On April 1, 2018 the parent company of the department stores confirmed that the stores payment systems were breached and that they were starting an investigation to determine who was responsible for the attack. It is believed that a popular hacking group, JokerStash/Fin7, is responsible for the attack due to recent evidence of 5 million stolen debt and credit cards information (approximately 125,000 records of information) being up for sale on dark websites (O'Brien, 2018). JokerStash/Fin7 hid the customers personal information under the name of BIGBADABOOM-2, for other hackers to obtain their information. The hacking group is noted to have previously attack major hotel and restaurant chains before and has stealing information from the department stores chains for about a year. It is unclear if the company’s online services have been breached but the chain’s president would like customers to be careful when shopping online and in-store. The stores are currently offering customers free credit monitoring and identity protection due to this …show more content…
Based on the data breach incident that occurred at Saks Fifth Avenue, Saks Off Fifth, and Lord & Taylor stores, there are many ethical issues that occurred. According to the ACM Code of Ethics and Professional Conduct, there was one general moral imperatives that were broken during this data breach. The first and most important general moral imperative that was broke was the right to “Respect the privacy of others” (ACM Council, 1992). This moral of imperative code was broken because a year’s worth of customers data was taken and the professionals of the systems that is used by the department store chains did not constantly “…. maintain the privacy and integrity of data describing individuals…. protecting it from unauthorized access or accidental disclosure to inappropriate individuals. (ACM Council, 1992)”. Other than the one ethical issue been broke based on the code, the departments chain abided by the ethics and professional conduct after the incident occurred to ensure their users were safe. Also based on the Hampton University, Technology Guide: Appropriate Use of Technology one of the code of conduct rules that is also a law of Virginia. The code of Virginia states “…. intentionally examines without authority any employment, salary, credit, or any other financial or personal