Ethics in Higher Education
HR Policies
Ethics Policy
Professional Conduct
Digital Ethics
100

This term describes the act of using someone else’s work as your own in academic settings.

What is plagiarism or academic dishonesty?

100

The name given to gifts or favors from any person, corporation, association, or anyone else that is given to an employee to secure favorable treatment or consideration from the recipient.

What is a gratuity or a bribe?

100

Integrity, Excellence, Accountability, and Respect.

What are the USG core values?

100

You notice a neighbor’s package was mistakenly delivered to your house. Taking it instead of returning it would be considered this.

What is theft or dishonesty?

100

This practice involves protecting personal information from unauthorized access.

What is data privacy?

200

This principle involves giving credit to original sources in academic work.

What is proper citation?

200

This occurs when personal interests could interfere with professional duties.

What is a Conflict of Interest or Conflict of Commitment?

200

This is one way for employees to confidentially report unethical behavior.

What is the Ethics & Compliance Reporting Hotline?

200

This is the term for the act of deliberately ignoring unethical practices within the organization to protect oneself or the company.

What is a cover-up? What is fraud?

200

This term describes the act of breaking into someone else’s computer or computer system.

What is cybercrime or hacking?

300

These laws limit the use of publications, recordings, software, and other intellectual property without proper licensing.

What are copyright laws?

300

This term refers to inappropriate behavior of a sexual nature in the workplace that creates a hostile or uncomfortable environment.

What is sexual harassment?

300

These are additional methods for reporting unethical behavior (but may not be confidential).

What is reporting to The Office of Equal Opportunity & Title IX? What is reporting to Human Resources? What is reporting to Office of Legal Affairs?

300

When using social media, employees are expected to avoid sharing confidential work information. Violating this could breach this law.

What is FERPA or HIPAA?

300

Looking up information about a student or co-worker when you don’t have a business “need to know” could be a violation of this law.

What is FERPA or HIPAA?

400

This ethical issue arises when faculty members have relationships with students that could influence academic decisions.

What is a conflict of interest or an amorous relationship?

400

This term describes the act of reporting unethical or illegal activities within an organization.

What is whistleblowing?

400

The act of treating someone differently or making their job more difficult because that person reported unethical behavior; this behavior is prohibited by Federal and State law, as well as USG and GS Policy.

What is retaliation?

400

Consistently following through on promises and meeting deadlines builds this quality in the workplace.

What is trustworthiness? What is reliability? What is accountability?

400

This principle involves ensuring that digital content is accessible to all users, including those with disabilities.  

What is digital accessibility?

500

This policy requires disclosure and approval of certain activities that may compromise an employee's impartiality or ability to complete their work for GS, such as other employment or speaking engagements.

What is Conflict of Interest/Conflict of Commitment Policy?

500

This term describes the act of favoring friends or relatives in professional settings.

What is nepotism?

500

Employees are restricted from holding elective offices at these levels.

What are State and Federal elective offices?

500

This term describes multiple employees working together to cheat or deceive others, usually for personal gain.

What is collusion?

500

This practice requires a computer user to verify their attempts to login using two different methods.

What is multi-factor authentication or MFA or two-factor authentication?