Preview

Personal Data Breach

Good Essays
Open Document
Open Document
889 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Personal Data Breach
Ashely Madison, a website that promotes extra-marital affairs was subject to a massive data breach earlier this year; personal details of some 37 million users, as well as the companies financial records, were threatened with release. Subsequently, large caches of the data were posted online and a then-unknown hacking outfit named The Impact Team claimed responsibility. This breach not only compromised the data from the Ashley Madison database, but also Avid Life Media, who owns the Madison website, as well as two more “hookup” sites. The hackers claimed they were motivated in response to ALM claiming that for a mere $19, it would completely wipe that user “clean” and remove all history of site usage and any personally identifiable information. …show more content…
What can only be described as a maelstrom of angry spouses and partners, flooded social media, with any public figure or celebrity caught out on the email list, fair game for public humiliation and persecution. This raises an important ethical question, whether hacking personal data can ever be ethical. In one camp we have ASM misleading and storing customer data, unbeknownst to said customers and against what they thought they paid for. On the other side we have hackers, publishing this data for all to see, effectively “outing” ASM’s underhanded scheme, but the knock-on effect is putting millions of people details out there, for public naming and shaming, shockingly even leading to suicide in some instances, such as a pastor and professor in New Orleans taking his own life, citing the ASM …show more content…
As this became more of an issue, what with the growing use of information systems, in 1990 the Computer Misuse Act was passed. The act recognised the following offences:

Unauthorised access to computer material(i.e. using a computer without permission)

Unauthorised access to computer material with the intent to commit or facilitate commission of further offences(Covers actions such as attempting to use contents of an email message for blackmail, or stealing credit card information

Unauthorised modification of computer material. The most serious of the three offences, taking into account actions such as distributing virus or any malicious deletion of files, as well as altering an account to obtain fraudulent

You May Also Find These Documents Helpful

  • Good Essays

    Unit 4222-307 Answers

    • 767 Words
    • 4 Pages

    1. Identify legislation and codes of practice that relate to handling information in health and social care…

    • 767 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Choicepoint Data Breach

    • 865 Words
    • 4 Pages

    The ChoicePoint data breach occurred in 2005. This insider data breach brought to light how a company can still be vulnerable to having data stolen from its databases even without any type of hacking of their system. By not properly vetting request for new accounts and request for information led to the theft of over a hundred thousand records of people’s personal information.…

    • 865 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The year is 2010, the era is the 21st century; and we, citizens of the world, are living in the Information Age. Our information is made available on the Internet where it can be viewed by millions. The days where our data was recorded on scraps of paper and left in a box in an office along with thousands of other registers are long gone. Our personal data is permanently recorded in the hard drives of computers where they can be analysed and exploited by anyone with access to that computer; or worse, identity thieves and hackers may get their hands on the data.…

    • 3006 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Kingpin Ananlytical Essay

    • 377 Words
    • 2 Pages

    Max finds any ‘loop-holes’ in websites and uses unauthorized access to gain data. Hackers utilized carefully planned strategies to commit their crime such as, “Take advantage of the enemy’s unreadiness, make your way by unexpected routes, and attack unguarded spots” (Poulsen, p. 159). Max obtained unauthorized access to vulnerable websites, and used this as an advantage to easily increase his gain in stolen information.…

    • 377 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In April 2011, hackers obtained person information from over 100 million PlayStation Network users and Sony Online Entertainment users including credit, debit, and bank account information. This breach cost Sony and credit card issuers up to a total of $2 billion dollars (Laudon, 2013). During the time of the breach, security and control were not top priority. According to this case study Sony was using an older version of Apache Web Server software that was known for its security issues and compromised the security of Sony’s firewall, allowing hacker easy access. As for control, Sony obviously did not have appropriate policies or organizational procedures…

    • 328 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cybercrime is defined as a crime in which a computer is the object of a crime or is used as a tool to carry out a crime. Cybercriminals may use computer technology to access personal information, business trade secrets, or use the Internet for exploitive or malicious purposes. Offenders who perform these unlawful actions are often referred to as hackers (Janssen, 2010). There are several different types of cybercrimes, however four of the most common cybercrimes are: cyber fraud, cyber theft, stalking, and hacking.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The World Wide Web was created far enough back for most people not to care about the specific date. It is a great asset for school, work, and general entertainment. But, with all the good things it brings, there are some negatives as well. The internet, once a new place of discovery, is now a place of caution with danger lurking around every corner. Lori Andrews writes about the privacy issues of the web in her essay, “George Orwell…Meet Mark Zuckerburg.” Already, in her title she emphasizes Orwell’s rational fear of “Big Brother” is happening now on Zuckerburg’s social media site, Facebook. It is not just Facebook that has fallen to data aggregators invading the privacy of anyone online. Andrews describes data aggregators as people or companies…

    • 1630 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Annotated Bibliography

    • 252 Words
    • 2 Pages

    In agreement to the FTC, “hackers” could access anyone’s personal information at ease, change protected passwords without security questions, look at chats sent back and forth to a friend, and “send tweets” while using another person’s Twitter (Sangani, par. 21). According to Sangani, these so-called specialists accessed this information between January and May of 2009. Specialists had achieved information from over 45 different accounts in January, says Twitter, and approximately 10 in April of 2009. Luckily, it was only “for short periods of time.” (Sangani, par. 22).…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Computer Fraud Act Of 1984

    • 2247 Words
    • 9 Pages

    The Computer Fraud and Abuse Act (CFAA) of 1984 protect certain types of information that the government maintains as sensitive. The Act defines the term “classified computer,” and imposes punishment for unauthorized or misused access into one of these protected computers or systems. The Act also mandates fines and jail time for those who commit specific computer – related actions, such as trafficking in passwords or extortion by threatening a computer. In 1992, Congress amended the CFAA to include malicious code, which was not included in the original Act.…

    • 2247 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Ashley Madison is a well-known Canadian website that serves as both a social networking site and a dating service. Founded in 2002, it is a company that heavily markets to people who are married or in a relationship and still want to date. Throughout the years it has become one of the most controversial websites that had ignited many discussions on what’s ethical and what’s not. Even after receiving massive attention due to hackers obtaining personal data of current users, Ashley Madison continues its operations of providing nearly forty million users with its services. Although many people would argue what is wrong with the site, many others had made counter arguments…

    • 953 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Information Acts Paper

    • 418 Words
    • 2 Pages

    The United States Computer Fraud and Abuse Act of 1986 (referred to in this article as the "Act") was an amendment to the Counterfeit Access Device and Computer Fraud and Abuse Act of 1984 (the "1984 Act"). It was the first comprehensive legislation in the United States to identify and provide for the prosecution of crimes committed through and against computer systems (Zegarelli, 2002). The initial 1984 Act addressed crimes in a very limited circle involving the government computers, but also consumer credit and government data, but did not cover any areas outside the afore mentioned scopes.…

    • 418 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cyber Crime

    • 1094 Words
    • 5 Pages

    a profit. Hackers hate authority that stands in the way of their financial goals. The penalty for…

    • 1094 Words
    • 5 Pages
    Good Essays
  • Better Essays

    Target Data Breach

    • 1162 Words
    • 5 Pages

    Jarvis, K., & Milletary, J. (2014, January 24). Inside a targeted point-of-sale data breach. Retrieved from http://krebsonsecurity.com/wp-content/uploads/2014/01/Inside-a-Targeted-Point-of-Sale-Data-Breach.pdf…

    • 1162 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Abstract An information technology Acceptable Use Policy (AUP) creates an understanding of what is acceptable and not acceptable between users of a system and the system owner. The AUP provides the details of criteria to establish the same rules for everyone. The AUP also serves as documentation, which the user signs, to justify that the user know the rules that they are to follow and the consequences in not following the rules.…

    • 2122 Words
    • 9 Pages
    Powerful Essays