Editor's Note: Perks Go Under The Microscope - InformationWeek
IoT
IoT
Business & Finance
Commentary
3/4/2003
02:07 PM
Stephanie Stahl
Stephanie Stahl
Commentary
50%
50%

Editor's Note: Perks Go Under The Microscope

As some IT staffers walk through a trade show in Las Vegas this week, they're likely to pick up tchotchkes from the vendor booths to take home to their kids. Maybe some will attend a nice dinner or show hosted by a vendor. Others might be invited to a user group conference at a beautiful resort or perhaps to play a round of golf. Still others may be invited to socialize in private boxes at sporting events. All that seems pretty harmless. It's what vendors do to woo potential or existing customers.

Let's face it. Sales folks in all businesses have always used perks to attract new customers or keep existing customers happy. It's part of building relationships. And while expense accounts have become much skimpier across the board, there's usually room to do something for your best customers and prospects. Some take full advantage of the perks, but there are those who steer clear of anything other than meetings.

With so much extra scrutiny placed on the ways companies conduct business today, the question is: Where do you draw the line? Last week, business-technology executives at Nassau Health Care Corp. were accused by the New York State Ethics Commission of accepting hospitality from technology vendors beyond what's allowed by state laws. Some of it may sound harmless to you, but there were also charges that the perks could have unduly influenced a technology decision and gotten in the way of a competitive bidding process.

What kind of perks do you think are ethical, and where do you draw the line? In the coming weeks, we'll explore a series of ethical questions relating to everything from illegal perks and other activities to recycling technology to facilitating spam to handling data responsibly. Stay tuned.

Stephanie Stahl
Editor
sstahl@cmp.com


To discuss this column with other readers, please visit Stephanie Stahl's forum on the Listening Post.

To find out more about Stephanie Stahl, please visit her page on the Listening Post.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Top IT Trends to Watch in Financial Services
IT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Video
Slideshows
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll