Preview

Choicepoint and Sony , an Ethical Analysis

Powerful Essays
Open Document
Open Document
2180 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Choicepoint and Sony , an Ethical Analysis
Introduction:
Ethics refers to what comes off as right or wrong to an individual’s conscience .The internet age has brought about new ethical issues, not only for an individual but for the society as well as it has eased anonymous manipulation and distribution of information, creating new and easier paths for committing crimes like piracy, identity theft, infringement of an individual’s privacy etc. In this paper we will be analyzing the Choice-point case and the ‘Sony data breach ‘case from an ethical point of view. (Laudon &Laudon, 2010, p.128)
Background:
The ChoicePoint Data breach:
On September 27 of 2004, ChoicePoint,a company that aggregates and stores personal information, suspected that some of its small business customers were involved in suspicious activities and informed the police. (Paine, Phillips, 2008)On February of 2005, ChoicePoint only notified those residents of California whose data had been leaked to the illegal customers, since a certain law in California requires it. A protest from the public, however, forced the company to notify the details of the breach to the other involved parties residing in the other states. The swindlers who scammed ChoicePoint had created over 50 accounts with previously stolen identities over the course of a year or even longer. (Pantesco, 2006)
Changes in business practices (Otto, Anton & Baumer, 2007):
ChoicePoint made numerous changes after the 2004-2005 data breach. The company closed the 50 fake accounts and made a policy to refuse any faxed business licenses in the future .The Company formed a new policy, that all nongovernmental organizations need to be re-credentialed in order to do business with it, and increased its procedures in verifying the identity of the company. More stringent and better business policies in ensuring the safety of their customer’s data, for e.g. partial masking of social security numbers were employed. The company continued its investigations of its databases for



References: * Laudon, K. & , Laudon, J(2010).Management Information Systems .(11th edition).New Jersey: Prentice Hall * Paine, L.S., Phillips, Zack * Paine, L.S., Phillips, Zack. (2008, March 21)ChoicePoint (B). (2008, March 21). Harvard Business School * Otto, P * Culnan, Mary J. and Williams, Cynthia C. 2009. "How Ethics Can Enhance Organizational Privacy: Lessons from the ChoicePoint and TJX Data Breaches," MIS Quarterly, (33: 4) pp.673-687. * Eddy, N * Seybold, P. (2011, May 04). [Web log message]. Retrieved from http://blog.us.playstation.com/2011/05/04/sonys-response-to-the-u-s-house-of-representatives/ * Pantesco, J * Evers, J. Jurist Legal News and Research , (2005). Break-in costs choicepoint millions. Retrieved from CNet News website: http://news.cnet.com/Break-in-costs-ChoicePoint-millions * Hirai, K * Wesley, Y. (2011). Psn: Sony outlines "welcome back" gifts. Retrieved from website: http://www.eurogamer.net/articles/2011-05-01-psn-sony-outlines-welcome-back-gifts

You May Also Find These Documents Helpful

  • Powerful Essays

    Cmgt410 Team Paper Riordan

    • 4511 Words
    • 19 Pages

    Laudon, K. C., & Laudon, J. P. (2010). Management Information Systems (11th ed.). Upper Saddle River, NJ: Prentice Hall.…

    • 4511 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Laudon, K. C., & Laudon, J. P. (2012). Management information systems: Managing the digital firm (12th ed.).…

    • 3836 Words
    • 16 Pages
    Best Essays
  • Powerful Essays

    Ethics Case Analysis

    • 1127 Words
    • 4 Pages

    “If it was intruders, they had been deep enough into IVK’s CRM production servers to rename database files, which meant they could have also stolen customer data or corrupted it subtly. Unfortunately, the company’s CRM database does retain Social Security numbers and other…

    • 1127 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Cp Case Study

    • 976 Words
    • 4 Pages

    | * Many individuals lost their SSN to the criminals * More info can be accessed as a result which makes the customer or ChoicePoint more vulnerable to other crimes…

    • 976 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Assignment 2

    • 313 Words
    • 2 Pages

    Identity theft occurs in some of the largest companies and often times this security breach is kept quiet. This company has been hacked for customer’s birthdates twice in one month. This means that they are experiencing severe vulnerabilities and they need to take action immediately. When customers start hearing that the companies they deal with have had security breaches in their computer systems data, they panic and most tend to, discontinue associating with that particular company.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Target a large retail corporation that operates over 1,700 stores across the United States. They also operate as an online retailer at target.com. In 2012 the retailer earned more than $73 billion dollars in revenue and grew their sales by 5.1% from the previous year (“Corporate overview,” 2013). Looking at the revenue and sales growth rate it is hard to fathom that more money could not be spent to ensure that consumer data is protected as much as possible. As information security specialists one of the worst things that can happen is our network gets infiltrated and customer information is stolen. On December 19, 2013 Target released a statement stating that they have had an information security breach and suggested that as much as 70 million credit card information had been stolen (Jarvis & Milletary, 2014).…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Ps4 vs Xbox 1

    • 1109 Words
    • 5 Pages

    The year 2013 marked the new era of video game consoles. Sony and Microsoft, two heavyweight entertainment companies that are both fighting for the title of the best console. In one corner you have Sony’s Playstation 4 and in the other sits Microsoft’s Xbox one. Both of these are next generation consoles that use the latest technologies to give the gamer a better feel for the game that he or she plays. Both of these consoles are similar in a variety of ways but, for the similarities that they share they also contain many differences. Sony’s Playstation 4 and Microsoft’s Xbox one are both two powerful consoles but, are completely different from each other before I can one I need to compare the two.…

    • 1109 Words
    • 5 Pages
    Good Essays
  • Good Essays

    But, the actual compromise data did not fall into the criteria of what the law required for notifications. This created an ethical dilemma for the Executive team, just because the law states that notification does not require notification for the data type in the breach. But, the heavy-handed control of the Executive staff team, he forced public notification that a larger number of data elements were compromised, under protest of other Officers. Even though the first notification was not correct, the media decided to combine both notifications and came to the conclusion of how many data elements were access during the breach. With the prevailing news stories, correct or not, Target’s reputation and sales suffered, Chief Marketing Officer Jeffrey Jones summed it up the best, “That’s hammering us” (Kinicki & Williams, 2013, pg. 37,…

    • 823 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Hp Case Study

    • 1513 Words
    • 7 Pages

    We do not think that the actions taken by HP’s chairman, legal department, and investigators to find the source of the unauthorized disclosures were ethically justifiable. One theory of ethical reasoning that we think relates to this case is the theory of utilitarianism. Utilitarianism is defined as a normative ethical theory that places the locus of right and wrong solely…

    • 1513 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Security Breach

    • 856 Words
    • 3 Pages

    On October 3, 2013, The Adobe Systems Incorporated in the United States of America discovered that there was a cyber-attack on their network during its regular monitoring of security check. The hackers made it through breaking in to the network and stole the sensitive and personal data of the customers which includes encrypted credit and debit card information, illegal access of customer ID 's and also source code of other various Adobe products like Adobe Acrobat and ColdFusion, ColdFusion Builder. On the companies saying that the hackers got access to the encrypted customers passwords and debit and credit card numbers too. There is also a huge loss of data occurred during this data breach which impacted immense number of people internally and externally.[1][2][3]…

    • 856 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    When it comes to the terms privacy, profit, and surveillance, there are many ethics that go into these three terms. Throughout this paper, I will talk about all the ethics that go into these three terms and how they affect everything and everyone. First I will start by defining each term and what it means to everyone to have privacy, provide profit and use surveillance. I will then talk about the ethics part of each term and what they mean in a business aspect of society.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The society develops with unbelievable speed, from telegraphy, telephone, radio of 19th century to the modern 21th century, which is the Age with rapid developing and growing of knowledge and information. For example, Internet has been used widely everywhere in the world. We call it “global, Web-based platform, this platform enables people to connect, compute, communicate, compete, and collaborate anywhere, anytime to access limitless amounts of information, services, and entertainment”(Rainer & Cegielski, 2011 ). It is so obvious Information technologies benefit us a lot; in the meantime, IT also can raise new ethical problems.…

    • 820 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Choicepoint

    • 2624 Words
    • 11 Pages

    still facing too many critics and challenges such as: (a) dealing with the privacy of the…

    • 2624 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    The leaked details included customer names, home phone numbers, addresses and email IDs, but did…

    • 905 Words
    • 4 Pages
    Better Essays

Related Topics