While walking through your office section, you are motioned over
to a desk where two of your co-workers are laughing and pointing at
a monitor screen. One of the co-workers whispers that he found a
folder on the file server marked private with over 1,200 selfies
belonging to the receptionist, many of them revealing. Your
co-worker added his administrator credentials to the folder
permissions to gain access. The second co-worker states he will
make a copy of the folder and upload some of the more revealing
pictures to the Internet. You are about to become complicit in the
violation of the receptionist's privacy. What are your ethical
concerns, and how will you proceed?
Your journal entry must be at least 200 words
Hi,
This kind of issues will arise in most of the companies and most of
them are womens/girls.
Obviously this kind off issues need to be solved, when you are in
that situations.
First it is an unlawful issue.If yes then find the persons involved in, including the receptionist.
Then find where the issue is originated, here on the "file
server".So the issue need to be fixed on the server.
Don't let them(co-workers including the receptionist) know that you
trying to solve this issue. Go to the file server real(who manages
the servers) administrator, then explain the issue. Now ask the
admin to remove access to that folder.
Finally go to the manager/CEO/Head clearly explain them what happened exactly. Then call your co-workers and ask them to remove the duplicated files and images on INTERNET. Give an strict warning to all the employees that no one should access others personal information.
Don't let your higher officials to take your name in this context. Just solve this type issues as an Intelligence officer(We know we are not , but we need to be careful).
One important thing is that no where we including the receptionist, so that we are our company name is not spoiled at the same time the victims won't try any kind suicide kind of thins.
While walking through your office section, you are motioned over to a desk where two of...
Scenario 4-1, from pg. 119 of your textbook: "While you are working the help desk for a corporate network, a user named Leo calls to request access to the files for Trinity, a new classified project. The Trinity files are stored in a shared folder on a Windows Server 2012 R2 workgroup file server, which is locked in a secured underground data storage facility in New Mexico. Aftter verfiying that he has the appropriate security clearance for the project, you...