CYBERSECURITY – A LEGAL and ETHICAL ISSUE

In the modern world, as computers have constantly increased in power and the range of capabilities, they have also evolved and provide more and more services to us. Gone are the days when we used computers only for checking and replying email messages or checking out websites. Today, we rely on computers for more complex activities like shopping online, handling conference calls, keeping in touch with friends and family and also for storing and processing enormous amounts of data for banks, academic institutions, hospitals and even government organisations. All these different organisation and different functions computers are used for all deal with the same thing – DATA. (Quinn, 2006)

Cybersecurity or computer/network security is the tools, methods and procedures used to safeguard this sensitive data. It is the most important issues in the computational industry due to the vast amounts of data that is currently being utilised. This sensitive data refers to contact details of people, financial details or even people’s medical data. Data is an extremely valuable commodity and an infographic published by TrendMicro in 2014 showed that cybercriminals earned as much as $10 per credit card number.

Cybersecurity is ensuring that the data your organisation handles is kept and transmitted securely to prevent against data theft, fraud and data tampering. The effects are wide-reaching and not only affect the victims whose data is stolen but also the business reputation of the organisation, thereby ruining future prospects. Cyber-attacks by criminals are very common nowadays and hence the importance of cybersecurity as social issue.

Government regulations such as the Data Protection Act are designed to ensure organisations are aware of the importance of data sensitivity and how serious the cyber-attacks are but, alas, it’s not always sufficient as many companies still fall victim to cyber-attacks by hackers and evildoers.chat

From the chart on the left, we can see the amount of attacks that were from outsiders to organisations databases and networks in the past year. The hackers and cyber-terrorists are very intelligent and are becoming a real threat in the cyber space. In the last year there was a large increase in the number of attacks to organisations. Large companies like Sony suffered from attacks as recently in November, 2014.

As big a company as Sony is, they are not immune to cyber-attacks. Their gaming network, Playstation Network was attacked in 2011 by a group with the intention to simply expose the frailties of Sony’s network security. Millions of subscribers’ sensitive data like their names and address as well as payment information were released on the internet. In response, Sony beefed of their network security and settled lawsuits for those that suffered from more serious damage like identity theft.

In November, Sony’s network was also attacked by intruders. This time, the damage was much more severe. Confidential documents regarding Sony’s internal affairs as well as released other financial information about their movies and other projects were released. Sensitive information of celebrities that have worked on Sony projects as well as present and former staff members. Sony’s negligent attitude towards cybersecurity and their poor data security and protection, email addresses, social security numbers, addresses, banks details as well as unreleased movies and large amounts of other sensitive data was also stolen which has left to lawsuits being filed by employees suing them for their poor data protection standards. (Hesseldahl, 2014). The group stole terabytes of Sony’s data and deleted the originals off of the servers. In an official statement from the group, they promised to continue the attacks if their demands were not met. (Lee, 2014)

As it stands, law enforcement agencies are still investigating to apprehend the perpetrators of the attack but from Sony’s standpoint, they were extremely unprepared for the attack. Their lacklustre attitude towards cybersecurity has cost them big time.

Apple.
Programmers and developers were left in a state of disarray in 2013 when Apple’s developer site, the website where Apple hosts their programs and information for developers and programmers for their operating systems. After being offline for a few days, Apple issued a statement saying that the development website was subject to an attack by an intruder and they were working to resolve it.

screen-shot-2013-07-21-at-3-47-14-pm
Despite no official specification, Apple said that the sensitive information was encrypted, but there’s no proof of this. After the breach, Apple spent a lot of money to rebuild the database with improved security systems. To deal with the issue, Apple made a good attempt with a public apology. They also promised to renew the subscriptions of the users whose accounts’ subscriptions were due to expire during the period the website was down. Pubic apologies are important as important as they not only refer to the data breach or the matter but also shows that the organisation is concerned and thus, boosts trust with the people.(Mccracken, 2014)

In conclusion, dealing with cyberattacks not only involves the company being hacked but other parties as well such the governments and other companies as well to prevent even more attacks in future. The governments have come up with systems to locate hackers and even started up laws against hacking, making it illegal with severe penalties. Besides that, system security companies also are included in this prevention as they supply better solutions to secure companies’ network systems. The effort of working together to prevent cyberattacks will make sure companies grow stronger and fight back the hacks.

 

References

2014 Technical Report. (2015). [online] Available at: http://www.pwc.co.uk/assets/pdf/cyber-security-2014-technical-report.pdf [Accessed 5 Jan. 2015].

Burrows, P. (2013). Apple Developer Website Taken Down After Hacker Attack. [online] Bloomberg. Available at: http://www.bloomberg.com/news/2013-07-22/apple-developer-website-taken-down-after-hacker-attack.html [Accessed 12 Jan. 2015].

Hesseldahl, A. (2014). Hackers Hit Sony, Again. [online] Re/code. Available at: http://recode.net/2014/12/08/hackers-hit-sony-again/ [Accessed 9 Jan. 2015].

Lee, T. (2014). The Sony hack: how it happened, who is responsible, and what we’ve learned. [online] Vox. Available at: http://www.vox.com/2014/12/14/7387945/sony-hack-explained [Accessed 7 Jan. 2015].

McCracken, H. (2013). Apple’s Developer Site Was Hacked | TIME.com. [online] TIME.com. Available at: http://techland.time.com/2013/07/21/apple-developer-site-hacked/ [Accessed 2 Jan. 2015].

Quinn, M. (2006). Ethics for the information age. Boston: Pearson/Addison-Wesley.

Smith, G. (2013). Apple Criticized For Taking 3 Days To Disclose Developer Site Hack. [online] The Huffington Post. Available at: http://www.huffingtonpost.com/2013/07/22/apple-hack_n_3634843.html [Accessed 29 Dec. 2014].

Trend Micro UK, (2013). INFOGRAPHIC: How much is your personal data worth?. [online] Available at: http://www.trendmicro.co.uk/infographics/how-much-is-your-data-worth/ [Accessed 4 Jan. 2015].

.

CYBERSECURITY – A LEGAL and ETHICAL ISSUE

GREEN COMPUTING – A SOCIAL ISSUE

As a major social issue, the effects of Global warming are plain for everyone to see and it has led to a lot of changes in numerous industries and their business processes. Being environmentally friendly is becoming more and more of a necessity in the ever-changing world and the IT industry is no exception. Computing companies and IT service providers are all emphasising ways they can make their products and services they provide more environmentally friendly. This includes removing environmentally harmful materials from the manufacturing process of their products, recycling used products and their materials properly, efficient energy utilization in the servers, CPUs and other peripheral devices as well as reduced paper consumption in everyday business processes. Additionally, the proper disposal of e-waste is also considered as part of being green. The term generally applied to this process and aims the companies set out to achieve by providing products and services that are environmentally friendly is known as Green Computing. (Rouse, 2014).

The first real strides towards saving the environment in IT came in 1992 when the US government, through the Environmental Protection Agency started Energy Star. Energy Star is a voluntary program where electronics manufacturers would get a label showing their efficiency. As time went on, the Energy Star logo was seen on monitors and laptops all over the US during the boot process.

A few years ago, an independent company called Greenpeace conducted a report on IT companies and how green the impacts of their business procedures and techniques were. Since then, IT industry powerhouses like Apple, Microsoft and Sony have all made giant strides and are leading by example when it comes to green computing.

Apple, who received poor grading for this social issue from Greenpeace in their report in 2011 because of their poor disposal of e-waste and energy efficiency at their facilities has since made commendable effort and has made drastic changes to its operations. They announced that each year their devices become more and more efficient. apple

The change in energy usage of Apple’s Monitors(Apple.com)

Consequently, Apple recently announced that almost of all its corporate operations and its power-hungry datacentres are now powered completely by renewable energy; a majority of which comes from two massive solar energy farms in North Carolina and third biogas fuel plant. (Apple.com, 2014)
Apple's N.C. solar farm Credit

Apple’s Solar farms in North Carolina(Apple.com)

Additionally, The NGO centred on consumerism and energy efficiency blasted Apple for using two harmful substances in the manufacturing process of their devices and demanded they cease it immediately as they put the health of the staff involved in the process at great risk. The chemicals which include n-hexane, which is used to clean screens before packaging is known to cause nerve damage and sometimes, even paralysis; and benzene, which is used to coat outer layers of the devices, is a carcinogen. The chemicals are harmful but are not illegal in China, where Apple manufactures its devices and as such were under no legal obligation to not use them. Green America appealed to Apple to be socially conscious and ruse alternate, safer chemicals. These changes would cost Apple less than one dollar per device (Sparks, 2014)

Apple has since announced its concern about the materials used in the manufacturing process and conducted an investigation. It discovered the chemicals were used at only 4 of its factories and has since banned their use and mandated the use of safer chemicals in the manufacturing process.

Sony is another company that has made major progress going green and is setting the benchmark for other companies to follow. Firstly, they pioneered SoRPlas, a plastic made from 99% recycled plastics from older products of theirs, in their manufacturing process for televisions. Optical sheets from discarded LCD televisions and monitors are mixed with recycled plastics from old DVDs and CDs to make SoRPlas. Sony uses SoRPlas to manufacture earphones and the bezels of the televisions and monitors and the outer casing of some cameras and camcorders. (Sony.com, 2014)

Also, some eco-features on their devices such as WhiteMagic Display technology on their mobile phones and tablets and RapidWake Eco System on their laptops automatically adjust screen brightness depending on the surrounding area’s lighting or put the device to sleep simply by closing the lid. (Sony.net, 2014)

Apart from ensuring the manufacturing process and the usage lifetime of their products is environmentally friendly and efficient, Sony also strive to ensure the afterlife for their products is also Green. Regarding this, Sony has removed mercury and other environmentally harmful materials from their products to ensure their disposal/recycling is proper. The sizes of their televisions have also reduced due to use of LED technology. Small products mean small packaging, which means less waste.

Thirdly, Sony’s has successfully built the first multi-storey building with a “bioskin”. The Omaki Entertainment Headquarters in Tokyo uses has porous pipes running all round its exterior. Rainwater is collected in massive tanks and during hot days the water is pumped through the pipes and it forms a shield as it evaporates from the walls thus reducing the use of air conditioners in the building, much like how human beings sweat when it’s hot.

Just recently, Sony received an award for their efforts for material sustainability and electronic waste recycling to coincide with their announcement stating their additional success in reducing their emissions from their business sites.

P2150905 (2)-578-80From this, we can see Sony is well on their way achieving the aims and milestones of their “Road to Zero” initiative which was set out in 2010. Even though some were slightly exaggerated or overly-ambitious, we can see that they are taking the right steps.

The Omaki Building With Bioskin(Sony.net)

References

Apple.com, (1998). Apple – Environmental Responsibility. [online] Available at: http://www.apple.com/environment/ [Accessed 1 Jan. 2015].

Energystar.gov, (2015). About ENERGY STAR | ENERGY STAR. [online] Available at: http://www.energystar.gov/about [Accessed 10 Jan. 2015].

Levy, S. (2014). Apple Aims to Shrink Its Carbon Footprint With New Data Centers | WIRED. [online] WIRED. Available at: http://www.wired.com/2014/04/green-apple/ [Accessed 10 Jan. 2015].

Rivington, J. (2012). How Sony is trying to save the world. [online] TechRadar. Available at: http://www.techradar.com/news/television/tv/how-sony-is-trying-to-save-the-world-1063363 [Accessed 2 Jan. 2015].

Rouse, M. (2015). What is green computing? – Definition from WhatIs.com. [online] Searchdatacenter.techtarget.com. Available at: http://searchdatacenter.techtarget.com/definition/green-computing [Accessed 10 Jan. 2015].

Sony.co.uk, (2015). Sustainability | Eco Innovation | Green Technology | Sony. [online] Available at: http://www.sony.co.uk/hub/eco/eco-initiatives [Accessed 10 Jan. 2015].

Sparkes, M. (2014). [online] Available at: http://www.telegraph.co.uk/technology/apple/10694565/Cancer-and-nerve-damage-is-this-the-human-cost-of-an-iPhone.html/ [Accessed 1 Jan. 2015].

Staples.com, (2015). What Is Green Computing? | Business Hub | Staples.com®. [online] Available at: http://www.staples.com/sbd/cre/tech-services/explore-tips-and-advice/tech-articles/what-is-green-computing.html [Accessed 1 Jan. 2015].

GREEN COMPUTING – A SOCIAL ISSUE