Concerns Of TechFite Company Legal Constraints And Liability Assessment

PAGES
4
WORDS
1079
Cite
Related Topics:

TechFite is a consulting and advising internet organization that aids in helping other businesses with ways to be more profitable in digitizing their online ventures. The company has had a good reputation over time; however, its application division has caught the eyes of the media for being reported to undertake some disturbing business practices. (Editor, 2018) Recently, TechFite had business ventures with Orange Leaf Software LLC to be hired for consultation services. However, before disclosing any technical details, the applicant division executive executed a non-disclosure agreement with Orange Leaf organization. During the pre-consultation process, Orange Leaf's chief technology officer completed a questionnaire that included their organization's technical information. However, for their reasons, Orange Leaf did not employ the TechFite Application Division. But months later, Orange Leaf was surprised that their competitors were launching similar products to theirs. This was a similar scenario with CTO for Union City Electronic Ventures.

The specific laws that the TechFite organization breached

Therefore, this violated laws since organizations must protect their client's confidentiality at all costs, even if they decline to conduct business. Thus TechFite organization was liable for breaching the Computer Fraud and Abuse Act (CFAA). This Act has been enacted to address legal and illegal access to federal and financial information technology systems to reduce computer system cracking and gaining unauthorized penetration to obtain information illegally (Johnson, 2015). Thus there are claims that the organization utilized a common hacking program called Metasploit to compromise the security system of both Orange Leaf and COT for Union City Electronics Ventures that were used in interstate commerce by their competitors. The TechFite organization has a Business Intelligent (BI) unit, which gathers publicly available information about the organizations they have worked with to benefit their marketing scheme. It is a legal operation and common in an organization offering such activities. However, they failed to safeguard some of the vital details of the clients who refused to conduct business with them.

In addition, Electronic Communication Privacy Act (ECPA) was breached. The Act prohibits interceptions, disclosure, or electronic and oral communication. It is illegal to manufacture, distribute or possess a device whose primary use is the surreptitious interception of such communication (Gregg,...…scanning activities into IP addresses of other internet-based organizations. However, the major concern was on Sarah Miller, the senior analyst, yet she had the most traffic in scanning other organization networks. Jack Hudson, a junior worker, took instructions from Miller; he was found to be penetrating other internet organization networks and gathering intelligence by surveilling the company trash.

What is more of concern is Jack Hudson was a member of Competitive Intelligence Professionals, who are expected to be practicing a high dignity code of ethics against illegal penetration of other organization networks. Therefore, for TechFit to redeem itself, they need to fix its systems in that administrative privileges are only granted to executive officers who can handle them. Besides, they should uninstall all the Metasploit tools from their system and educate their employees on work ethics.

In conclusion, TechFite had committed the crime of breaching other organizations' internet networks without their consent. Despite having employees expected to be professionally ethical, they have failed to perform their duties diligently. Therefore to redeem itself, they need to employ disaster recovery to maintain high integrity and…

Sources Used in Documents:

References


Editor, I. (2018). Insight Public Sector | IPS. Retrieved 18 June 2022, from https://www.insight.com/en_US/content-and-resources/brands/hewlett-packard-enterprise/hpe-secure-compute-lifecycle-whitepaper-ac-hpe0001.html.


Gregg, M. (2006). Hack the Stack. https://doi.org/10.1016/b978-1-59749-109-9.x5000-x


Johnson, L. (2015). Security Controls Evaluation, Testing, and Assessment Handbook. https://doi.org/10.1016/c2013-0-13416-2


Kenton, W., Johnson, J., & Eichler, R. (2022). Sarbanes-Oxley (SOX) Act of 2002 Definition. Investopedia. Retrieved 18 June 2022, from https://www.investopedia.com/terms/s/sarbanesoxleyact.asp#:~:text=The%20Sarbanes%2DOxley%20Act%20of,tough%20new%20penalties%20on%20lawbreakers.


ONLINE, U. (2022). Business Continuity vs. Disaster Recovery: 5 Key Differences | UCF Online. UCF Online. Retrieved 18 June 2022, from https://www.ucf.edu/online/leadership-management/news/business-continuity-vs-disaster-recovery/.


Cite this Document:

"Concerns Of TechFite Company Legal Constraints And Liability" (2022, June 19) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/concerns-techfite-company-legal-constraints-liability-assessment-2177427

"Concerns Of TechFite Company Legal Constraints And Liability" 19 June 2022. Web.25 April. 2024. <
https://www.paperdue.com/essay/concerns-techfite-company-legal-constraints-liability-assessment-2177427>

"Concerns Of TechFite Company Legal Constraints And Liability", 19 June 2022, Accessed.25 April. 2024,
https://www.paperdue.com/essay/concerns-techfite-company-legal-constraints-liability-assessment-2177427

Related Documents

Liability of Smallness: What it Means and What Can Be Done in Response The historical record contains few examples of the smaller underdog winning out over larger opponents, with examples such as David and Goliath being the exceptions rather than the rule. This paucity of examples is due in large part to the so-called liability of smallness which suggests smaller firms are more vulnerable to competition, a constraint that is especially

Because the $750.00 was given as a donation to the non-profit organization, it will be viewed as an asset. Since the preparation of the tax return was given in exchange for the donation, it is considered a gift and thus not an asset. Next, one must inquire as to whether the firm of Good and Good's liability should be measured at out of pocket cost, at full costs, or at

An appellate court case that found the employer liable for hostile environment sexual harassment is Kunin v. Sears Roebuck & Co. Under this claim, Karen Kunin was sexually harassed by a male employee based upon the abusive and derogatory language that was used. Kunin did not report any abuse to her employer other than to asking if cursing was harassment. The U.S. Court of Appeals found that an employer must

Laying of benefits that accrue to the student before the court further supports the case. In conclusion, solving issues that dent school's safety is successful if it involves the students, school administration, parents and the community at large. This allows for identification of the root causes of the problem that lead to violent behavior and drug abuse. The school should put in place forums that allow students to raise safety

For example, drunk and disorderly behavior might be a minor infraction in the real world, but a student who continually disrupts the community can be asked to leave it, given the risk he or she poses to other students. But colleges must guard against assuming responsibility for student's hurt feelings -- for example, it is conceivable that having overly stringent hate speech standards that could limit the ability of

It is also a cloudy issue as to whether a company can terminate employment if an individual commits and is convicted of a crime while they are in the employment of the company. If such a crime were a low level crime, that could be thought of as a "gateway" crime such as possession of pornography, soliciting prostitution or prowling, but not a crime sufficient to be made public