Ethical Ethics Case

1750 Words7 Pages
In this case, Diane is facing choices that are entirely ethical and we can classify this case as an ethical dilemma. Diane was hired to build a system for a company. However, the company does not have enough money to follow suggestions that Diane has listed out for them. In order to make the limited budget work, they have told Diane to build a less secure system. All the CEO, director of computing and director of personnel have agreed upon this option. Diane is a professional and from her analysis of the company’s needs and the type of data they have, she has deemed the option the company chooses to be unacceptable with the extremely sensitive data that will circulate in the system. Diane will have to make decision between building a system…show more content…
The practitioners are encouraged to provide full disclosure of all system 's limitations and problems (ACM). In our case, we can see that Diane has advised the company all the options available to build a good secure system. She is also honest in the sense that she told the company about the insufficiency of the security system and did not follow their requests right away just to get the contract for herself. We can conclude that Diane has followed this principle and this shows Diane has good professional ethics with respect to this…show more content…
As explained in the case, sensitive data contained in the system include performance evaluations, medical records for filing insurance claims, salaries, and so forth. Privacy is an important aspect of security. In today 's world, much of our information is exposed on the Internet and susceptible to theft of data and identity for bad purposes. Computing and communication technology have enabled us to collect and exchange information on a large scale, but with that benefit we are also risking threats of our privacy being violated (ACM). The responsibility of the professionals is to maintain the privacy and integrity of data describing individuals. This includes taking precautions to ensure the accuracy of data, as well as protecting it from unauthorized access or accidental disclosure to inappropriate individual. With the types of data listed above, we can see that if there is a cyber attack, private information of many people will be at risk. Since privacy is the core value of security, it is certainly one of the most important criteria to look into when building a system. In our case, Diane has performed her job and come up with a proper security plan for the system. She truly takes into account the privacy aspect of the data that will be circulating the system. Therefore she proposed a highly secure plan suitable for the extremely sensitive data that was a little more costly than what the company can
Open Document