Employees discovers a loophole in the security whereby the employees may access the personnel records

Select from one of the following scenarios:

You are the IT administrator for your company. One of the employees discovers a loophole in the security whereby the employees may access the personnel records of other employees in the company. Personnel records include names, addresses, Social Security numbers, disciplinary actions, annual reviews, and salary information. You are working on a time-sensitive project and do not fix the problem for 2 weeks. As you are fixing the problem, you note that several employees have accessed personnel records using the loophole.
You are the CIO of a large national auto retailer. As a part of your service, you offer auto loans through your dealerships. This requires your company to collect and store personally identifiable information on your customers. Additionally, you store customer bank account and credit card information so that customers can use automatic payment options for their loans. Recently, your company has been hacked, and a significant number of client accounts have been breached. The CEO is demanding that the IT group handle this privately rather than reporting the breach for fear that publicizing the information will have a negative effect on quarterly earnings.
Analyze your chosen scenario from the aspect of computing ethics and privacy ethics. Discuss the ethical dilemma from the perspective of societal ethics, organizational ethics, and individual ethics. Research on the Internet to determine what data security and privacy laws are relevant in this scenario. Describe each law and consequences for violation of the law. Discuss the reputational and financial impact this scenario might have on the organization. From the perspective of the IT administrator in scenario 1, or the perspective of the CIO in scenario 2, how would you respond to the situation? Justify your response from an ethical and legal perspective.

Your paper should be 2–3 pages in length and follow APA format.
Include Table of
Use Times New Roman 12 pt font.
Select one of the scenarios provided.
Analyze the scenario from a computing ethics and privacy ethics perspective.
Analyze the scenario from a societal ethics, organizational ethics, and individual ethics perspective.
Identify relevant data security and privacy laws for this scenario and the consequences for violating these laws.
Discuss the reputational and financial impact on the organization in the chosen scenario.
Discuss how you would respond to the situation and justify your choice.

Our customer support team is here to answer your questions. Ask us anything!