COMPARATIVE BUSINESS ETHICS AND SOCIAL RESPONSIBILITY
TABLE OF CONTENTS
OVERVIEW OF THE VIRTUAL SECURITY ETHICAL PROBLEM OF EQUIFAX.. 5
DETAILED ANALYSIS WITH RELEVANT CONCEPT AND THEORIES.. 7
The report discusses the data breach incident of Equifax and an overview of the ethical problem in the Company. The ethical issue of virtual security in which the Company was not able to secure its customers’ data leads to an identity threat for them. Equifax had shown a lower level of decision-making ability by delaying to convey the incident to the public. The report analysis that ethical issue in a detailed manner with the relevant theories like Egoism and Utilitarianism. The report also represents a short recommendation part with significant points. Lastly, a brief conclusion has been provided.
Equifax is a multinational consumer credit writing mean and one of America’s three biggest consumer credit companies. The Company gathers and aggregates details of 800 million each consumer and more than 88 million industry internationally. Additionally to businesses’ demographic records and credit and services, Equifax sells credit checking and fraud deterrence service straight to the consumer. The headquarter of Equifax is located in Atlanta, Georgia, and it operates in almost 24 countries worldwide. A company with such a massive level of evidence and responsibility of the United States residents makes it a greater target for the hackers aiming to snip private details. The risk of the individual details coming into the wrong hand is extremely dangerous because people can lose their identity and existence. The case of the Equifax data breach happened to discharge the evidence of 147.9 million people of America to hackers take advantage. The crucial details like personal details, social security numbers, and credit cards are also put at risk. The purpose of the report is to examine concepts and theories.
The data breach occurred in Equifax in June 2017, but the Company did not release the open statement until 7th September 2017. Around 148 million peoples’ personal data were compromised, and 209,000 credit card numbers were also taken by hackers. The data stolen from Equifax has a credit history of persons with their addresses, account numbers, and other personal identity details. The report first discusses the case issue and ethical challenges or problems of Equifax. The report analysis the organizational ethical problems with various theories and concepts.
When big companies like Equifax have data breach ethical issues, it becomes tough for the customers to trust any companies that manage the customers’ personal data. It is true to the firms that deal with details of the people that are stolen can produce permanent destruction to the customers. For instance, in many banking and finance companies, deals with customer’s credit and money details are an acute feature of the economic advantage of a person.
In the case of Equifax, it believes that hackers gained access to its data by a susceptibility in Apache Struts. The hackers got access to the data of Equifax from 13th May over 30th July. The officials got to know about the hack on 29th July 2017 prior to the month before that it allows the customers to know (PRIMOFF and KESS, 2017, p14-16). Equifax confronted the hacking owing to the errors in the security system of the Company. In March 2017, the Company faced a distinct breach. On that occasion, the Company informed a few customers of banking and got a security company to help in the investigation of the breach. Though, the incident was not made publicly. In December 2016, a researcher of security inspected the server of Equifax. Tt warned the Company that its system was exposed to any type of hack, which happened in 2017. Equifax ultimately repaired the exposed issue, but after mid-2017, the major beach took place. Equifax process to confirm the customer details was negotiated. After the detection of the hack on 29th July, it was still two weeks after the team of the Company with 225 experts of cybersecurity can report the CEO for the hacking incident. It was extra two days prior Equifax was sure that customer details were compromised (DINGER and WADE, 2019, p7-9). After five days, the board of Equifax was also notified. Thus, it took around two weeks to publicly expose the issue of a hack.
After the announcement of the data breach incident in September 2017, reporters found that four main executive directors of Equifax sold their parts of stocks. Equifax directed its own inquiry and found that those executives did not know about the ethical incident of the data breach. Following the announcement of the ethical issue, Equifax focused customers on a website in which they can see if their details had been exposed. The Consumer Financial Protection Bureau released an inquiry into the incident for its consumers. Equifax did not see the data break as the device used to observe the network circulation had been sluggish for 19 months due to a terminated security permit. Almost two months were taken by Equifax to update the terminated permit, in which time the staff noticed a wary web issue. The House oversight Board reported that Equifax’s security practices and policies were old and outdated and troubling with basic security actions. The report of the House confirms that the credit company Equifax failed to patch a revealed susceptibility in the Apache Struts, which is a publicly exposed web server. The attackers had used exposure to crack the web and hack the details of the customers (SKINNER, 2019, p241). The hackers had sent around 9,000 inquiries on the records, download data 265 separate times.
Equifax had an ethical duty for its consumers to maintain their personal records with the greatest security. However, the software tools of Equifax were accessed by the hackers by an exposer of Apache Struts. The Equifax Company deficient in internal control were more vulnerable to ethical issues.
The major ethical issue related with the facts breach events in a company like Equifax is breaking the news to affected people by the breach. Equifax made an unethical choice to negate the security blotch that ultimately led to the revelation of huge public data. The action of the executive team of Equifax shows a major absence of consideration for the customers, and the decision made by Equifax frequently recommends that it failed to consider societal welfare. The major ethical theories which can be used in such circumstances are Utilitarianism and Egoism. Egoism theory is the normative ethical place that moral means should act in their own self-interest. Ethical Egoism does not need a moral ground to damage the interest and prosperity of others when making discussion (GOMARASCA, 2017, p 64-80). The ethical theory of Egoism means the notion that behavior is correct founded on its values for the individual concern. The Company not discharging details of the breach data to the public instantly might be a short-term business interest of Equifax or its management, but ultimately the news shall be spread (JUMA’H and ALNSOUR, 2020, p279). The Company is better off to spread the breach details instantly in the time they knew. Equifax was cooperatively struggling for its pleasure in an attempt to reserve its time, resources, and energy by neglecting the issue of vulnerability.
Utilitarianism theory:
The Utilitarianism theory of morality supports actions that stand in pleasure and happiness and opposes action, leading to harm and unhappiness. The decision-making, according to Utilitarianism, should be done based on the majority benefit. Utilitarianism is the notion that moral precision must be based on having the utmost good for the maximum likely amount of people. To admit to the customers and public about the incident of a data breach is essential, but it can push to undesirable press and harm the reputation of the Company (VALENTINOV, 2017, p36-40). The best method to repair that reputation is to quickly use a way for customers to find out if their details have been retrieved, and the next step can be to take the initiative to secure their data. Application of these data quickly and correctly is the best method to convey to customers that the Company is working hard to have a high possible result for each one involved in the incident.
Equifax was swift to release a website permitting the public to check if they have been affected by the data breach and offer a free year of credit checking with the incident. It has been clear from the quick action of Equifax that Equifax has few setups put in the incident of the data breach. It is majorly significant for the Company to have their better reputation. The bad reputation of the Company could impact each of its stakeholders (ANDERS, 2017, p72). It contains consumers, stakeholders, workers, and the management. A diminished reputation can radically reduce the stock value of the Company leading these stockholders to lose money. The customer does not want to do business with the less reputational Company. It reduces the pay scale of the employees, which leads its discontent with the workers. All of it makes it horrendous for the management of the Company to work. It is not that all of these horrendous things are not manageable, but it can make some alteration in leadership as the older leader retire or resign during the bad press coverage. The case of Equifax is not so different. Soon after the two weeks of the data breach, the chief information officer, Security Officer, and Executive officer all were retired from their positions. Different executives of Equifax have been inspected to see if they contributed to the selling of stakes prior to details about the hack has been made open.
Principle of utility:
The Utilitarianism theory states that the right decisions are the decision that produces the maximum number of contentment for the greater number of individual. In the ethics of Utilitarianism, the principle of utility is sufficient for any activities for both individual and collective. Equifax required considering the actions that lead to huge happiness for a huge number. In the breach incident, Equifax failed to consider the amount of Americans that can possibly be exposed to a breach owing to its decision and, in its place, chooses to reserve its well-being. Equifax was totally careless with respect to both duration and intensity when ignoring the issue of software in its system (HOLLANDER, 2016, p557-568). One of the major elements when making an ethical decision in regards to utilitarian ethics is the amount of pleasure produced by the decision. The pain or pleasure shall be bigger as per the least partly to its intensity. The pleasure intensity together enjoys by not increasing the resources, time, and money on repairing Apache Bug was annulled relative to the range of the pain sensed by victims of the breach of data. The range of the pleasure enjoyed by Equifax was not visible. It was usually irritation that Equifax did not question itself. Conversely, the range of known theft or the terror of possible identity theft is a vigorous concern suffered by many customers (PERETORE et al., 2017, p 4-8). Equifax failed to consider the range of its decision as an indication of obvious and clear damage to utilitarian ethics.
Significance of time and intensity:
Equifax was also carless to consider the time of its decision to neglect the Apache Struts susceptibility. The duration of pain or pleasure practiced by society as the total is a vital element while making ethical decisions in regards to utilitarian ethics. For the Company Equifax, overhauling the system of vulnerability bugs might take around three or five years (TAN and SUDIRMAN, 2020, p135-137). Equally, the young victims are subjected to a relentless fear of identity theft which can last for lifelong. In the worst scenario, it can produce a potential risk of decades, and in the best-case scenario, it can last for a year or less. Ultimately, the decision of Equifax failed to consider the time rage of the pain and pleasure, and openly showing is the ethical issue in the decision making with regards to utilitarian ethics.
Principle of Freedom:
The freedom principle states that Equifax as totality was usually simple, attempting for its own pleasure to preserve its time, energy, and resources by neglecting to remove the vulnerability. It also states that every person is allowed to attempt for own pleasure, given that it does not affect the pleasure of others. The former CEO of Equifax, Richard Smith, states that Equifax would start from 1ts January 2018 permitting consumers to unlock or lock their credit records whenever they want. At the time of the incident, Equifax was not working as per the freedom principle, but instead, customers were forbidden from endeavoring for their own pleasure by the protection of its details, indirect destruction of freedom principle (LIANG, 2017, p432-437).
The incident of a data breach with occurred in Equifax was a severe one. In response to that, the major ethical issue was the decision-making of the Company after the occurrence of the incident. The Company was not able to keep the data of the customers effectively. The Company failed to inform its customers on time and handle the situation. The incident major occurred due to the use of outdated software technology. Some of the recommendation outlined summering the major points are as follows:
Ethical decision-making is a discipline. It is a method to recognize and solving issues in the business context. Equifax is responsible for a data breach, which it suffered in 2017 that made the vast customers of the Company vulnerable to identity theft or fraud. After examination of the breach incident and ethical problem, the egoism theory and primarily utilitarian theory can be applied. It can be seen that Equifax failed to make the decision that can benefit their vast number of customers. Thus, the theory of Utilitarianism performs a significant role in the whole process of a data breach with the virtual ethical issue of decision making and working. However, Equifax is regularly responsible for its violation, it is usually examined as virtual ethics, but the problem has been analyzed using utilitarian ethics that there are adequate facts to assist that incident. The breach of Equifax was an unattained matter which outcome in a notice. However, the unattained vulnerability in its system can be mitigated by vigorous devices and technologies. The problem of Equifax could have been avoided if the Company had effectively considered the issue security properly. Hence, it can be said that it is crucial for the Company to stick to transparency and emphasize its moral and social duties over the economic advantage of the Company.
ANDERS, SB, 2017. Practical Data Security Resources: Certified Public Accountant. The CPA Journal, 87(11), pp. 72-73. https://www.proquest.com/docview/2213831504/fulltextPDF/ABE5697BE35B4939PQ/6?accountid=30552
DINGER, M. and WADE, J.T., 2019. The Strategic Problem of Information Security and Data Breaches. The Coastal Business Journal, 17(1), pp. 1-25. https://www.proquest.com/docview/2406321077/fulltextPDF/EB4C1D832D3B4390PQ/2?accountid=30552
GOMARASCA, P., 2017. FITTING ATTITUDE THEORY IN ECONOMICS: MENGER AND KEYNES. Quarterly Journal of Austrian Economics, 20(1), pp. 61-83. https://www.proquest.com/docview/1932350829/fulltextPDF/CCB04489A43544A2PQ/2?accountid=30552
HOLLANDER, S., 2016. Ethical Utilitarianism and The Theory of Moral Sentiments: Adam Smith in Relation to Hume and Bentham. Eastern Economic Journal, 42(4), pp. 557-580. https://www.proquest.com/docview/1896304204/fulltextPDF/919415206F2A497CPQ/1?accountid=30552
JUMA’H, A.,H. and ALNSOUR, Y., 2020. The effect of data breaches on company performance. International Journal of Accounting and Information Management, 28(2), pp. 275-301. https://www.proquest.com/docview/2388288890/fulltextPDF/EB4C1D832D3B4390PQ/3?accountid=30552
LIANG, C., 2017. Optimal inequality behind the veil of ignorance. Theory and decision, 83(3), pp. 431-455. https://www.proquest.com/docview/1944246376/919415206F2A497CPQ/7?accountid=30552
PELEGRÍN-BORONDO, J., ARIAS-OLIVA, M., MURATA, K. and SOUTO-ROMERO, M., 2020. Does Ethical Judgment Determine the Decision to Become a Cyborg?: JBE. Journal of Business Ethics, 161(1), pp. 5-17. https://www.proquest.com/docview/2071406382/CCB04489A43544A2PQ/4?accountid=30552
PERETORE, F., HORNBY, R.L., SCHAAP, M.A. and GLADIS, B.M., 2017. Cybersecurity: The Increasing Obligations and Exposure in the Age of State Regulation. The Journal of Equipment Lease Financing (Online), 35(3), pp. 1-10. https://www.proquest.com/docview/2075727034/fulltextPDF/ABE5697BE35B4939PQ/12?accountid=30552
PRIMOFF, W. and KESS, S., 2017. The Equifax Data Breach: What CPAs and Firms Need to Know Now: Certified Public Accountant. The CPA Journal, 87(12), pp. 14-17. https://www.proquest.com/docview/2185469906/fulltextPDF/EB4C1D832D3B4390PQ/1?accountid=30552
SKINNER, C.P., 2019. Bank Disclosures of Cyber Exposure. Iowa Law Review, 105(1), pp. 239-281. https://www.proquest.com/docview/2346692746/fulltextPDF/ABE5697BE35B4939PQ/3?accountid=30552
TAN, D. and SUDIRMAN, L., 2020. Final Income Tax: A Classic Contemporary Concept to Increase Voluntary Tax Compliance among Legal Professions in Indonesia. Journal of Indonesian Legal Studies, 5(1), pp. 125-170. https://www.proquest.com/docview/2447001526/919415206F2A497CPQ/3?accountid=30552
TORRE, M.L., DUMAY, J. and REA, M.A., 2018. Breaching intellectual capital: critical reflections on Big Data security. Meditari Accountancy Research, 26(3), pp. 463-482. https://www.proquest.com/docview/2112082401/fulltextPDF/2091510CF7384FC5PQ/9?accountid=30552
VALENTINOV, V., 2017. The Rawlsian Critique of Utilitarianism: A Luhmannian Interpretation: JBE. Journal of Business Ethics, 142(1), pp. 25-35. https://www.proquest.com/docview/1887313719/fulltextPDF/919415206F2A497CPQ/5?accountid=30552
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.
Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.
Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!
While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.
Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.
In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.
Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.
We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!
We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.
Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.
We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.
Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.
There is a very low likelihood that you won’t like the paper.
Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.
We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.
You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.
We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more