From the definitions given above, it is clear that in order for an act or action to be considered unethical, it has to contradict the personal judgement of what is considered to be correct. Whereas illegal act is an act violating an official law or regulation. For example, in software development domain, when an employer forces employees (software developers) to develop only a partially functioning software in order to increase profitability of the company, while not illegal it could be considered as unethical act. On the other hand, when an European Union (EU) based hosting company stores personal records of its clients on servers in North America, as a backup or disaster recovery site, with the same or stricter security controls in place, although it does not violate any ethical principals it is forbidden by official EU rules (European Commission of Justice, 2009). In practice data transfer to non-EU entities is possible if the same core principals of data protection are provided to the personal records of the individuals. Furthermore, EU and the Department of Commerce (DoC) have developed a framework – Safe Harbor, to bridge between privacy approaches and streamline the trade between the EU and US (export.gov, 2011).
Moreover, when discussing motivations
to conduct an illegal act and unethical act, there is a clear
distinction between the two. Since ethical behaviour is dictated by
personal principals, an individual would have no desire to conduct an
unethical act. On the other hand, illegal acts as shown in the
example above, not always contradict personal ethical principals,
therefore an incentive or gain (financial, personal, etc.) could be a
driver for an illegal act.
As a continuation of this topic, it
would be beneficial to examine the potential conflict between
corporate policies, as oppose to provincial or federal laws which
were discussed above, and personal ethical principals. As highlighted
by Verizon Business 2008 data breach investigations report, in
finance and tech industries, 39 and 39 percent respectively of
breaches originated from internal sources – internal employees
(Wade H. Baker at al, 2008).
Bibliography
- Dictionary.com, "ethical," in Collins English
Dictionary - Complete & Unabridged 10th Edition. Source
location: HarperCollins Publishers.
http://dictionary.reference.com/browse/ethical.
Available: http://dictionary.reference.com.
Accessed: June 04, 2011.
- Dictionary.com, "legal," in Collins English
Dictionary - Complete & Unabridged 10th Edition. Source
location: HarperCollins Publishers.
http://dictionary.reference.com/browse/legal.
Available: http://dictionary.reference.com.
Accessed: June 04, 2011.
- Dictionary.com, "motivation," in Collins English
Dictionary - Complete & Unabridged 10th Edition. Source
location: HarperCollins Publishers.
http://dictionary.reference.com/browse/motivation.
Available: http://dictionary.reference.com.
Accessed: June 04, 2011.
- European Commission of Justice 2009, Data Protection
[online], Available from:
http://ec.europa.eu/justice/policies/privacy/index_en.htm
(accessed June 04, 2011).
- export.gov 2011, The
U.S.-EU & U.S.-Swiss Safe Harbor Framework [online]. Available
from: http://www.export.gov/safeharbor/
(accessed June 04, 2011).
- Wade H. Baker, C. David
Hylender, A. Bryan Sartin, Peter Tippett and J. Andrew Valentine
2008, 2008 Data Breach investigations Supplemental Report [online].
Available from:
http://www.verizonbusiness.com/resources/whitepapers/wp_supplemental-report-specifics-for-the-financial-services-food-beverage-retail-and-tech-services-industries_en_xg.pdf
(accessed June 04, 2011).
No comments:
Post a Comment