advisors, its customers, or even fellow employees, obtained in connection with your employment. We consider it to be one of your most important responsibilities not to reveal or divulge any such information unless it is necessary for you to do so in the performance of your duties. You should remember that access to confidential information should be on a "need-to-know" basis and must be authorized by your manager. Any breach of this guideline will not be tolerated and legal action may be taken by the
Company. Consult the At-Will, Confidential Information, Invention Assignment and
Arbitration Agreement for further details about your confidentiality obligations.
(University of Phoenix, 2012).

The first scenario presented a breach of the Non-Disclosure Agreement by an anonymous source on a blogging web-site that revealed confidential information. Whereas 90% of the information was regarded either positive or neutral, the blog contained confidential information not to be released to the public. The perpetrator was identified by another employee in the Information Technology (IT) Department through illegal means; the IT guy hacked into the blogging employee’s home computer. A decision needed

Get Access