Western Governors University
C841 Legal Issues in Information Security Task 2
A1: Discussion of Ethical Guidelines or Standards: In regards to the TechFite case
study, there are a number of relevant information security moral principles. First, all
sensitive or proprietary information encountered on the job should be treated with
respect and kept private. Second, professional responsibilities are to be discharged
with integrity and diligence in accordance with all applicable laws. In addition, the
professional reputations of coworkers, employers, and customers should not be
intentionally slandered or brought into question. Moreover, all work should be
conducted in a manner consistent with information security best practices. Finally,
employees should not engage in any activities that may constitute a conflict of interest.
A1a: Justification of Standards or Guidelines: All of these tenets can be found in the
ethics policies of prominent organizations throughout the IT community. For example, the
Information Systems Security Association International (ISSA) Code of Ethics echoes the
sentiment that data privacy must be maintained (ISSA Code of Ethics, 2016). It also
emphasizes the importance of industry best practices and prohibits relationships that could
be construed as a conflict of interest (ISSA Code of Ethics, 2016). The International
Information Systems Security Certification Consortium (ISC)² addresses professional
responsibilities, stating that individuals should “act honorably, honestly, justly, responsibly,
and legally” ((ISC)² Code of Ethics, 1996). The American Society for Industrial Security
(ASIS) speaks to the issue of professional reputations, declaring that personnel must not
“maliciously injure the professional reputation or practice of
, colleagues, clients, or employees” (ASIS Certification Code of
Professional Responsibility, 2018).
A2: Description of Unethical Behaviors: There were a number of individuals and groups
within TechFite whose behavior was unethical. The head of the Applications Division, Carl
Jaspers, failed to safeguard sensitive data, encouraged immoral surveillance techniques and
had a relationship with IT Security Analyst Nadia Johnson that represented a clear conflict of
interest. This relationship was a quid pro quo arrangement where Mr. Jaspers gave Ms.
Johnson gifts and positive reviews in exchange for not reporting the division’s
violations (Jackson, n.d., p. 2). Nadia Johnson accepted these bribes and
subsequently produced false reports that claimed there was no unusual activity within
the division (Jackson, n.d., p. 2). The Business Intelligence (BI) Unit within the
Applications Division accessed other divisions without authorization, viewed private
information without permission, mishandled customer data and performed penetration
tests without obtaining consent (Jackson, n.d., p. 3). Specifically, BI Unit employees
Sarah Miller, Jack Hudson, and Megan Rogers performed vulnerability scans of rival
company’s networks. In addition, Mr. Hudson “coordinates efforts by third parties to
gather intelligence through surveilling and through mining companies’ trash” (Jackson,
n.d., p. 3). Furthermore, the Marketing/Sales Unit did not perform proper separation of
duties and the Financial Unit neglected to audit their payment records.
A3: Factors: The most obvious issue is the lack of an established Code of Ethics at TechFite.
Employers often make the mistake of assuming their staff understand what conduct is
considered acceptable and will abide by these precepts without instruction. While in a perfect
world this would be true, in reality this is not the case. A formal policy must be