160 likes | 467 Views
3.00 Understand product/service management, emotional intelligence, financial analysis, selling and customer relations. Ethics in communication. 3.02 Use communication skills to foster open, honest communications. a. Explain the impact of providing false or misleading information.
E N D
3.00 Understand product/service management, emotional intelligence, financial analysis, selling and customer relations. Ethics in communication 3.02 Use communication skills to foster open, honest communications.
a. Explain the impact of providing false or misleading information. • Reducing Productivity • Lower Profits • Increase Cost • Loss of Trust • Loss of Credibility • Termination/Criminal Charges
b. Discuss the potential impact of providing half-truths. • Loss Of Trust • Everything On 1st Slide • Lie of Omission
c. Describe how providing information out of context can impact honest communications. • Only Part of The Story • Misinterpretation
d. Explain how withholding information can be harmful. • Loss Of Trust • Leaves Room For Misinterpretation • Loss Of Productivity
e. Identify topics that should not be discussed with a competitor • Trade Secrets • Personnel Issues • Financial Position (Changes) • Marketing Plans
f. Identify topics that should be avoided with coworkers. • Salary • Politics & Religion • Gossip/Rumors (Negative)
g. Explain the importance of a business’s proprietary information. • Gives Us A Competitive Edge
h. Cite examples of a business’s proprietary information. • Bakery-Recipes • Boeing Aircraft- Wing • NFL- Book of Plays • Marketing Plan
i. Describe why employees should avoid posting company information in chat rooms, forums, or blogs. • Anyone Can Access The Info • Lose Control Of It • Lead To Business Failure • Result in you being terminated
j. Discuss the need to follow company policy regarding communications with the media. • Allows Companies to Control Its Image • Avoids Common Mistakes In Talking To The Media
k. Identify employee practices that would hamper confidentiality. • Talking With Media, Competitors • Blogs • Emails
l. Explain methods businesses use to protect their proprietary information. • Levels Of Access • Safe Storage • Track Access • Rules for Handling