Ashley Madison Case Study

Improved Essays
Ashley Madison: Life is short, have an affair. As if we didn’t have enough problems. The company is based in Canada and while ethically not the best business model, seemed to have a rather wide consumer base. From Josh Duggar to government employees, with the U.S. population having 318 million [1] people and Ashley Madison had 32 million [2] about 1 in 10 people are registered for this site (roughly). Hackers have always had their own set of principles outside of the normal person. While a lot of people wouldn’t agree with the ALM company most would’ve just shrugged it off. These hackers however decided to do something about it. They are going by the name of the ‘Impact Team’ and they “have posted personal information like e-mail addresses …show more content…
If you are going to run a site that preaches infidelity you need to take step to ensure customer data is protected and hidden. The government will continue to look into the leak to see if any government computers were used. The amount of data that they are going to pour though will be a tedious process but the employees will ultimately face the consequences, this wasn’t just for military as I stated earlier. “US government employees who were found to be patronising Ashley Madison included those in high federal positions and sensitive posts, such as at least two assistant US attorneys, at least three employees from the US Justice Department, an information technology administrator working in the Executive Office of the President, an employee from the Department of Homeland Security who once worked in a counterterrorism response team, and a government hacker from the Homeland Security Department. Worse, some federal employees used Internet connections in their offices to access the controversial cheating website. These government employees work in executive agencies, such as the Departments of State, Defense, Justice, Energy, Treasury, Transportation and Homeland Security. That's not all: Even employees at the House of Representatives and Senate also used official computer networks to log in to Ashley Madison.”

Related Documents

  • Improved Essays

    A major leak affecting the United States currently was the recent release of the names of companies, government agencies and organizations that had called D.C. Madame’s escort service between 2000 and 2006. Deborah Jeane Palfrey, also referred to as D.C. Madame, is accused by federal prosecutors of running a prostitution ring earning more than $2 million over thirteen years. Palfrey’s business began in 1993 and she contends that her escort service was legitimate.…

    • 578 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    The first being the security of personally identifiable information. Now in this instance the company itself is not fully responsible for this release but they are indirectly responsible. The hackers are directly responsible for the dissemination of the users personal data but the company could have avoided this incident by shutting down but chose not to which directly constitutes a breach of privacy and security proposed by the company to protect the users information. The next issue is the release of users information that paid the company the fee of $19 to delete their information. The company decided not to delete the users information for some reason from their servers.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Hrm/531 Week 2

    • 636 Words
    • 3 Pages

    Every business is required by law to have some form of security policy in place that will protect their customer’s information. How robust these policies are, may, and do, differ from company to company and can depend on many different factors unique to each individual business. Information security is very important and at my widget company it would be my responsibility and ethical duty to do everything in my power to find out how my system was breached and exactly what customers information was compromised as well as who is responsible for taking this information. I would also be ethically responsible for finding out which employees have not been adhering to the company's security policy and accessing customer information when it was not part of their duties, and under what circumstances this happened. Where these employees instructed to do this or did the do it of their own accord and if so reprimand these individuals up to and including termination of their employment with my company.…

    • 636 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    When a person imagines love, they think of a romance filled with activities such as hugging, kissing, and being together. However, for some people they are looking for their special someone online in a virtual world where they can only view a custom avatar and talk though a headset. MMORPG games such as World of Warcraft and Second Life has open a wave of online relationships with people looking for love in these fantasy worlds, despite the fact they may already be in a relationship in the real world. In the text “Lying, Cheating, and Virtual Relationships” by Dr. Cynthia Jones, Associate Professor of Philosophy at the University of Texas, she explains about the pro’s, con’s, and controversies of online relationships. Online relationships may…

    • 812 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Catfishing Scandal

    • 646 Words
    • 3 Pages

    It is almost time for the return of Sister Wives and fans can't wait to see what the Brown family is up to now. This show has a lot of fans who are interested in the Brown family and their polygamy lifestyle. People shared a preview for the new season and don't think that Meri Brown's catfishing scandal is over with just yet. They will be bringing it up again this season, and the preview clip shows Meri and Kody talking about what went down at the end of last season. Kody Brown wants answers from Meri about her online relationship with someone else.…

    • 646 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Record360 Privacy Policy

    • 1061 Words
    • 5 Pages

    Record360, Inc. Notice of Privacy Policy At Record360, we value your privacy and we are committed to respecting your privacy rights. We pledge to handle your personal information fairly and legally at all times. Record360 is also dedicated to being transparent about what personal information we collect and how we use it. This policy describes how we handle and use personal information; what personal information we collect; how we collect personal information; how we ensure your privacy is maintained; and your legal rights relating to your personal information.…

    • 1061 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    IT security threats and cryptography 7/A. P1: Explain the different security threats that can affect the IT systems of originations. 7/A.M1: Assess the impact that IT security threats can have on organization's IT systems and business whilst taking account of the principles of information security and legal requirements In today's society data is a very valuable thing companies have to take in to account how to protect that data from the threats, Threats is a way in which the data is vulnerable and therefore rules and regulations have been put in place to stop these potential threats for example all will have adhere to the principles of information security this is a way in which data is protected, I have been working for a start-up company…

    • 1332 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    As the citizens of the United States of America, we would not think twice about our government looking for some hints of terrorism throughout the masses. Many people would be fine with the thought of our government looking after us for the greater good of hunting out evil. However, many people did not know the degree of how the government goes about finding out the information they need. The United States of Secrets was about our National Security Agency and a few people in the government creating “The Program” after Nine Eleven.…

    • 670 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Case Study: The XYZ Affair

    • 1845 Words
    • 8 Pages

    TTc Government The XYZ Affair Mr Cadwallader Andrew 9/25/2017 Andrew Olsen 201 American National Governments Mr. Cadwallader 25 September 2017 The XYZ Affair America’s first diplomatic issue happened between France and America and became known as the XYZ Affair. The slogan of the affair was, “Millions for defense, not one cent for tribute.” (Berkin 151)…

    • 1845 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Finfisher Case Study

    • 1271 Words
    • 5 Pages

    FinFisher: Disguising Greed as Security Gamma International is a company that provides a software solution for organizations that need intelligence to maintain security. In order to get intelligence, FinFisher (the software tool) uses various methods in order to tap into people 's daily routines, including screenshots of desktops at regular intervals, webcam hijacking, and keylogging. This spyware can get into computers through seemingly harmless methods such as email attachments.…

    • 1271 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Do we really know what is going on within these communities? How sure are we that they aren’t covering up illegal activities? How do we decipher between delving further into this data for security and protection reasons without crossing the line of looking too far into people’s personal information? Can we rely on e-tagging of inmates in our prisons? Why do retailers want to know about how we think?…

    • 98 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    VTech, the company, is a direct stakeholder of this information issue of children privacy getting compromised as a result of the data breach. VTech strives to provide innovation through technology. This is resonated in their mission statement which says, “To design, manufacture and supply innovative, high quality products that minimize any impact on the environment, while creating sustainable value for our stakeholders and communities” (VTech Holdings Limited, n.d.). While the mission statement guarantees sustainable values, the data breach incident raises serious questions about the ethical principle of the company, as even personally identifiable information of the children were collected, even when restricted to do so by the law. This shows that the vested commercial interest of the company differentiates them from the other key stakeholders of the issue, the parents and the regulating authority, who value the privacy and security of the children.…

    • 284 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Today’s internet has become an integral part of our daily lives. It changed the world in so many positive ways, but it has also a negative side to it. The negative issues that we are facing today with internet are our online privacy and data breaches. Recently, many people were divided in terms of their strong views about the importance of privacy and the exchange “between security needs and personal privacy” (Rainie & Maniam, 2016) as millions of Americans were also affected by online threats and privacy breaches and at the same time concerned with our security. The focus has been on government monitoring, although there are some other significant issues and concerns about how industries use our data.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Top Secret Inc Case Study

    • 765 Words
    • 4 Pages

    Top Secret Inc. (TSI) Challenges TSI develops operating systems for different organization and these operating systems work well for clients, given that they have a certain small size purpose. However, the operating system TSI OS does not work well for the TSI office. They decided to use the same operating system similar to the ones that the clients use. While these operating systems developed by TSI work very well for small purposes like controlling drones for the military, they lack some features to allow TSI developers and employees to do their work effectively. Below is a section that describes the issues that Top Secret Inc. is facing in their office.…

    • 765 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Social Media Ethics Essay

    • 1535 Words
    • 7 Pages

    Social media is a network of companies, such as Twitter and Instagram, where a person can share and interact with people across the globe. It is supposed to be a safe place to post things like pictures from life experiences. Since these applications are connected to the Internet, once something is posted it is there forever. Even if it was deleted, the company where it was posted keeps a record of it. Furthermore, just because the account is set as private, it does not mean it is hidden from everyone’s eyes.…

    • 1535 Words
    • 7 Pages
    Superior Essays