[go: up one dir, main page]

0% found this document useful (0 votes)
42 views3 pages

Assignment 74

Uploaded by

Aiman zahra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
42 views3 pages

Assignment 74

Uploaded by

Aiman zahra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Assignment # 01

Subject: Professional Practices

Submitted BY:
Maira Afzal
BSCS (Sec a)
20-cs-74
Submitted to:
mam Ayesha
A company A has just signed a business agreement with company B which
authorizes both of them to access record of each other clients. Jon a software
developer at company X was assigned the task of developing a software system
that is capable to handle the record of retrieval and access from the database of
each company into other. Software proved to be well and fully functional without
any difficulties when first time deployed. After few months Jon performed a
random test on to the developed software and discovered a security gap in the
company B allowing unauthorized access to hackers and compromising the
confidentiality and integrity of client data. He was sure that the software he
developed was working well and according to the requirements, the code in the
database of company B could not be trusted and can be a security hole for the
company A. Jon informed his manger about significance of the problem. The
manager replied “it’s not our business”, and be sure that our developed system is
working properly. This made Jon confused weather to refuse to work on the
projects by disobeying his manager or to continuing working on the project
disobeying his faith.

1. Discuss the facts about the case study.


2. What moral problem is bothering Jon?
3. Consult at least four fundamental principles that are relevant to the moral
problem.
4. What are possible alternative actions?
5. Suggest your recommended course of action with supportive arguments.

Solution:
1. Discuss the facts about the case study.

Companies A and B have a contract enabling them to obtain access to each other’s
client records. Jon, a software developer from Company X, is currently working on
creating a system for sharing records with the former client. Once the software was put
in, it worked perfectly. Afterward, Jon discovered a breach in the security of the
database of company B, which could leave the information accessible to unauthorized
persons and be used for their gain. As Jon’s boss said, it does not actually create a
problem if there are no problems with their system’s work. The scenario places Jon into
a professional liability and self-interest conflict.
2. What moral problem is bothering Jon?
Jon is concerned about fulfilling his role’s responsibility of adhering to managerial instructions
and his larger duty of preventing the potential harm caused by the security loophole he has
uncovered. He thinks that failing to address the weakness in Company B’s system has the
potential to be a cause of client confidentiality and integrity violation, thus not abiding by his
role as a software developer.

3. Consult at least four fundamental principles that are relevant to the moral
problem.

• Confidentiality: As a software developer, Jon is obliged to save clients’ information. The


identified weakness threatens the fundamental right of privacy.
• Non-maleficence: The security principle holds “do no harm.” If Jon overlooks the weak
link, he fails to do no harm to the clients whose data may be compromised.
• Professional Responsibility: As a professional, Jon’s duty involves making sure his work
is of high quality and secure. This, therefore, includes identifying and mitigating the
potential risks associated with his software’s harms.
• Integrity: Ethical integrity compels Jon to do what is right according to his morals. Data
breach is imminently likely and goes against his core belief of right and wrong.

4. What are possible alternative actions?

• Jon could first follow his manager’s advice and only make sure that their system is
functioning properly while knowingly leaving the Company B system vulnerable.
• Alternatively, he could reach out to Company B directly to warn them of the issue, with
or without the consent of his superior.
• Lastly, he could turn to the company’s upper management or an appropriate ethics
committee that might deal with this issue.

5. Suggest your recommended course of action with supportive arguments.

In order not to act, Jon may be motivated by his professional duty to contact Company B
in order to inform it by himself, or to make a call to a professional body within the field
of software development and data security to receive advice. It can also refer to the
principle of non-maleficence and integrity due to the prevention of causing harm or the
violation of the profession’s area of concern.

You might also like