THE ETHICAL ISSUES OF IT SECURITY SPECIALISTS 3
massive volumes of the data on organizations and persons and employ it for a variety of reasons
such as precise collection of tax and national safety. Corporations and companies do the same for
purposes of business to boost business (Northcutt & Madden, 2004). All those IT roles in the
corporate and government organizations are held by IT experts who have access to all the
collected data. Moreover, technological advancements in both software and hardware
considerably altered scope of what may be collected and processed. Massive volumes of
confidential data may be kept and retrieved quickly and effortlessly by any IT specialists.
Seemingly different sources of information may be cross-referenced to pick up fresh meanings
once one set of information is viewed in the context of a different one (Tavani, 2004). The
question is, is it ethically right for the IT personnel to access the amassed information? This
further raises many questions of whether the institution's capability to gather and process
information on the exponentially growing scale should be restricted in any manner. Further, does
the reality that data may be architected for a specific objective imply it ought to be, even if by
doing so personal confidentiality rights are possibly breached? If data designed for one
application is diverted to a different procedure that is socially redeeming and would lead to a
greater good or could lead to monetary benefit, does that alleviate the ethical dilemma?
The matter of privacy is a very sensitive one which brings up the issue of the expense and
effort that managers should apply in considering the question of data privacy and access. This is
a matter with both external and internal implications (Northcutt & Madden, 2004). All
companies and organizations gather individual data on workers, information if not appropriately
protected can lead to considerable negative inferences for persons. Data such as payment and
background information and individual identification data like account identifiers and social
security number have to be kept and accessed by approved staff. Systems that trace this