Follow the attached instructions to complete this work
Unit 5 Discussion
Overview
In this discussion, you will be considering the emphasis on aspects such as privacy and safety. You will reflect on the significance of the legal concerns and goals of public-private partnerships to address cybersecurity. You will also evaluate the ethical considerations for government employing private entities to work on public databases and cybersecurity concerns.
Once you’ve clearly distinguished between these concepts in your initial post, subsequent posts may focus on their various applications. In answer to the mandatory post below, you will consider ethics. Then, for the additional prompt, you will provide an example or add personal observations.
Discussion Prompts
1.
Mandatory Prompt
· Discuss the ethical implications of using private companies to protect public data. How do governments and corporations need to gather, store and use data?
2.
Choose One Additional Prompt
· Share any personal experiences or observations when you’ve seen the law functioning effectively in the regulation of public-private partnerships for cybersecurity concerns. How did the law impact society’s goals and view of cybersecurity?
· Offer advice on how regulations and laws might evolve to better serve as a mechanism for regulation of data or promote compliance with existing concerns about cybersecurity within public-private partnerships.
Unit 6 Discussion
Overview
JKL Corporation offers end-to-end encryption services to customers in its proprietary messaging application. JKL prides itself in offering private communications that are not subject to eavesdropping. Given their high level of encryption, the messages of suspected criminals cannot be viewed by law enforcement. Court orders and authorized search warrants demanding access to customer communications have begun to be served on JKL to access customer profile information and content. JKL faces a dilemma of not wanting to provide user content, which it claims it cannot independently access and being unwilling to grant law enforcement access to its encryption
keys. Before responding, consider the following prompts:
· Reflect on the significance of the constitutional concerns and legal implications of government surveillance addressing cybersecurity.
· How do we evaluate the government’s need to offer cybersecurity safety?
· Reflect on the importance of existing federal legislation allowing for eavesdropping on electronic communications.
Discussion Prompts
1.
Mandatory Prompt
· How does the Fifth Amendment apply to the government’s request for decryption?
2.
Choose One Additional Prompt
· What ethical concerns and theories apply to JKL’s dilemma?
· How can JKL avoid compliance with court-ordered action forcing decryption?
· If JKL software engineers were able to access customer data and messaging along with discovered illegal activity, to whom should they report it?