Can the use of pretexting to gain information ever justified

Assignment Help Basic Computer Science
Reference no: EM131197288

Dubious Methods Used to Investigate Leaks by Hewlett-Packard Board Members

On September 5, 2006, Newsweek published a story revealing that Hewlett-Packard (HP) chairman Patricia Dunn authorized an internal investigation of HP board members beginning sometime in 2005. Dunn suspected one or more board members of leaking information about HP's long-term strategy to the news media. One such article appeared on the technology Web site CNET in January 2006.2 Making such confidential information public could have a significant impact on the competitiveness of the company and impact its share price. Three private detectives involved in the investigation allegedly engaged in pretexting-the use of false pretenses-to gain access to the telephone records of HP directors, certain employees, and nine journalists. The detectives allegedly obtained and used the targeted individuals' Social Security numbers to impersonate those individuals in calls to the phone company, with the goal of obtaining private phone records. The California state attorney general filed criminal charges against Dunn, Kevin Hunsaker-senior legal counsel and director of ethics and standards of business conduct-and the three outside investigators.3 Dunn admitted that she oversaw the investigation but said she never had any knowledge that illegal methods were used. All charges were eventually dropped against Dunn. Hunsaker and two of the detectives involved pleaded no contest to fraudulent wire communications, a misdemeanor. The judge agreed to drop the charges if they completed 96 hours of community service. The third detective charged in the case agreed to act as a witness for the prosecution and thus escaped criminal proceedings.4 Eventually, the state settled a separate civil complaint against the company. HP agreed to pay $14.5 million to cover fines and legal costs, and also agreed to strengthen its corporate governance practices. The settlement did not involve any admission or conclusion of guilt on the part of HP.5 When the scandal broke, one HP board member, Tom Perkins, resigned to protest the methods Dunn used in the investigation. In the aftermath, Dunn and Hunsaker also resigned from the board. George Keyworth, a 21-year member of the HP board of directors, was identified by Dunn as being the one who leaked the information, and he also resigned. Throughout the scandal, investors continued to show faith in HP, and the price of the stock rose steadily from a level of $32 per share in July 2006 to over $43 per share in early January 2007.

Questions to Consider

1. Which issue is more disconcerting-the fact that a board member leaked confidential information about the firm or the tactics used to investigate the leak? Defend your position.

2. Can the use of pretexting to gain information ever be justified? Is it considered legal under any circumstances?

Reference no: EM131197288

Questions Cloud

Probabilities of the independent events : The probabilities of the independent events A and B are .3 and .6, respectively.
What are specific financial risks for manufacturing company : What are specific people risks for a manufacturing company? What are specific financial risks for a manufacturing company? What are specific operational risks for a manufacturing company?
Why did the individual choose to be unethical : What are the ethical implications? Why did the individual choose to be unethical? How does this behavior affect the corrections system as a whole?
Object moving with uniform accelaration : An object moving with uniform accelaration has a velocity of 11.0cm/s in the positive x-direction when it's x-coordinate is 3.03 cm.if it's x-coordinate 3.15s later is -5.00cm, what is its accelaration?
Can the use of pretexting to gain information ever justified : Which issue is more disconcerting-the fact that a board member leaked confidential information about the firm or the tactics used to investigate the leak? Defend your position.
Placed so that the net force on it is zero : Point charges of 3uC and -2uC are placed .22m apart where can a third charge be placed so that the net force on it is zero? Give answer in terms of meters from the -2uC charge. This particular question the answer is .340 I already missed this ques..
Aligh tbulb and a batery : What observations can one make to prove that something is flowing through wires connected to aligh tbulb and a batery?
How long the soalr system must operate : Both systems will have a $0 salvage value at the endof their useful lives. Based on a MARR of 12%, determine how long the soalr system must operate to make it as economical as theelectric system.
How much electric charge is inside the cube : a) How much electric charge is inside the cube? b) Can you guess what charge distribution inside (and outside) the cube would generate this kind of electric field?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is e-waste

1. What is e-waste? What is so dangerous about e-waste? Many well-meaning individuals thought that recycling was the answer to the e-waste problem. But why hasn't e-waste recycling yielded the results hoped for?

  Create pseudo code to read base price for tax

Create pseudo code for the following: Read base price. Tax is given at rate of 8.5%. If base price is over 20,000 then you should pay the extra luxury tax of 2% on base price.

  Special type of diagrams called uml diagrams

We will be using software to draw a special type of diagrams called UML diagrams that represent software architecture. There are many types that are open source and available for free download.

  Use demorgan law write the expression for the complement

Use DeMorgan's law write the expression for the complement.

  What steps can a company take to reduce these risks

What steps can a company take to reduce these risks?

  Compare the present value of economic profit

1. P15(d): Compare the present value of economic profit in each of the next three years and the loss of $50,000 in the third year using 15% as the discount rate.2. The spreadsheet problem (b): Calculate a mean, .... to statistically describe the data..

  Whats the difference between mongodb collection and a table

What's the difference between MongoDB collection and a table in a relational database. Show the differences as it pertains to create a collection and also displaying the data.

  Analyzing the detailed requirements of your prototype data

Design a database prototype that includes diagrams, data dictionary, design decisions, limitations, etc. The database should consist of at least four tables, two different user roles, and two reports.

  Explain the use of containers in ssis

Explain the use of containers in SSIS and also their types.

  What does a java class contain

What does a Java class contain that identifies it as a Java application?

  Required value for the move command

Shape_index is a required value for the move command. It is the index of the shape in the shape data arrays that you wish to move. It should range between 0 and MAX_SHAPES - 1. Be sure to validate the index.

  Packet sniffer in situation

Provide one (1) example of a situation where the use of a packet sniffer might be justified. Explain why you believe it would be okay to use a packet sniffer in this situation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd