One ethical issue when it comes to storing information about an individual is security breaches. A security breach is a big ethical issue because private information is now in another person’s hands. Security breaches are probably going to be targeted towards information that can be used for another person’s gain so credit card information, SSN, etc. Another ethical issue when it comes to storing an individual’s information is accuracy. Accurate information is necessary when it comes to storing information because if that person’s requests information and it is wrong they would have no idea. For example, if someone is storing your funds and where your money is placed and they give you the wrong number when you ask how much you can spend on yourself for the month. You are likely to overspend and possibly be in a financial deficit. The third ethical issue is whether the person storing your information is trustworthy. This sort of falls into security breaches but in it’s own way because the person isn’t breaching a security system itself but instead, someone’s trust for their own gain. The person storing your information could be twisting it in a way that maybe the funds are right, but they aren’t all being used by yourself, which is why you have to do background checks or make sure they work for a trusted business. The final ethical issue is privacy, when storing personal information it’s obviously wanted to be private. Privacy can be ensured by good employees, honesty and great security systems. If these measures aren’t in place, then people could get ahold of information that could ruin lives.
Cybersecurity risks are happening everywhere In the U.S. and also outside of the U.S. One thing that I would like to point out when it comes to this topic is, I get phone calls all the time from people outside of the United States trying to get my information and pretending to be someone they are not or pretending to work for a company they do not. I feel as if it is a lot easier to hack in the U.S. because we have such a wide variety of computers and systems that are capable of doing so, but I believe that if someone wants to get access to your device and there is just one little weak link, then they are probably going to get access no matter the circumstance.