When storing electronic data about individuals, four ethical concerns come up as security, confidentiality, inaccuracies, and implementation. The first ethical issue would be confidentiality. When something needs to be kept private or secret, it is called confidentiality. The level of confidentiality is closely related to security. Private or confidential information may be in danger if there is inadequate security. Like how security depends on confidentiality, the opposite is also true. Security may be compromised if private information is disclosed. For example, the disclosure of private information related to national security could be dangerous. The second ethical issue is inaccuracies. A major problem could arise if false information is made public, such as through news or official government documents, it might also lead to widespread confusion, which would be very problematic. Another one is security because privacy can be violated by others, it also reasonable decision-making, privacy, confidentiality, piracy, fraud and abuse, liability, copyright, trade secrets, and sabotage are all covered under security. Credit card information, medical information, or family information are a few examples of private information that could be very dangerous. The last potential ethical issue with information storage is implementation. Implementation work is false data may result from improper implementation. Wasting resources can also result from improper implementation. Medical resources for patients and hospitals would be an example of a wasted resource. By integrating moral behavior throughout the company, companies can create an environment that values honesty, reliability, and responsibility. Implementing ethics is a continuous process that needs dedication, open communication, and constant development. The four ethical concerns that I selected to address when storing electronic data about people were security, confidentiality, implementation, and inaccuracies. The four points have a connection despite their differences. It is necessary to consider each of the four selected factors when studying cybersecurity.