Preview

is this an ethical dilemma?

Satisfactory Essays
Open Document
Open Document
773 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
is this an ethical dilemma?
Part A: Ethical Dilemma Essay
Ethical Dilemma Description
British’s fourth largest mobile operator, T-Mobile who is under E E Phone Company faced an ethical dilemma that concerned the T-Mobile company recall matter in the year end of 2008 till 2009. The stuff in T-Mobile, United Kingdom allegedly sold customer data to brokers, who in turn sold it to other competing phone firms. These firms then started calling customers, whose contracts with T-Mobile were about to expire, trying to get them to switch to their network. (Maravis.com, 2014). When the investigators raided addresses, they found that the scam involved millions of records.
The German-owned company expressed anger that the media had been alerted to the breach when it had believed it would be kept out of the spotlight until the case came to court. "When it became apparent that contract renewal information was being passed on to third parties without our knowledge, T-Mobile alerted the ICO.” The company had been asked to keep all information on this case strictly confidential so as to avoid prejudice to the investigation and prosecution," the company added. "T-Mobile was therefore surprised at the way in which these statements were made [by the ICO]."
The Information Commissioner, Christopher Graham did not at first name the operator involved, saying it could prejudice a prosecution, but added that the stolen information included names, addresses, telephone numbers and other contract details. However, after Orange, Vodafone, 3, Virgin and 02 said they were not the subject of an investigation, T- Mobile was forced to confirm its involvement (Independent.co.uk, 2014).
According to people who know, the penalties for such illegal sales are too low to teach the persons from engaging in them a lesson (Maravis.com, 2014). Thus, due to the worldwide attention, T-Mobile faced an ethical dilemma of what decision the company should make to dealing with this problems.
Why it is an ethical dilemma in a business

You May Also Find These Documents Helpful

  • Good Essays

    It/205 Week 5 Checkpoint

    • 928 Words
    • 4 Pages

    The thieves used several entry points to access TJX corporation systems. They accessed many TJX’s retail stores through poorly secured kiosks. The hackers opened up the back of those terminals and inserted USB drives to install utility software that enabled them to turn the kiosks into remote terminals linked to TJX’s networks. The firewalls that TJX use and had in place did not have enough security to offer and let bad traffic in from the in-store kiosks. The hackers also used mobile data access technology to decode data transmitted wirelessly between handheld price-checking devices, cash registers, and the store’s computers. TJX was using an outdated (WEP) encryption system, which made it easy for hackers to crack. The hackers stole user names and password to setup their own TJX account using handheld equipment and also used the data to crack encryption codes. This allowed them to access TJX system from any computer with internet. The hackers also obtained personal information which could be used for identity theft, including driver license numbers, social security numbers, and military identification of 451,000 customers. The data theft took place over an eighteen month period without anyone’s knowledge. The security controls in place out grew the total size of the company. The system was way overdue for a complete overhaul, because the system was so far out of date with the new technology. I read further about this on the internet and came to find out that the hackers went undetected for seventeen months. This time frame gave the hackers plenty of time to take forty-five…

    • 928 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    has handled their data as a violation of privacy. It is extremely unethical to do so, but…

    • 539 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Verizon business researched and reported in 2009 a case study involving data breaches in secured network. Within their findings, they summarize the threats, which industry, and which records are the most popular. The report fist showed that a percentage of the hacking from outside sources came from the European Union, and the most popular info being stolen was financial and retail goods.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    The ChoicePoint data breach occurred in 2005. This insider data breach brought to light how a company can still be vulnerable to having data stolen from its databases even without any type of hacking of their system. By not properly vetting request for new accounts and request for information led to the theft of over a hundred thousand records of people’s personal information.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Good Essays

    “According to court records the massive T-Mobile breach first came to the government's attention in March 2004, when a hacker using the online moniker "Ethics" posted a provocative offer on muzzfuzz.com, one of the crime-facilitating online marketplaces being monitored by the Secret Service as part of Operation Firewall.” ( Google\ Tmobile.com)…

    • 241 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Chicago Tylenol Murders

    • 302 Words
    • 2 Pages

    Although this cost them millions of dollars in sales and product. They announced a 100,000 reward on information that would led to the person that was responsible for this.…

    • 302 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 233 Words
    • 3 Pages

    To complete this assignment, you need to access the recent case study by Verizon on data breaches, which is available at the following link:…

    • 233 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    On September 27 of 2004, ChoicePoint,a company that aggregates and stores personal information, suspected that some of its small business customers were involved in suspicious activities and informed the police. (Paine, Phillips, 2008)On February of 2005, ChoicePoint only notified those residents of California whose data had been leaked to the illegal customers, since a certain law in California requires it. A protest from the public, however, forced the company to notify the details of the breach to the other involved parties residing in the other states. The swindlers who scammed ChoicePoint had created over 50 accounts with previously stolen identities over the course of a year or even longer. (Pantesco, 2006)…

    • 2180 Words
    • 9 Pages
    Powerful Essays
  • Better Essays

    NSA Spy Agency Analysis

    • 1354 Words
    • 6 Pages

    On the 5th of June 2013, the world was forever changed. The Guardian had just published an article exposing a top secret court order requiring Verizon to hand over millions of customers’ phone records…

    • 1354 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 252 Words
    • 2 Pages

    Sangani asserts that Google’s browser computed a program that would initially concoct pictures of almost all streets located along with 30 countries between the year of 2006 and 2010. The program was addressed as “Google Streetview” (Sangani, par. 4). “Civil-rights advocates” alleged that Google forced rules upon what one could broadcast or search on the Web. Therefore, the newly designed program had quickly failed amidst the campaigners. The cameras of Google Streetview did not only capture pictures. Unfortunately, users of the program were being scammed by having their personal information swiped through “public and unprotected Wi-Fi access routers.” The personal information was combined with previously frequented Web sites and also emails. The “router owners” did not know that any of this information was being compiled at the…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Marketing Analysis on Sky

    • 2719 Words
    • 11 Pages

    Bibliography: * Hough, A. and Trotman, A. (2011) Phone hacking: timeline of News Corp 's failed BSkyB bid. Telegraph, [online] 21 July 2011. Available at: http://www.telegraph.co.uk/news/uknews/phone-hacking/8650113/Phone-hacking-timeline-of-News-Corps-failed-BSkyB-takeover-bid.html (accessed 17 November 2011).…

    • 2719 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    “The United States National Security Administration recently requisitioned all Verizon phone records in the US for a period of 3 months. Your telephone records (who you called and for how long) say a great deal about you. This was done with a court order and has been going on since 2001.”2…

    • 2169 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Ethical Dilemma

    • 812 Words
    • 4 Pages

    steal. (n.d.). The American Heritage® Stedman 's Medical Dictionary. Retrieved August 27, 2012, from Dictionary.com website: http://dictionary.reference.com/browse/steal…

    • 812 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Jail Security

    • 375 Words
    • 2 Pages

    allowed them an open line to any phone in the country, free and clear of…

    • 375 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Due to the technology available today children of all ages have access to the internet. In the 1960’s the internet became a major source of marketing, sales, and distribution of both products and services. Unfortunately many of these services were used by children under the age of 13 years old (Children's Online Privacy Protection Act (COPPA), 2011). Marketers were able to collect personal information from children through chat room and/or discussion board registration to track behavior of web suffers through advertisement and the promise of gifts in exchange for advertisement (Children's Online Privacy Protection Act (COPPA), 2011). These marketers collected this information about children and their families and compiled it into files then sold it to third parties for various commercial purposes (Koby). Also discovered were dangerous list marketing abuses. Investigative reports revealed how easily this list can be purchased and the power that can be exercised over individuals through the use of their personal information. On December 14, 1995 CNN reported that look up services could be used to locate children: “There is no law on the books that prevent a stranger from calling a 900-number and getting information about your children. In fact, until a few weeks ago, a subsidiary of R. Donnelley provided a service that did just that.” A CBS television reporter was able to purchase a list of children’s names using the name of a notorious killer (Children's Online Privacy Protection Act (COPPA), 2011). On May 12, 1996 the San Francisco Examiner reported: “To prove how…

    • 800 Words
    • 4 Pages
    Good Essays