Editor's Note: Perks Go Under The Microscope - InformationWeek
Business & Finance
02:07 PM
Stephanie Stahl
Stephanie Stahl
How Upwork Cut Zero-Day File Attacks by 70%
Oct 05, 2017
Upwork has millions of clients and freelancers that have to upload and download many files to and ...Read More>>

Editor's Note: Perks Go Under The Microscope

As some IT staffers walk through a trade show in Las Vegas this week, they're likely to pick up tchotchkes from the vendor booths to take home to their kids. Maybe some will attend a nice dinner or show hosted by a vendor. Others might be invited to a user group conference at a beautiful resort or perhaps to play a round of golf. Still others may be invited to socialize in private boxes at sporting events. All that seems pretty harmless. It's what vendors do to woo potential or existing customers.

Let's face it. Sales folks in all businesses have always used perks to attract new customers or keep existing customers happy. It's part of building relationships. And while expense accounts have become much skimpier across the board, there's usually room to do something for your best customers and prospects. Some take full advantage of the perks, but there are those who steer clear of anything other than meetings.

With so much extra scrutiny placed on the ways companies conduct business today, the question is: Where do you draw the line? Last week, business-technology executives at Nassau Health Care Corp. were accused by the New York State Ethics Commission of accepting hospitality from technology vendors beyond what's allowed by state laws. Some of it may sound harmless to you, but there were also charges that the perks could have unduly influenced a technology decision and gotten in the way of a competitive bidding process.

What kind of perks do you think are ethical, and where do you draw the line? In the coming weeks, we'll explore a series of ethical questions relating to everything from illegal perks and other activities to recycling technology to facilitating spam to handling data responsibly. Stay tuned.

Stephanie Stahl

To discuss this column with other readers, please visit Stephanie Stahl's forum on the Listening Post.

To find out more about Stephanie Stahl, please visit her page on the Listening Post.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll