How apple used that law to advance its argument

Assignment Help Management Information Sys
Reference no: EM131158275

BACKGROUND: Syed Rizwan Farook, an environmental health inspector, and wife, Tashfeen Malik, on December 2, 2015, killed 14 co-workers and wounded 17 others at the Inland Regional Center, a Social Services Center in San Bernardino, California that provided services for disabled individuals. Farook was carrying an iPhone 5c, which the FBI believes contains information that would assist them greatly in identifying accomplices, and other third parties who assisted in either planning and/or carrying out the attack, provided weapons, or who communicated with Farook about other future planned attacks. The FBI attempted during December 2015 to unlock Farook's iPhone in order to get access to information that the phone may contain. However, they were unsuccessful in unlocking the phone. Therefore they met with Apple and other tech leaders for assistance in unlocking the phone. The FBI requested of a Federal Judge in California, and received, an Order directing Apple to create software that would allow the FBI to bypass the security feature that prohibited the FBI from attempting no more than 10 times to break the passcode on the phone.

Apple defied the Court Order asserting that the Court's order essentially required it to create a "backdoor" that would undermine the privacy of iPhones around the world. Apple also asserted that it would be bad publicity for it and adversely affect its market share. Apple appealed to the Court of Appeals the the U.S. District Magistrate Judge's Order. The debate has become one of national security vs. personal privacy until such time as the U.S. Justice Department withdrew its request, and asked that its case against Apple be dismissed as an unidentified third party had provided assistance in allowing it to by-pass the phone's feature that prohibited no more than 10 attempts to unlock the phone's security. However, the debate is not over, and undoubtedly similar cases will be litigated in the future.

INSTRUCTIONS: For homework I, you are to do the following:

1. Write a more detailed introduction to the facts of this case, explaining to the best of your ability the facts that have been loosely outlined above. Please cite all of your sources.

2. As the semester progresses, you will read about "precedence", "jurisdictional issues", "procedural issues", different types of law (i.e., statutory law, case law, constitutional law, and other), and other legal concepts. Please explain to the best of your ability, applying what you have learned during the semester, as well as information you have researched, the legal argument that the U.S. Justice Department (FBI) relied on in arguing to the U.S. District Court, and on appeal, why the Court should order Apple to provide the by-pass feature to override the security on the phone. For each law that you cite, explain what it is and how the Justice Department used that law to advance its argument.

3. Please explain to the best of your ability, applying what you have learned during the semester, as well as additional information you have researched, the legal argument that Apple relied on in arguing to the U.S. District Court, and on appeal, why the Court should not order it to provide the by-pass feature to override the security on the phone.

For each law that you cite, explain what it is and how Apple used that law to advance its argument.

4. State which legal argument (that of the U.S. Justice Department or Apple) which you believe is more compelling and which should have prevailed had the Justice Department not been able to obtain the assistance of a third party in bypassing the security feature on the phone.

Support your conclusion by explaining the logic you relied upon.

5. Explain whether you believe the US Justice Department (FBI) vs. Apple case has implications for future similar cases, and if so in what manner do you believe future similar cases will be impacted by this case.

This assignment is due on August 7, 2016 at 11:30 p.m.

It is not necessary that you use any particular model formatting. However, your paper should be submitted in a WORD format, using no less than a 1 inch margin, top, bottom, left and right.

Further the paper should be double spaced, and you should use subheadings where appropriate.

Cite all sources. You decide whether you will use endnotes or footnotes. Please include your name and student id on your submission. You should plan to give your submission a title.

Please include page number on the bottom center of each page.

Reference no: EM131158275

Questions Cloud

What amount of shipping department costs : What is the net advantage or disadvantage of re-working the keyboards?- What amount of shipping department costs should be allocated to these sales.
Previous shape image should disappear : For every appearance of the shape's image at a new location, the previous shape's image should disappear - that is, at any given time there should be only one shape displayed on the canvas.
Explain how supervisor should state minimum job requirements : Describe how the supervisor should state minimum job requirements when he or she requests new employees to be hired into the department.
Programming language is python : Write a function month() that takes a number between 1 and 12 as input and returns the three-character abbreviation of the corresponding month. Do this without using an if statement, just string operations. Hint: Use a string to store the abbrevia..
How apple used that law to advance its argument : Explain whether you believe the US Justice Department (FBI) vs. Apple case has implications for future similar cases, and if so in what manner do you believe future similar cases will be impacted by this case.
Technical side of presentations : Please do not the information we have in previous discussion questions about to give a presentation. The focus of this is the technical side of doing presentations.
Describe benefits and disadvantages of business analytics : Describe the business and provide a summary of the business analytics they could apply to their business in multiple scenarios. Describe the benefits and disadvantages of business analytics, as well as how the organization can be proactive in address..
Estimate the equilibrium conversion and outlet temperature : If a mixture of steam and ethyl benzene is fed to an adiabatic reactor at 2 bar, 640 °C, estimate the equilibrium conversion and outlet temperature as a function of the ratio of steam to ethyl benzene. What ratio would you recommend using in pract..
How employees with family medical issues may have treated : Make up two examples of how employees with family medical issues may have been legally treated, prior to the passage of the FMLA and how those very same situations would now have to be handled because of the passage of the Act.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Advancing technologydescribe the human implications of

advancing technologydescribe the human implications of advancing audio visual and internet capabilities to meet the

  How is a web app different from a desktop application

What operating system does your computer use? What are some examples of applications residing in your personal computer? Do you use any apps or websites now that you think are cloud-based? How is a web app different from a desktop application?

  Identify network element that are interrelated and dependent

Isolate one (1) of the difficulties of communicating in the troubleshooting process and recommend one (1) way that the network troubleshooting engineer can do to overcome it. In your response, be sure to indicate the importance of communication at..

  Restaurant transformation of inputs food to quality

restaurant transformation of inputs food to quality outputsif a restaurant purchases high quality ingredients as input

  Ways in which you experience information overload

What are some of the ways in which you experience "information overload" in school, at work, or just in everyday life

  Information politicsone of the most critical problems faced

information politicsone of the most critical problems faced by the information technology department in virtually every

  Discuss techniques of effective presentation delivery

Describe the characteristics of effective business presentations - Show techniques of effective presentation delivery.

  Describe their information management system

The paper is on Walmart. Describe their information management system (IMS). Does their IMS give them a competitive advantage over their competition

  The infrastructure and regulation of the internet

Topic: The infrastructure and regulation of the Internet has seen many changes over the past two decades. It will certainly see as many, if not more, in the next. We have discussed where the Internet came from, why, how it is structured and how it mo..

  What you believe is the greatest source of information

Explain what you believe is the greatest source of information for hackers in the footprinting stage, including where this information is commonly found and how a hacker is able to obtain it. Justify your response.

  Important information about technology trendsyou receive an

important information about technology trendsyou receive an e-mail from your supervisor about her attendance at the

  Computer hardware industry analysis research paperi need a

computer hardware industry analysis research paperi need a computer hardware industry analysis including contents

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd