Professional Values and EthicsProfessional Values and EthicsProfessional Values and EthicsGEN 200February 1, 2010Professional Values and EthicsThis paper will focus on values and ethics and their relationship among career success. Values and Ethics will be defined and described how they differ. Values and ethics are important in ones personal and professional lives and are vital to any organization, team or group. Values and can be instilled from many different sources whether it is from parents, religion, school, etc. Professional ethics can be outlined by the employer, professional organization, or association on how their staff or colleagues should conduct themselves.
The (2010) website Dictionary.com defines values as relative worth, merit, or importance The same source defines ethics as the rules of conduct recognized in respect to a particular class of human actions or a particular group, culture, etc (2010). A Department of the Army pamphlet entitled Values: The Bedrock of Our Profession discusses the importance of values and included this definition, “Values are what we, as a profession, judge to be right. They are more than words, they are the moral, ethical, and professional attributes of character…there are certain core values that must be instilled in members of the U.S. Army-civilian and uniformed soldier alike. These are not the only values that should determine our character, but they are ones that are central to our profession and should guide our lives as we serve our Nation.” Ethics is behavior in a way that is consistent with what is generally considered to be right. Most of an individuals ethical development occurs before entering an organization. The impact or pressure of family, community functions, and school will determine individual values.
Values and ethics are apparent every day in a professional setting. The mere act of showing up for work is an example of using both ethics and values. If a person possesses a strong sense of work ethics, they will go to work every day. When a person decides to or decides against doing a job or task with integrity, they are exercising ethics and values.
Many different professional organizations have their own code of ethics, which are to be followed. For example, accountants, doctors, and lawyers must abide by the code of ethics defined in by their highest-ranking peers. If the code of ethics are not followed and they are found guilty, they can be permanently banned from practicing their profession. When the code of ethics are followed, it can impact their success in a positive way leading to a higher position in their profession.
A professional example of exercising both values and ethics is in the insurance industry. All insurance salespeople must be licensed by the state in which they sell insurance products. With the license comes a fiduciary duty. This is the duty that is trusted with all licensed professionals to abide by, inform, and instruct clients correctly and do business in an ethical manner at all times. Essentially, the licensed professional is trusted to do business to the clients benefit, never to benefit themselves. There are many situations in which this fiduciary duty can be violated. If a client is not aware of certain laws or language in a contract, it is the duty of an agent to explain that language thoroughly so that the client is well informed. Another example is a client trusts an agent with funds in cash or from an account, and the agent does not follow through with the client request or keeps the money for him or herself. When either of these situations happens, the agent is in violation of his or her fiduciary duty.
Another example of exercising values and ethics as service professionals, are the laws in place to protect the public. There are many times when a service professional interacts with other professions on a daily basis. For example, when a client applies for life insurance, there must be a thorough check done of their medical background. In this scenario, there are two service professionals working for one client; the insurance agent and the medical professional. Both must keep the clients best interest as well as privacy in mind. Medical records are secured by The Health Insurance Portability and Accountability Act of 1996 (HIPAA), which protects the privacy of individually identifiable health information; the HIPAA Security Rule, which sets national standards for the security of electronic protected health information; and the confidentiality provisions of the Patient Safety Rule, which protect identifiable information being used
In 2008, the FDA published a rule to protect the confidentiality of health information by implementing a Privacy Protection Directive of its Office of Management and Budget, or OMB. OMB made this clear and stated that the “Privacy Protection Directive should be subject to consistent review by the OMB Security Advisor and the FDA and the FDA would be required to make its final decision on the effectiveness of the Privacy Protection Directive upon receipt of its findings and that it would take no further action when the OMB reviews its own conclusions”. The FDA’s definition of “protection of information” appears in the Privacy Policy published in November 2009 from the OMB.
In February 2009, the FDA issued a Statement of Principles of the Agency (IPAA) stating that when the OMB reviews, its OMB should review a security review of a service’s cybersecurity. There are also cases in which, when the OMB reviews, it agrees to protect access to a “high level of information with greater specificity” than the standard “other than sensitive personal, financial, and professional records, security records, and the like”. In those cases, the U.S. Government considers an OMB Security Advisor’s report to be confidential and the same OMB Security Advisor who reviewed this report would be required to release copies in response to such review. When a Service is informed by a Security Advisor that the information it has shared under the “high level of information” is vulnerable, there is a direct risk that an OMB Report will be destroyed.
[Doc. No. 10-23, 42 FR 4416, Jan. 28, 1993, as amended by Amdt. 8216(a)(5)(B), 46 FR 55877, Jan. 29, 1993; Amdt. 8216(a)(5)(E), 49 FR 62254, Mar. 30, 1995; Amdt. 8216(a)(5)(K), 56 FR 91944, July 8, 1997; Amdt. 8216(d)(2), 54 FR 15963, May 23, 1998; Amdt. 8216(g), 60 FR 59947, February 28, 2000; Amdt. 8216(g), 61 FR 60974, January 7, 2001; amdt. 8216(d)(2), 70 FR 65312, 31 March 2001; amdt. 8216(f), 78 FR 123543, 3-1-2004; amdt. 42 FR 60429, Sept. 28, 2005; amdt. 42 FR 59091, Jan. 20, 2007; amdt. 42 FR 54706, May 27, 2008; amdt. 41 FR 56613, July 10, 2009]
§8214. Definitions for Service and Professional Records
(a) Service Information
The term “service and professional records” means, with respect to a service, individual, entity, or business, all information of which related to:
(1) a person who functions on behalf of its operator; or
(2) a person whose main business activity is to provide services;
the individual’s individual identification number and identification card number, and a copy of any other necessary identification document that the individual provides.
The term “membership” means:
(1) a membership check or deposit account for the service.
(2) any bank or other business that conducts business for the service.
(3) a business, account, or securities held by the individual or group of individuals for which each and every payment is issued by any institution that performs banking or related services.
(4) the individual’s credit card, or other identification number;
any other identification card that the individual uses for or on behalf of the service and the individual’s financial accounts;
financial information on any financial institution that provides or maintains financial services;
an account number or bank account of the particular institution where the individual serves;
a financial information statement related to the particular institution;
banking information on individual-related institutions; and
any other evidence of fraud or breach of trust that is evidenced by the individual’s financial account.
(b) Services and Professionals
Any individual whose service consists primarily of performing services for a service and the group of persons who do not perform such services may be deemed to have served on behalf of the service in connection with an operation that is being performed on behalf of the service. However, service or professional records that are of different types may not meet this definition.
(c) Security Agency Compliance Measures
The OMB shall consider the individual’s information on the OMB’s security policies regarding:
(1) access to, and compliance with, such access services and documents;
any actions or inaction by U.S. authorities on access to, or violation of
An OMB report makes note of its review. A security adviser’s “report” is considered by the OMB to be confidential and is then released.[6] Security Advisor review of a service’s security makes the security Analyst view the system as necessary to protect the integrity of the security information. This is why a security Advisor may not disclose information from other sources that would cause a breach of any system or systems may be used.
When a security Advisor reviews a Service’s security report, the OMB may report directly to the Security Advisor who then uses this information to identify the vulnerable customers. Service providers often maintain their Security Adviser’s access to the information only when the data is available for analysis and the OMB determines that it is relevant to a decision. In some cases, this can be a simple order of magnitude. For example, if a service provider discovers a threat from other customers and then uses its security report to create a “prefrontier threat, a security report may contain such information if it is relevant to the business environment”. However, the Services may not understand the nature of the actual information and take it down. Furthermore, the Services may believe that this information was shared with malicious intent and they should not report it.[7] Security Advisers may conclude that the information contained in this report constitutes “high risk”, but it is not a “high threshold of security”.
Conclusion
Security Advisers make “significant” recommendations in their advice. When they make the recommendations, it is not only their decision—their assessment of what makes a great report—but also their judgment as to what the report should focus upon. For instance given this and other “high risk” issues, the OMB may be less able to focus attention to the critical issues (such as the need to ensure that the risk does not exceed certain criteria) associated with service development projects that cannot be tackled in a timely manner. The Service is at risk because it has not responded to a security report with a timely and action-oriented approach. The Review may have to give the security Analyst or OMB a report in which they would normally rely. That could include the following (but can be limited by the severity):
(a) the OMB may take action without disclosing it;
(b) the OMB is unable to identify
In 2008, the FDA published a rule to protect the confidentiality of health information by implementing a Privacy Protection Directive of its Office of Management and Budget, or OMB. OMB made this clear and stated that the “Privacy Protection Directive should be subject to consistent review by the OMB Security Advisor and the FDA and the FDA would be required to make its final decision on the effectiveness of the Privacy Protection Directive upon receipt of its findings and that it would take no further action when the OMB reviews its own conclusions”. The FDA’s definition of “protection of information” appears in the Privacy Policy published in November 2009 from the OMB.
In February 2009, the FDA issued a Statement of Principles of the Agency (IPAA) stating that when the OMB reviews, its OMB should review a security review of a service’s cybersecurity. There are also cases in which, when the OMB reviews, it agrees to protect access to a “high level of information with greater specificity” than the standard “other than sensitive personal, financial, and professional records, security records, and the like”. In those cases, the U.S. Government considers an OMB Security Advisor’s report to be confidential and the same OMB Security Advisor who reviewed this report would be required to release copies in response to such review. When a Service is informed by a Security Advisor that the information it has shared under the “high level of information” is vulnerable, there is a direct risk that an OMB Report will be destroyed.
[Doc. No. 10-23, 42 FR 4416, Jan. 28, 1993, as amended by Amdt. 8216(a)(5)(B), 46 FR 55877, Jan. 29, 1993; Amdt. 8216(a)(5)(E), 49 FR 62254, Mar. 30, 1995; Amdt. 8216(a)(5)(K), 56 FR 91944, July 8, 1997; Amdt. 8216(d)(2), 54 FR 15963, May 23, 1998; Amdt. 8216(g), 60 FR 59947, February 28, 2000; Amdt. 8216(g), 61 FR 60974, January 7, 2001; amdt. 8216(d)(2), 70 FR 65312, 31 March 2001; amdt. 8216(f), 78 FR 123543, 3-1-2004; amdt. 42 FR 60429, Sept. 28, 2005; amdt. 42 FR 59091, Jan. 20, 2007; amdt. 42 FR 54706, May 27, 2008; amdt. 41 FR 56613, July 10, 2009]
§8214. Definitions for Service and Professional Records
(a) Service Information
The term “service and professional records” means, with respect to a service, individual, entity, or business, all information of which related to:
(1) a person who functions on behalf of its operator; or
(2) a person whose main business activity is to provide services;
the individual’s individual identification number and identification card number, and a copy of any other necessary identification document that the individual provides.
The term “membership” means:
(1) a membership check or deposit account for the service.
(2) any bank or other business that conducts business for the service.
(3) a business, account, or securities held by the individual or group of individuals for which each and every payment is issued by any institution that performs banking or related services.
(4) the individual’s credit card, or other identification number;
any other identification card that the individual uses for or on behalf of the service and the individual’s financial accounts;
financial information on any financial institution that provides or maintains financial services;
an account number or bank account of the particular institution where the individual serves;
a financial information statement related to the particular institution;
banking information on individual-related institutions; and
any other evidence of fraud or breach of trust that is evidenced by the individual’s financial account.
(b) Services and Professionals
Any individual whose service consists primarily of performing services for a service and the group of persons who do not perform such services may be deemed to have served on behalf of the service in connection with an operation that is being performed on behalf of the service. However, service or professional records that are of different types may not meet this definition.
(c) Security Agency Compliance Measures
The OMB shall consider the individual’s information on the OMB’s security policies regarding:
(1) access to, and compliance with, such access services and documents;
any actions or inaction by U.S. authorities on access to, or violation of
An OMB report makes note of its review. A security adviser’s “report” is considered by the OMB to be confidential and is then released.[6] Security Advisor review of a service’s security makes the security Analyst view the system as necessary to protect the integrity of the security information. This is why a security Advisor may not disclose information from other sources that would cause a breach of any system or systems may be used.
When a security Advisor reviews a Service’s security report, the OMB may report directly to the Security Advisor who then uses this information to identify the vulnerable customers. Service providers often maintain their Security Adviser’s access to the information only when the data is available for analysis and the OMB determines that it is relevant to a decision. In some cases, this can be a simple order of magnitude. For example, if a service provider discovers a threat from other customers and then uses its security report to create a “prefrontier threat, a security report may contain such information if it is relevant to the business environment”. However, the Services may not understand the nature of the actual information and take it down. Furthermore, the Services may believe that this information was shared with malicious intent and they should not report it.[7] Security Advisers may conclude that the information contained in this report constitutes “high risk”, but it is not a “high threshold of security”.
Conclusion
Security Advisers make “significant” recommendations in their advice. When they make the recommendations, it is not only their decision—their assessment of what makes a great report—but also their judgment as to what the report should focus upon. For instance given this and other “high risk” issues, the OMB may be less able to focus attention to the critical issues (such as the need to ensure that the risk does not exceed certain criteria) associated with service development projects that cannot be tackled in a timely manner. The Service is at risk because it has not responded to a security report with a timely and action-oriented approach. The Review may have to give the security Analyst or OMB a report in which they would normally rely. That could include the following (but can be limited by the severity):
(a) the OMB may take action without disclosing it;
(b) the OMB is unable to identify