Sensitive documents are usually stored in a server, on a cloud, or on a personal computer. All of these can be hacked, or stolen by someone of an adequate skill level. Likewise, proprietary information can be gained from loop holes in existing law. For example law does not regulate or dictate gathering of trash via dumpster diving or simple spying. Many firms have participated in this …show more content…
In 2002, there was an alleged leak of important information to a foreign intelligence service. Three people were apprehended in suspicion of leaking secret documents to Russian diplomats. Although Ericsson made the claim that no pertinent information was retrieved, the fallout of the situation suggest otherwise. Sweden expelled two Russian diplomats whom they considered to be directly linked to the espionage. Both Ericsson and the Swedish government are unwilling to disclose much further the details of the situation. As a repercussion the Russian government expelled two Swedish diplomats. Some see this as a return to ‘Cold War’ diplomacy by the Russians. One may now ask, what is the line for unethical information gathering by companies or