Preview

Personal Data Breach

Good Essays
Open Document
Open Document
889 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Personal Data Breach
Ashely Madison, a website that promotes extra-marital affairs was subject to a massive data breach earlier this year; personal details of some 37 million users, as well as the companies financial records, were threatened with release. Subsequently, large caches of the data were posted online and a then-unknown hacking outfit named The Impact Team claimed responsibility. This breach not only compromised the data from the Ashley Madison database, but also Avid Life Media, who owns the Madison website, as well as two more “hookup” sites. The hackers claimed they were motivated in response to ALM claiming that for a mere $19, it would completely wipe that user “clean” and remove all history of site usage and any personally identifiable information. …show more content…
What can only be described as a maelstrom of angry spouses and partners, flooded social media, with any public figure or celebrity caught out on the email list, fair game for public humiliation and persecution. This raises an important ethical question, whether hacking personal data can ever be ethical. In one camp we have ASM misleading and storing customer data, unbeknownst to said customers and against what they thought they paid for. On the other side we have hackers, publishing this data for all to see, effectively “outing” ASM’s underhanded scheme, but the knock-on effect is putting millions of people details out there, for public naming and shaming, shockingly even leading to suicide in some instances, such as a pastor and professor in New Orleans taking his own life, citing the ASM …show more content…
As this became more of an issue, what with the growing use of information systems, in 1990 the Computer Misuse Act was passed. The act recognised the following offences:

Unauthorised access to computer material(i.e. using a computer without permission)

Unauthorised access to computer material with the intent to commit or facilitate commission of further offences(Covers actions such as attempting to use contents of an email message for blackmail, or stealing credit card information

Unauthorised modification of computer material. The most serious of the three offences, taking into account actions such as distributing virus or any malicious deletion of files, as well as altering an account to obtain fraudulent

You May Also Find These Documents Helpful

  • Good Essays

    Unit 4222-307 Answers

    • 767 Words
    • 4 Pages

    1. Identify legislation and codes of practice that relate to handling information in health and social care…

    • 767 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Jarvis, K., & Milletary, J. (2014, January 24). Inside a targeted point-of-sale data breach. Retrieved from http://krebsonsecurity.com/wp-content/uploads/2014/01/Inside-a-Targeted-Point-of-Sale-Data-Breach.pdf…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    The ChoicePoint data breach occurred in 2005. This insider data breach brought to light how a company can still be vulnerable to having data stolen from its databases even without any type of hacking of their system. By not properly vetting request for new accounts and request for information led to the theft of over a hundred thousand records of people’s personal information.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    * Computer Misuse Act 1990 - identifies a range of offences relating to unauthorised access to, or unauthorised modification of, computer records. This act may apply where an unauthorised third party accesses information being transferred. Enforcement is difficult, prosecutions uncommon but may be relevant where systems are used other than by authorised staff for approved purposes.…

    • 1008 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Unit 13 P4

    • 979 Words
    • 4 Pages

    This act was passed in 1990 and made three offences in relation to hacking. An offence under the computer misuse act would be to access someone else’s computer without any permission or authorisation (for example, looking through someone’s private files without them giving you permission). Another offence under the act was being able to access someone’s computer with the intent of causing another crime on top of that. An example of this would be to hack into someone’s banking account and transferring their money over to yourself, hacking without permission was the initial crime and theft of their money is the intended crime. The last offence to be added to the Computer Misuse Act was to edit the computer in any way. For example, you hack into a computer and leave a virus that will in time destroy the computer. McLinsoft computing staff must know that they cannot commit any of these actions. Doing so can lead to a prison sentence of up to 12 months (or 6 months in Scotland) [3]. Examples of computer misuse in the workplace can be obtaining colleague’s log-on details and accessing their private data, releasing a virus throughout the company network, or even hacking into other company networks and obtaining any…

    • 979 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Max finds any ‘loop-holes’ in websites and uses unauthorized access to gain data. Hackers utilized carefully planned strategies to commit their crime such as, “Take advantage of the enemy’s unreadiness, make your way by unexpected routes, and attack unguarded spots” (Poulsen, p. 159). Max obtained unauthorized access to vulnerable websites, and used this as an advantage to easily increase his gain in stolen information.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    The World Wide Web was created far enough back for most people not to care about the specific date. It is a great asset for school, work, and general entertainment. But, with all the good things it brings, there are some negatives as well. The internet, once a new place of discovery, is now a place of caution with danger lurking around every corner. Lori Andrews writes about the privacy issues of the web in her essay, “George Orwell…Meet Mark Zuckerburg.” Already, in her title she emphasizes Orwell’s rational fear of “Big Brother” is happening now on Zuckerburg’s social media site, Facebook. It is not just Facebook that has fallen to data aggregators invading the privacy of anyone online. Andrews describes data aggregators as people or companies…

    • 1630 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 252 Words
    • 2 Pages

    In agreement to the FTC, “hackers” could access anyone’s personal information at ease, change protected passwords without security questions, look at chats sent back and forth to a friend, and “send tweets” while using another person’s Twitter (Sangani, par. 21). According to Sangani, these so-called specialists accessed this information between January and May of 2009. Specialists had achieved information from over 45 different accounts in January, says Twitter, and approximately 10 in April of 2009. Luckily, it was only “for short periods of time.” (Sangani, par. 22).…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    The Computer Fraud and Abuse Act (CFAA) of 1984 protect certain types of information that the government maintains as sensitive. The Act defines the term “classified computer,” and imposes punishment for unauthorized or misused access into one of these protected computers or systems. The Act also mandates fines and jail time for those who commit specific computer – related actions, such as trafficking in passwords or extortion by threatening a computer. In 1992, Congress amended the CFAA to include malicious code, which was not included in the original Act.…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Abstract An information technology Acceptable Use Policy (AUP) creates an understanding of what is acceptable and not acceptable between users of a system and the system owner. The AUP provides the details of criteria to establish the same rules for everyone. The AUP also serves as documentation, which the user signs, to justify that the user know the rules that they are to follow and the consequences in not following the rules.…

    • 2122 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Ashley Madison is a well-known Canadian website that serves as both a social networking site and a dating service. Founded in 2002, it is a company that heavily markets to people who are married or in a relationship and still want to date. Throughout the years it has become one of the most controversial websites that had ignited many discussions on what’s ethical and what’s not. Even after receiving massive attention due to hackers obtaining personal data of current users, Ashley Madison continues its operations of providing nearly forty million users with its services. Although many people would argue what is wrong with the site, many others had made counter arguments…

    • 953 Words
    • 4 Pages
    Good Essays