An ethical dilemma that I have faced in my life.
I am a researcher at a large gambling club and I worked after hours to perform a critical task when I realized that I was missing the information I had sent to my partner Robert. I also saw Robert compose his secret key a few days ago and I chose to register on his PC and send me the information. After doing so, I see an open email about the bets that Robert has made in recent days with a book of bets nearby. All club representatives are taboo to participate in betting exercises to maintain a strategic distance with any trace of irreconcilable situation. I realize I must report, but I must confess that I ignored the company’s data innovation guidelines by joining Robert’s computer. In case I invite Robert to stop betting, I should tell him the source of his data. I did not report the case because it was also at the base. I chose to focus on what I had brought to his email and refrained from any additional inconvenience, because even if he was wrong, I was also in the field.
It is based on the fact that protection, trust and security are intimately linked, as are law and morality. Security and security arrangements depend on trust (for example, only those with confidence to enter the unavailability area can remain secure, unless one trusts the security provider). The violation of protection implies a risk, in this way, a security risk. The law establishes objectives when the moral cannot (for example, the moral realizes that it is not correct to behave, the law rejects cheaters); morality can give substance to the law (for example, the law allows the exchange to generate benefits, while morality makes a contribution to ensure that the exchange is conducted reasonably).
The breaks in the protection irritate the confidence and can debilitate or lose the security; it is a manifestation of insolence against the law and a violation of moral standards. Information security or data security or information guarantee) refers to the access, use and accumulation of illegal information and information related to the object directly in the information. This refers to the possibilities offered by unauthorized access to private information, the improper use of information, the accuracy and the completion of the collection of information about an individual or persons (including associations) through innovation, access to content of information and direct access. to the information of the subject; Possession and rights to review, update or correct this information.