Note: Sample below may appear distorted but all corresponding word document files contain proper formattingExcerpt from Essay:
Ethics and IT
Ethics and Information Technology
Doing Ethics Analysis
This case concerns trade secret misappropriation and theft of intellectual property, as well as issues of surveillance and cybercrime. Sergey Aleynikov attempted to steal computer code from Goldman Sachs in order to build competing technology for his new employer. Goldman Sachs prosecuted Aleynikov and won a conviction. The case discusses applicable case laws, including the difficulty of enforcing non-compete and non-disclosure agreements.
Sergey Aleynikov was employed by Goldman Sachs, and as part of his employment, had signed a confidentiality agreement. Aleynikov found new employment with Teza Technologies, where he was hired to build a high-speed trading platform to compete with Goldman Sachs. On his last day of employment for Goldman Sachs, Sergey Aleynikov downloaded proprietary high-speed trading computer code for use in his new employment at Teza Technologies. Aleynikov attempted to cover up evidence of his theft by erasing and deleting files.
Q3. This case raises the following issues:
Goldman Sachs' right to protect its intellectual property, to enforce confidentiality agreements, to surveil employees, also its right to compete
Aleynikov's right to gainful employment, and his right to enjoy the product of his labor
Teza Technology's right to compete
A company's right to compete, to own intellectual property, to enforce non-compete and non-disclosure agreements, to surveil employees
An employee's right to skills and knowledge
What defines a trade secret?
What defines reasonable geographic and duration constraints for non-compete agreements?
What is the appropriate punishment for trade secret misappropriation and theft of trade secrets?
Q4. The following stakeholders are involved:
Goldman Sachs, its shareholders, and customers and employers stand to gain by any judgment that affirms Goldman Sachs' rights to hold intellectual property, to enforce confidentiality, non-compete and non-disclosure agreements thereby giving the company a competitive edge; they all lose by any judgment that voids or erodes any of these.
Sergey Aleynikov stands to gain his freedom and reasonable compensation if it can be shown that he owns the disputed code; otherwise he loses all around.
Teza Technology's shareholders stand to gain if they can legally use the disputed code to compete; otherwise they lose out and have possibly no incentive to hire Aleynikov
Q5. One of the ethical issues that this case raises is what constitutes theft. While many people would agree that taking something that one has no right to take constitutes theft, from a teleological perspective, Aleynikov's theft may not be theft at all. If one considers that the end justifies the means, it may be that Aleynikov acted correctly according to his belief system. Even within a deontological system, "thou shalt not steal" is not a moral absolute without resolving the question of what constitutes theft.
Another issue for ethical consideration is what boundaries define intellectual property. Although the case does not explicitly state it, one presumes that Aleynikov in some way believed that he was entitled to the use of code that he had written. If one posits a scenario where Goldman Sachs had in some way reneged on the terms of Aleynikov's employment contract, then Aleynikov is justified in taking what he believes to be his. Teleogically speaking, Aleynikov's theft may not be theft at all, he was reclaiming his property which he had been duped out of. Certainly if one considers Aleynikov's actions from eth standpoint of individual ethical egoism, his actions can be justified.
Q6. What can be done include the following possibilities:
Goldman Sachs could drop their claim to ownership of the code.
Goldman Sachs could forgive Aleynikov's transgression, while maintaining their right to own the code.
Aleynikov could offer to make restitution.
Aleynikov could countersue for ownership of the disputed code.
Q7. Beyond what actually happened, which represents one end of the continuum, at the opposite end might be Aleynikov countersuing to void Goldman Sach's claim to ownership of what he considered his intellectual property. In this scenario, the concept of intellectual property remains intact, but the balance of power shifts in the competing interests between employee and employer.
If both parties agree to some form of settlement, then they all win, depending on specific terms. Or, if Teza Technologies agreed not to use the disputed code, then Goldman Sachs' competitive advantage remains intact, as do Goldman Sach's ownership claims.
Q8. The best option would have involved Aleynikov filing some form of countersuit, alleging breach of employment contract which he would claimed he signed under duress, invasion of privacy, and theft of his intellectual property. This countersuit is his only practical hope of obtaining enough leverage against Goldman Sachs to obtain a compromise that would be win-win for all parties. Certainly he should attempt another trial to have any chance at fairer sentencing than what he received (Weidner, 2011).
ACS Code of Ethics
In analyzing this case from the standpoint of the ACS Code of Ethics, there are several problem areas. Aleynikov appears to have violated each of Priorities 4.5.1 through 4.5.6; he neither preserved the information in his care, nor did he (presumably) advise his employer of any perceived conflict of interest. The commonality among all these violations is that they all involve a failure on Aleynikov's part to recognize any obligation or responsibility to promote or protect interests other than his own.
Aleynikov also violated Competence standard 4.6.2, given that he refused to relinquish the rights to code he had written for Goldman Sachs. Implicit in that standard is the recognition that a contract exists between employer and employee, which contract Aleynikov either unilaterally invalidated, or else felt that Goldman Sachs had set it aside, thereby enabling his theft.
It appears that Aleynikov also violated Social Implication standard 4.8.6 in that he colluded with Teza Technologies to acquire Goldman Sachs' code. Although there is no way of knowing who approached who regarding the transaction, the apparent inducement that Aleynikov might have used to influence Teza would have been the prospects of profiting handsomely from the new software they would develop.
Perhaps the single most disturbing transgression was violating ACS Code of Ethics standard 4.10.2, to knowingly engage in dishonest or fraudulent practices. Regardless of how Aleynikov felt about his employment with Goldman Sachs and any question as to who owned the fruits of his labor, he had to know that passing proprietary code to Teza was an ethical violation. Nor did Aleynikov seek guidance as standard 4.10. 7 suggests; of course realistically speaking, looking for guidance could only have occurred in the context of Aleynikov having doubts as to the correctness of his intended course of action.
Also, given the societal implications for issues surrounding professionalism, intellectual property, privacy, security and cyber-crime, Aleynikov violated 4.1.b by not loyally serving the community. At the very least, his actions reflect poorly on ICT professionals, no matter how aggrieved or badly treated they may have been.
Classical Ethical Theories
As to classical ethical theories, the behavior of Aleynikov and Goldman Sachs predictably demonstrate adherence to widely different ethical beliefs. Aleynikov practiced teleological ethics, believing that his actions could be considered good based on whether the outcome was desirable. More specifically, Aleynikov's behavior suggests he practiced individual ethical egoism, believing that the right thing to do was what turned out to be best for him as an individual (Sevenoaks School, 2011).
As noted earlier this belief system does little to further the interests of society as a whole, and least of all Goldman Sachs. A philosophy that comes closer to representing the interests of Goldman Sachs would be contractarianism, which espouses the idea that people should adopt norms of behavior because it is reasonable for them to do so, given the contractual nature of human society. This philosophy argues that people are primarily self-interested, and that a rational assessment of the best strategy for attaining the maximization of their self-interest will lead them…[continue]
"Ethics And Information Technology" (2011, April 28) Retrieved December 11, 2016, from http://www.paperdue.com/essay/ethics-and-information-technology-119422
"Ethics And Information Technology" 28 April 2011. Web.11 December. 2016. <http://www.paperdue.com/essay/ethics-and-information-technology-119422>
"Ethics And Information Technology", 28 April 2011, Accessed.11 December. 2016, http://www.paperdue.com/essay/ethics-and-information-technology-119422
ETHICS & INFORMATION TECHNOLOGY Ethics & Technology The first aspect of this article that struck the author is how human beings began as hunter-gatherers of food, materials for shelter, and defense -- and now human beings are hunter gatherers of information. Just as hunting and gathering affected the kind of society humans were millions of years ago, hunting and gathering information in the 21st century affects the kinds of societies present in
The need for continually creating and updating the security techniques and technologies involved in an enterprise system is the ethical responsibility of the IT professional. In order to successfully protect the information and intellectual property assets of a firm, an IT professional also needs to make a personal commitment to stay as current as possible on existing and future technologies (Pemberton, 1998). This commitment needs to be supported by the
Information Technology Change Management in Home Health Care I hope enjoyed time holidays. Now back work . In team task week, a topic weekly focus debate paper labor unions change process. There sufficient information argue sides. Let . See: The labor union change process difficult employees management; I labor union make process a bit easier parties. Implementing Information Technology Change in a Health Care Facility There is a shift from the traditional institutionalized
He sat on the issue until he was able to retire and then brought the unethical actions into the light. In the meantime, the government through the NSA was amassing significant information about the Internet usage of American citizens. No matter the justification for this action, it cannot be supported ethically. As individuals, we may have nothing to hide, but the erosion of civil liberties and privacy is a
Information Technology Copyright Issues There is no doubt that the digital revolution ushered forward by the computer and Internet age has changed myriad aspects of contemporary society. In addition to significant social and cultural changes and the evolution of political discourse on a global basis, the digital revolution has also profoundly changed the landscape of centuries of established legal principles that pertain to the proprietary ownership and protection of original intellectual
Ray Panko, professor of IT management at the University of Hawaii, Shidler College of Business. Their current report, covering 2006-2016, is especially interesting because it's the first BLS study which "fully reflects the dot-com bust and recovery, and takes IT offshoring into account," Panko says. Even after accounting for those factors, "the BLS again predicts robust job growth for IT occupations." Conclusions IT occupations will remain at the leading edge of
We agree that people still purchase books. The reason is that today the author gets paid upfront and if people do not read the book, the publisher has to bear the loss. Secondly publishers are able to 'sell the books' to the bookstores' based on 'consignment system', whereby the 'book store' is able to return the books which are unsold against a 'full refund'. (Grossman, 2009) Jeanie Comstock (2009) says