Preview

Arnie Case: Recoupabyte Confidential Inc.

Good Essays
Open Document
Open Document
2396 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Arnie Case: Recoupabyte Confidential Inc.
I. Identification

Case Summary:
Arnie is a newly employed technician at an up and coming data recovery company, Recoupabyte Confidential, Inc. He is assigned to a new customer, Mr. Bowen, a man who needs his tax documents recovered after hurling his computer out of a window in rage. The new client makes inquiries about the extent of confidentiality the company adheres to. The company’s website advertises comprehensive data recovery from most mishaps with complete confidentiality and their tagline is “Your reputation is safe with us.” Arnie’s boss Fred, who is also the president of the company, ensures Mr. Bowen that unless his files involved plans for future criminal activity, they would be completely safe.
Upon investigating the files,
…show more content…
Sisk - In October of 2006, a church member borrowed a computer from the choirmaster, Mr. Tate. Shortly after using the computer, he discovered several pictures of child pornography. The church hired a lawyer and after discussions of the matter, they saw no other wrongdoing by the choirmaster and all decided the best option would be to save everyone’s reputation via destroying the computer and forcing the Mr. Tate to retire. The church was soon informed that there was an investigation opened prior to the recent discoveries, with Mr. Tate as the target. It turns out that the former choirmaster had even more gruesome pornography in his possession and had been sexually exploiting children for years. The lawyer responsible for destroying the computer was later charged for obstructing justice. This source is relevant to the case study because the lawyer in the article who was protecting attorney-client privileges was held responsible, tried, and convicted of destroying the evidence. The question of whether or not the data recovery company should be held to the same standards comes into play.

3. Chen- Large enterprises have been reluctant to move certain files or apps to the cloud network. The market size for cloud is far behind what it was expected to be, and for good reason. Consumers have concerns with cloud computing security, especially when it involves data security and confidentiality issues. This article shows the legitimacy of concerns people are have when dealing with
…show more content…
Arnie and the other employers could lose their jobs.
2. What if Fred was right and Mr. Bowen was an author?
3. Arnie has a responsibility to keep every customers data confidential.
These arguments can be defended rather easily. All of the employees, including Arnie have a highly sought after skillset as the case study states and should therefore have no problems finding new employment. As for the second argument, if Mr. Bowen were truly an author he could have easily brought it to the attention of the company. But instead asked about the extent of confidentiality. A person seeking these services should realize that there could be consequences for anything found to be incriminating.

VII. Reflection
During the critical thinking process I learned how to tie in a lot of the ideas and concepts we learned over the course of the semester. I missed a few classes at the beginning of the semester due to a 7-day a week job, but this assignment has helped me tie together the missing pieces. I may have assumed a little too much during this assignment and focused too much on justice. Mr. Bowen brought his computer to be recovered because he threw it out of his window so I naturally assumed he was a violent person. The only actual supporting incriminating evidence was the fact that it was on his computer. After finding my last source, I now realize that Mr. Bowen could have easily picked up the hard drive pre-owned with the data already on it. The pictures and diary may not even be his

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    There was no justification with taking the computers. There was enough information on the harddrives of the computer Aaron Greene purchased as the data was never erased prior to the sale. What was found on the computer was illegal pornographic images and videos stored on the harddrive.The purchaser agreed to let the City of Monetery, CA police department obtain the computer and secondary storage devices. Since the computer purchased by Greene was from a seller on Craigslist, there is enough of a cause to research the seller. Forensic experts found the images on the computer was from a local company. Resonable search procedures established found further incriminating evidence among such items as business records. The owner of the business contacted,…

    • 132 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    drive. You prepared the contents of the seized hard drive using a variety of forensic tools as…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cloud computing is a fast growing information technology trend that many companies including Google, Microsoft, and IBM are currently looking to get a stake in as demand for the service grows. Cloud computing is the concept of allowing both individuals and businesses to store data and applications on remote servers (owned and operated by a third party company), rather than on their own hard drives and data centers. The service boasts the ability to securely access data and applications from just about any device with an internet connection, allowing for such services as streaming music from a personal collection from multiple devices, and even to business development and storage of applications on remote servers. For the past few years, cloud computing has quickly grown in popularity, and as such, has come with its own set of risks and security concerns. As use of this service grows by both consumers and businesses, it will no doubt continue to attract the attention of hackers and cyber criminals, as it offers a central repository of data that can contain everything from financial statements, to company intellectual property. On 7/11/2011, eweek.com posted an article called “Cloud Computing Security: 10 Ways to Enforce It”, which attempts to give several suggestions on the best way to ensure that cloud computing is as safe as it is convenient.…

    • 1626 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    How can ExtremeNet’s leadership best respect the rights of Allen Lopez and ExtremeNet? ? Explain the impact of your ethical decision on Allen Lopez and the company.…

    • 297 Words
    • 1 Page
    Satisfactory Essays
  • Best Essays

    A. Laura Moscone, a Human Resource Director for a small firm, has to decide which applicant out of a set of finalists she should hire for an outside sales position; however, her firm’s policy includes Facebook postings of their private life in her decision making for hiring any applicant for the outside sales position.…

    • 2171 Words
    • 9 Pages
    Best Essays
  • Good Essays

    Monimed: Voluntary

    • 962 Words
    • 4 Pages

    Legally the company did not have to share information with the employees. By law, MoniMed only had to share…

    • 962 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Eth 316 Simulation Week 3

    • 1059 Words
    • 5 Pages

    The issue presented in dilemma number one arises from an employee named Aaron Webb who posted sensitive company information. His posting was not derogatory in nature however the information is considered private. Many companies guard their information and keeping their core competencies sacred in order to remain competitive. Another employee named Jamal Moore sent an anonymous message revealing through hacking into Webb’s computer that Webb has many of these sensitive files loaded on his personal computer. The issue arises of how to respect the personal views of employees outside of the workplace.…

    • 1059 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Ethic Simulation

    • 736 Words
    • 3 Pages

    employee and the actions of a second employee. The Veiled ID presented an issue that arises as…

    • 736 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Cis 500- Cloud Computing

    • 1078 Words
    • 5 Pages

    Technology has taken great leaps of advancement. Some of the new technology that companies and consumers are taking advantage of to store and process data is cloud computing. Cloud computing was derived from virtualization. Virtualization allows companies to separate business applications from hardware. Doing this gives the company the capability of assigning applications as needed. The option to manage applications is a great benefit to companies. Resulting from the virtualization error, cloud computing has emerged to provide flexible IT infrastructures. This has not only enhanced the options companies now have, but it is also proven to be more cost efficient. This has increasingly become a preferred method of companies and consumers alike. (Turban, & Volonino, 2011, p.47)…

    • 1078 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    In this article, Patrick Thibodeau comments on Federal CIO Vivek Kundra’s claim that cloud computing concerns are exaggerated. Thibodeau explains clearly the claims made by Kundra about the overall security with cloud computing. Thibodeau blames the scare of cloud computing to IT developers belief of a status quo. Thibodeau concludes the article with a few success stories of basic cloud computing services working in the U.S. Government.…

    • 659 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Digital Forensics Paper

    • 1176 Words
    • 5 Pages

    It can be argued at times that from an economic standpoint that digital forensic analysis can be valued when it saves the companies millions of dollars by ensuring their network is not intruded, however it certainly is not valued oftentimes on the individual level. The criminal side of digital forensics can be quite disturbing, especially when dealing with sensitive topics such as, child pornography. Although it can be quite gratifying for individuals to know they took part in capturing a sexual predator, oftentimes, as observed by Irvine (n.d.), a burnout issue among digital forensic practitioners is more present (As cited in, Losavio, Seigfried-Spellar, and Sloan, 2016). The value in which individuals derive rom the practice of digital forensics if most definitely lower as it can often be viewed as less gratifying as individuals become more sensitive to digital content over long periods of…

    • 1176 Words
    • 5 Pages
    Good Essays