Project #47635 - DB wk 2

You are the IT director of a large company in a competitive business. The company’s network is up-to-date with the latest security tools and software, and uses IP telephony. Lately some security breaches have exposed critical plans for new company products, which have allowed competitors to roll out comparable products quickly, and have cut into your company’s market share.

The CEO has called you into his office, and wants you to implement a 2-pronged plan to monitor employee network and communication activities, in order to pinpoint the source of the leak. The CEO wants all e-mail going out and coming into the company to be copied and stored in an e-mail database for easy retrieval, and he does not want the employees to know about this. The CEO also wants all activities on the network to be monitored, and you explain to him that this will mean intercepting IP telephony activities as well – and the CEO is fine with that.

In the context of this scenario, discuss the following questions:

  1. What are the ethical implications of implementing the CEO’s requests for e-mail interception and network monitoring?
  2. What are the social implications of such monitoring activity?
  3. Is the interception of employee e-mail and its archiving in a database legal? Does the interception of network traffic for IP telephony constitute a wiretap and thus require a warrant?

Subject Computer
Due By (Pacific Time) 11/18/2014 06:00 pm
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy