Question

6. There is a lot of debate worldwide concerning encryption and the right to privacy and...

6. There is a lot of debate worldwide concerning encryption and the right to privacy and security versus the right of law enforcement to be able to access all encrypted material. A prime example is the court case a few years ago between Apple Computers and the US Department of Justice (DOJ) in which Apple has appealed a court order that would force it to build a way around the encryption on a suspect's iphone. Border guards can force you turn over passwords etc. for your digital devices or be denied entrance. What are the arguments for and against this access? Should law enforcement agencies always be able to access encrypted personal data. Why or why not?

7. You are a computer forensics analyst that works for the security department of the large multinational ACME Corporation. The corporation has discovered that some of their company’s closely guarded future product plans have been leaked to a competitor. ACME believes that one or more of the employees in the research department must be responsible. Security have contacted law enforcement and they have agreed to assist security in raiding the research department to look for evidence. What are five things that should be done prior to the raid and why? What would we be searching for and where would we look to find it?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

6.

The issue here was that a suspect was using a apple phone to communicate with his fellows and the suspect was killed in the encounter and the police got his phone and demanded apple to unlock that phone so that the police can have the details of the plan but apple rejected the request because it violated their policy. Here the apple was right as there main focus is to protect the user data not to create a backdoor for the law enforcement which can be used by the hacker. The law enforcement should be allowed to have the personal data because it comes under the right to privacy and everyone has right to have privacy and in order to safeguard their data people buys things that are usually costlier and apple is not a cheap product and people buy it to protect their data. The law enforcement if allowed will end up having apple to build a spy software to keep an eye on the user to encounter any threats and keeping a eye will violates the privacy.

Add a comment
Know the answer?
Add Answer to:
6. There is a lot of debate worldwide concerning encryption and the right to privacy and...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 6. There is a lot of debate worldwide concerning encryption and the right to privacy and...

    6. There is a lot of debate worldwide concerning encryption and the right to privacy and security versus the right of law enforcement to be able to access all encrypted material. A prime example is the court case a few years ago between Apple Computers and the US Department of Justice (DOJ) in which Apple has appealed a court order that would force it to build a way around the encryption on a suspect's iphone. Border guards can force you...

  • 7. You are a computer forensics analyst that works for the security department of the large...

    7. You are a computer forensics analyst that works for the security department of the large multinational ACME Corporation. The corporation has discovered that some of their company’s closely guarded future product plans have been leaked to a competitor. ACME believes that one or more of the employees in the research department must be responsible. Security have contacted law enforcement and they have agreed to assist security in raiding the research department to look for evidence. What are five things...

  • You are a computer forensics analyst that works for the security department of the large multinational...

    You are a computer forensics analyst that works for the security department of the large multinational ACME Corporation. The corporation has discovered that some of their company’s closely guarded future product plans have been leaked to a competitor. ACME believes that one or more of the employees in the research department must be responsible. Security have contacted law enforcement and they have agreed to assist security in raiding the research department to look for evidence. What are five things that...

  • Read the case study below and answer the questions in a 2 page paper: The FBI...

    Read the case study below and answer the questions in a 2 page paper: The FBI & Apple: Security vs. Privacy In December 2015, the FBI attained the iPhone of one of the shooters in an ISIS-inspired terrorist attack that killed 14 people in San Bernardino, California. As part of the investigation, the FBI attempted to gain access to the data stored on the phone but was unable to penetrate its encryption software. Lawyers for the Obama administration approached Apple...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

  • Assess whether from a utilitarian, rights, justice and caring perspective, Unocal did the right thing in...

    Assess whether from a utilitarian, rights, justice and caring perspective, Unocal did the right thing in deciding to invest in the pipeline and then in conducting the project as it did. In your view, and using your utilitarian, rights, justice and caring assessments, did Unocal do the right thing? CASE: Unocal in Burma Union Oil Company of California, or Unocal, was founded in 1890 to develop oil fields around Los Angeles and other parts of California. By 1990, Unocal had...

  • Will facebook be able to have a successful business model without invading privacy? explain your answer?...

    Will facebook be able to have a successful business model without invading privacy? explain your answer? could facebook take any measures to make this possible? BUSINESS PROBLEM-SOLVING CASE Facebook Privacy: Your Life for Sale Facebook has quickly morphed from a small, niche haps most obviously. Facebook allows you to keep in networking site for mostly Ivy League college stu- touch with your friends, relatives, local restaurants, dents into a publicly traded company with a market and, in short, just about...

  • Please read the article and answer about questions. You and the Law Business and law are...

    Please read the article and answer about questions. You and the Law Business and law are inseparable. For B-Money, the two predictably merged when he was negotiat- ing a deal for his tracks. At other times, the merger is unpredictable, like when your business faces an unexpected auto accident, product recall, or government regulation change. In either type of situation, when business owners know the law, they can better protect themselves and sometimes even avoid the problems completely. This chapter...

  • First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below...

    First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....

  • Actions that damage a company and its employees should be stamped out, everyone would agree. But ...

    Actions that damage a company and its employees should be stamped out, everyone would agree. But should the people responsible be stamped out, too? HBR CASE STUDY The Reign of Zero Tolerance by Ben Gerson "Mr. Pemberton?" manager. The guards had radioed her that the "Yes, that's me," Simon replied distractedly, his back turned. target wasn't putting up much resistance. "Your personal belongings will be messen The two burly gentlemen who had suddenly gered to your home later today," Sallie...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT