iPad Security Breach and Corporate Ethics
In the course of this short essay, the author will demonstrate hacking into a Web site is almost never justifiable unless the hackers are acting with a warrant and under the direction of law enforcement agencies. We will see this applied to a real world case, in which Goatse Security and Gawker Media hacked into iPAD email records stored on an AT&T server in June of 2010. In fact this is probably the best example that can be found. The author will also create a corporate ethics statement for a computer security firm that would allow activities like hacking only under the most extreme of circumstances.
In this author's viewpoint, if hacking results at all, the perpetrator must be able to defend himself in front of a judge or the police because it is a basic violation of the sacred right of privacy. Furthermore, this author maintains that it is important for organizations like Gawker Media to be socially responsible and we will consider (based on this incident) what factors chat chief executive officers (CEOs) should consider when responding to a security breach. Finally, the author will create an email script to be sent to AT&T customers informing them of the security breach and a plan to resolve the issue, explaining the rationale in the process.
Steven Jobs and Apple as Models
The model of this type of policy is Steven Jobs and his company. In the video commentary article posted below the video interview with Steven Jobs, Richard Tate is insulting when he calls Mr. Jobs sanctimonious instead of responsible and doing the right thing. The fact that a group of hackers embarrassed him and made his company's responsible policy a laughing stock does not make him wrong. Considering that he is a spokesman for Gawker really says it all. This upstart company seeks to profit from tech voyeurism and has the gall to thumb their nose at responsible party's who has made good faith efforts to guard their clients' privacy agaist just such stupidty (Tate, 2010, June 10). Certainly, it points to the sad lack of social responsibility amongst business and society in general with reference to the issue of privacy and the protection of private...
IPad Security Breach Assessing the Impact of the Apple iPad Security Breach Discuss Goatse Security firm possible objectives when they hacked into AT&T's Website. Goatse Security and firms like them are on a mission to expose what they see as lies and misleading claims of companies who claim to have much greater levels of security and stability in their products than they actually do. While the accounts of the iPad incident have been
Apple needs to increase its market share for iPad 4. Product outline Apple Inc. is a well known technology firm that specializes in designing, production and selling of computers, mobile phones and music related devices. The most outstanding feature of Apple Inc. is the brand-perception as well as identification. Apple has built itself to become a cult-brand over the last decade with the strategy to invest and market iTunes, QuickTime and iMaclines
Apple needs to increase its market share for iPad 4. Product outline Apple Inc. is a well known technology firm that specializes in designing, production and selling of computers, mobile phones and music related devices. The most outstanding feature of Apple Inc. is the brand-perception as well as identification. Apple has built itself to become a cult-brand over the last decade with the strategy to invest and market iTunes, QuickTime and iMaclines
Corporate Ethics and Hacking Although the predominant opinion expressed by governments and mainstream press regarding hacking is one of disapproval and unsubstantiated fear, the truth is that hacking may be deployed ethically or unethically depending on the situation, and in fact, hacking into a website or database is entirely justifiable in certain contexts. In order to see why this is the case as well as understand the complex role of corporations
Online Banking USAA Online Banking Analysis: Assessment of Positive & negative Impacts & Recommendations The USAA online banking system has been specifically designed to provide the financial institution's customers with reliable, secure and virtual access to their accounts and supporting banking transactions globally. Through the use of any Internet browser, USAA banking customers can quickly sign in, access and view account information, transfer funds, and set up and use automated payments for their
Practice Fusion Strategic Planning Document: A Plan for Conversion, Integration, and Implementation of Electronic Health Records (EHR) in a Residential Care Facility Description of Institute The objective of this study is to examine the implementation of a new information technology data-management plan at a residential care facility for individuals with mental illness/mental retardation. This facility also provides day treatment and respite care. This will include a two-person practice for a Nurse Practitioner and a
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now