Essay Example on Securing Privacy: Protecting Personal Data & Rights

Paper Type:  Essay
Pages:  4
Wordcount:  964 Words
Date:  2023-02-11

Introduction

Security and privacy are words that are almost used interchangeably since they all provide the basics of controlling and preventing any unauthorized access to private data. Security focuses on the protection of personal information, for example, data belonging to an individual that when disclosed, may challenge one's privacy and security (Moser & McDonald, n.d.). Privacy, on the other hand, is the right an individual or company may have to control its personal information and how they can be applied (The Elements of Moral Philosophy, 2002). The Apple Company was mainly defending its security after going for a court order to avoid giving details to the Federal Bureau of Investigation (FBI). In the modern world privacy and security are very important since they can be used to block the websites, cable companies as well as preventing other people or companies from accessing your personal information (The Elements of Moral Philosophy, 2002). This paper focuses on the case between the FBI and the Apple company in which the FBI was requesting help from the Apple company to help in accessing the information from the iPhone 5c of the terrorist that have left fourteen people dead through the mass shooting in San Bernardino in California.

Trust banner

Is your time best spent reading someone else’s essay? Get a 100% original essay FROM A CERTIFIED WRITER!

If The Device's Encryption had not been circumvented Without the Company's Assistance, Should Leaders At Apple Have Helped The FBI Gain Access To The Terrorist's Phone? Why or Why Not

No, this is because the giving out the information will act as a violation of the rules of the Apple since the company serves a large number of loyal customers hence giving out the information accessible to the FBI will act as a betrayal to its customers (Cuijpers & Schendel, 2016). This is because according to apple helping the FBI to open one iPhone will make them vulnerable to other criminal element access not only to the American government but also to the spy of other countries (Moser & McDonald, n.d.). Another evidence that shows that the Apple users could not support the FBI is that even the judge ruled in favor of the Apple and also according to Apple senior officials they believed that defiance was not a business choice since cooperating with the government will lead to situation such as murkier that will behave internationally to eventually reaching its potential Apple customers such as China.

Strengths and Limitations of a Utilitarian Approach to Ethical Leadership

Utilitarism approach to ethical leadership is the process of assessing the issue or action in terms of an outcome and consequences in the selection of a prescribed code of behavior to serve the people fairly. For example, one should assess the cost and benefit before engaging with its stakeholders to decide on the paths that lead to the least harm (Croson & Rachel, 2009). The strength and limitation of Utilitarism approach to ethical leadership are indicated below.

Strengths

Fosters for democracy

Utilitarism fosters for democracy since leaders apply the laws that are fair and balance everyone differing interest which is majorly practiced in today modern world.

Secular

Due to different beliefs, culture and religion, utilitarism does not favor any of them; therefore, it can be equally applied to all the people regardless of their faith. Since it does not follow, certain believes leaders will be in an excellent position to serve the people equally.

Easy to use or apply

It is easy to apply since the criteria used will be weighing up the negative and positive effects or results of our actions openly through the experience we have from our past mistakes.

Universal

Utilitarism supports good morals through the principle of utility which is supported by all the people. For example, happiness and reducing injuries to humankind is a tool that is required by every human being on earth.

Limitations

Unpredictable

Sometimes it's not possible to predict what will happen in future even through focusing. Therefore, making future choices becomes difficult. This is because some decisions and choices that have been made may not come in the future.

Considers only happiness

Other things are of intrinsic worth apart from happiness, such as being free, to be loved and the gift of life that is not discussed in the utilitarism. To foster for a wide area utilitarism should involve application of all the just activities that affect humanity.

Majorly depends on the tyranny of numbers

In case of areas of debating the laws that will pass are the once the highest numbers will support that. For example, if there is a larger group supporting homosexuality in the country, the law will automatically be on their side, leaving the rest without any other option other than to obey as it has been stipulated.

Conclusion

The discussion introduces the security and the privacy of the Apple Company that have been in question between the American government through FBI and the Apple company after the terrorist attack that left fourteen people dead. It also covers the question of whether Apple could have helped the FBI in case they have failed to check the Apple iPhone data to be used in terrorist tracking. The answer was a no since it will act as business secrets violation that may cost the company as well as vulnerability to company data access by another spy of other countries. Strengths and weakness on the approaches of the utilitarism and ethical leadership are also discussed.

References

Croson, R., & Konow, J. (2009). Social preferences and moral biases. Journal of Economic Behavior & Organization, 69(3), 201-212. doi:10.1016/j.jebo.2008.10.007

Cuijpers, C., & Van Schendel, S. (2016). Data Protection by Design als argument in het FBI vs Apple-debate. Justitiele verkenningen, 42(3), 37-47. doi:10.5553/jv/016758502016042003004

Moser, R., & McDonald, P. (n.d.). The FBI & Apple: Security vs. Privacy(pdf).

The Elements of Moral Philosophy. (2002). Philosophical Books, 28(3), 173-175. doi:10.1111/j.1468-0149.1987.tb01234.x

Cite this page

Essay Example on Securing Privacy: Protecting Personal Data & Rights. (2023, Feb 11). Retrieved from https://proessays.net/essays/essay-example-on-securing-privacy-protecting-personal-data-and-rights

logo_disclaimer
Free essays can be submitted by anyone,

so we do not vouch for their quality

Want a quality guarantee?
Order from one of our vetted writers instead

If you are the original author of this essay and no longer wish to have it published on the ProEssays website, please click below to request its removal:

didn't find image

Liked this essay sample but need an original one?

Hire a professional with VAST experience and 25% off!

24/7 online support

NO plagiarism