You are the IT director of a large company in a competitive business. The company’s network is up-to-date with the latest security tools and software, and uses IP telephony. Lately some security breaches have exposed critical plans for new company products, which have allowed competitors to roll out comparable products quickly, and have cut into your company’s market share.
The CEO has called you into his office, and wants you to implement a 2-pronged plan to monitor employee network and communication activities, in order to pinpoint the source of the leak. The CEO wants all e-mail going out and coming into the company to be copied and stored in an e-mail database for easy retrieval, and he does not want the employees to know about this. The CEO also wants all activities on the network to be monitored, and you explain to him that this will mean intercepting IP telephony activities as well – and the CEO is fine with that.
In the context of this scenario, discuss the following questions:
- What are the ethical implications of implementing the CEO’s requests for e-mail interception and network monitoring?
- What are the social implications of such monitoring activity?
- Is the interception of employee e-mail and its archiving in a database legal? Does the interception of network traffic for IP telephony constitute a wiretap and thus require a warrant?
|Due By (Pacific Time)
||11/18/2014 06:00 pm