Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementPhysicalSecurity NewswireSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & Training

Why ethical corporate conduct is integral to competitive edge

By Evgeny Likhoded
ethics-values-freepik
August 3, 2021

We often associate questions of ethical conduct with individual actions relating to particular scenarios, such as those involving healthcare. While it’s true that ethics and conduct are matters under the control of humans, financial companies and other entities also have ethical responsibilities, typically enshrined into a corporate code of conduct. However, the corporate code of conduct itself is simply a document. When the principles it outlines aren’t adhered to, and unethical behavior becomes the norm, disaster can ensue. We don’t need to look very far for examples. 

In the summer of 2020, German fintech giant Wirecard suddenly collapsed, owing creditors almost $4 billion. It turned out that the company was missing cash reserves to the tune of $2.1 billion. This was unveiled after auditors from EY refused to sign off on the 2019 accounts. The Financial Times had been investigating the company for years, regularly publishing articles that flagged questionable financial practices. CEO Markus Braun rightly took the fall, but it is implausible that he acted alone. 

In an increasingly interconnected business landscape, the risks of poor ethics aren’t confined to corporate silos, either. In 2019, Apple was implicated in a breach of labor regulations linked to its manufacturing partner, Foxconn. The company was overutilizing its temporary workforce to bypass employment laws covering overtime and paid leave. 

 

Benefits Beyond Risk Mitigation

 

As much as poor conduct standards create unnecessary risks for companies, promoting good ethical practices should be about more than simply avoiding pitfalls. The annual World’s Most Ethical Companies list features many long-established companies and household names, including IBM, Avon, Kelloggs, Mastercard, and Pepsico. 

That isn’t a coincidence. Robust standards of conduct and ethics are a matter of competitive edge. Being able to consistently outperform the market relies on hiring top talent, securing best-in-class suppliers, and ensuring that a company can sell its products and services even in a competitive environment. 71% of professionals say they’d be willing to compromise on pay to work for a company they believe in, and 70% of millennials consider company values before making a purchase. 

Therefore, there’s no question that robust ethical standards are integral to the success and longevity of corporations. 

 

Challenges with ‘Code of Conduct’ Compliance

So why do companies struggle with it? There can be various reasons. In larger organizations, it can be difficult to get management buy-in at all levels, resulting in a disparity in how standards are upheld between different parts of the company. Compliance departments may not feel empowered, particularly in companies where compliance is seen as a paperwork exercise. 

The paperwork itself can be another blocker. Compliance teams are still often bogged down in archaic processes involving Excel spreadsheets and Word documents. In this case, they don’t have the time to engage in more value-add activities like training, education, or effective policy management. Code of conduct compliance risks becoming an annual box-ticking exercise rather than weaving ethical standards into the fabric of the organization. 

In these cases, poor ethical standards can creep in over time as minor incidents get overlooked. Eventually, a code of conduct can become little more than just another policy document. 

 

Leveraging Technology to Embed Compliance

How can organizations prevent this from happening? They must adopt appropriate systems and processes to ensure that standards of conduct and ethics are embedded into the corporate culture and mindset. Technology is a key enabler here, as it can help ensure that compliance teams can reach further with the resources they have. 

For instance, many compliance teams can spend endless hours reviewing, editing, and updating policies because their governance processes require multiple levels of sign-off. Governance, risk, and compliance software tools can reduce much of this work with automated processes for drafting, editing, reviewing, and publishing policies. In-built version control helps keep libraries up to date and provides a transaction record showing actions, decisions, and approvals. 

Similarly, some of these tools also have a feature that automates the attestation process, making it easy to reach all employees and even third parties and pull reports to demonstrate compliance during audits. 

 

Creating a Strong Culture of Ethics

By eliminating manual, resource-heavy activities through technology, organizations can gain several benefits, not least reducing the risks of human errors or oversights. Furthermore, companies can redeploy compliance efforts into other activities that promote a strong culture of ethics and conduct. According to Michael Volkov, CEO of The Volkov Law Firm and expert in compliance, “Corporate compliance is going through its biggest revolution. This shift to embedded compliance and a change in culture is happening and will be crucial for financial institutions in the future.”

For example, a survey conducted by the World’s Most Ethical Companies found that its honorees consistently demonstrated a commitment to training activities, with over 75% having training plans that extend multiple years into the future. 87% conduct ethical culture assessments among employees, 87% use periodic “compliance roadshows,” which have now shifted to virtual events.  

Other activities could include helping managers to understand how they can incorporate code of conduct and ethics into performance evaluations or developing incentive programs; they also can make their employees aware of the Ethical Code of Business Portal that is available online so that they know that the standards of their organizations are high. Similarly, compliance teams can also direct these efforts to ensure that third parties comply with their corporate standards. This has been the culmination of a movement of over 20 years. We have seen aggressive enforcement coupled with demands for better compliance programs and a commitment to ethics.

Strong communication is the heartbeat of a company and is essential to driving a solid and shared culture of ethical standards. Without communication, trust can be quickly eroded. Trust is central to employee engagement, and, as a result, productivity is vital as well. It can also make staff more comfortable in their work environment, thus enhancing talent retention. In an ever-changing business environment that’s often beset by risks, the value of upholding a high standard of ethics and corporate conduct should not be underestimated. By embracing technology to make compliance more dynamic and efficient, organizations have an opportunity to reduce their exposure to risks and gain an edge over the competition. 

KEYWORDS: business continuity Code of Conduct corporate security ethics organizational culture security management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Evgeny Likhoded is CEO and Founder of Clausematch.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Logical Security
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
close

1 COMPLIMENTARY ARTICLE(S) LEFT

Loader

Already Registered? Sign in now.

Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Person holding large ball of twine

Preventing Burnout in The Security Industry

Harrods

Harrods’ Cyberattack: Cybersecurity Leaders Weigh In

Coding

AI Emerges as the Top Concern for Security Leaders

2025 Security Benchmark banner

Events

September 29, 2025

Global Security Exchange (GSX)

 

November 17, 2025

SECURITY 500 Conference

This event is designed to provide security executives, government officials and leaders of industry with vital information on how to elevate their programs while allowing attendees to share their strategies and solutions with other security industry executives.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • hacker

    Why Ethical Hacking? (The What and Why of Ethical Hacking)

    See More
  • cyber-data-freepik1170x658x82.jpg

    Consolidation and automation key as cybersecurity becomes a competitive edge in 2022

    See More
  • remote-hybrid-work-freepik.jpg

    Why swift action is key to securing the hybrid workforce

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!