Professional Issues in Information Technology

Subject: Tech & Engineering
Pages: 9
Words: 1933
Reading time:
7 min
Study level: Bachelor

Ways of Protecting Customer’s Privacy

The security of customers’ data is integral for the success of the business. It is important to use a secured socket layer (SSL) certificate to protect customers’ privacy. SSL is among the most effective methods of providing online security to a business’ customer. This solution encrypts data sent between the web server and the server. The authorization technique can also enhance consumer privacy when using the internet (Quinn, 2020). In addition, a security policy can be developed and used to safeguard customer data from unauthorized access. For example, I would create accounts for administrators to give access to specific areas such as orders, products, and others. Based on this, access to some areas of the website would be limited. Therefore, the security of the patient’s data depends on data protection measures adopted.

Customer privacy can also be achieved through strong encryption, up-to-date security patches, and plugin updates. The security of customer data starts with a customer because they are the main guardian of their information. Based on this information, it is important to demand the use of strong encryptions such as passwords from customers (Quinn, 2020). Privacy can also be achieved by staying up-to-date with the latest applications and software. Hackers can easily exploit vulnerabilities in older versions to launch an attack. In addition, regular update of plugins is crucial for protecting a system. It reduces the vulnerability of the system and protects customer data from cyber-attack. As a result, having strong encryption and constant update of the system protects customer data.

Data security is about safety, and convenience is achieved when website owners and customers work together. Firstly, it is important to take the initiative to train customers on the need and how to set strong passwords (Quinn, 2020). It is integral for the customers to avoid using short passwords because they can be cracked easily. They should be informed on how to create longer and more obscure passwords. This ensures that the system only accepts secure passwords when creating their profiles. Secondly, educate the customers that they should avoid sharing their passwords with others. They should also refrain from writing down their passwords on documents because they can be accessed. Thus, the security of customer data requires their equal participation.

Informing Customers About Data Breach

Yes, I would inform my customers about the breach to reduce the adverse impact of the breach. Normally, during a breach, customers’ data get into the hands of hackers who may use them to commit other crimes. This means that the breach exposes customers to fraud, which can be through impersonation and other areas. If a data breach notification is not sent, it exposes the customers to fraud attempts with their exposed personal information (Quinn, 2020). It can lead to a financial loss, which they may seek to recoup through a lawsuit against the company. As a result, informing customers in case of a data breach enables them to take action to prevent fraud from occurring.

From the social contract theory, it is important to inform customers about the breach. Based on this theory, individuals should prove that they have a reason to support and adhere to a society’s fundamental social rules, laws, institutions, and principles (Quinn, 2020). There are proven rules and policies that govern the notification of customers in the event of a breach. For instance, all states in the US require businesses to notify individuals about data security breaches involving personally identifiable information. Therefore, it will be important to ensure that customers are informed about a breach to avoid a lawsuit.

The Suggestion to Falsify Display Data On the Website

I would agree with the suggestion due to its benefit to the business. Act utilitarianism holds that an action is morally correct when it produces the greatest good for the greatest number of people (Quinn, 2020). This is based on the belief that it is permissible to break a rule if it benefits many people. From this scenario, it is wrong to falsify information to attract more customers to the website. As shown in the case, although the customer’s order would delay, the business is likely to benefit from increasing orders. This means that the business would be able to pay its bills. Apart from the business running efficiently, employees and others who depend on the business would benefit. Based on this, the decision to defy the rule and falsify information is right because many people are likely to benefit.

According to act utilitarianism, adhering to the set rules would have more consequence than benefit. If the business displays the stock as it is in the store, they risk losing customers due to the perception that there are no orders. In addition, the business would not be able to pay its bills because of a lack of funds. The consequences would be laying off employees, reducing their salaries, and closing the business. However, compliance with the rules would benefit only the customer by delivering the order on time. Therefore, the negative impacts are more than the positive when the business follows the rule.

Using Cookies to Improve Customer Shopping Experience

Cookies are very important for e-commerce companies because they can improve customer experience. For example, I can use cookies to save a customer’s username and password, preventing the visitor from having to sign on each and every time they visit. Furthermore, cookies can be used to track information that enables an online store to make more accurate product recommendations or offer loyal customers special prices and discounts. However, I need to seek customers’ consent before saving their personal information and tracking their information. In addition, cookies can store user preferences, allowing a website to remember how the user prefers things organized. I would also ensure that customers’ personal information is secured to eliminate the possibility of a breach.

I would adhere to the existing rules and laws about the collection of personal data. According to the social contract theory, people live together in a society based on agreements that create morals and behavior rules (Quinn, 2020). For example, the law established by the government requires businesses to disclose to customers the type of information collected and how it would be used. To avoid being unethical, I would ensure that all the rules are followed when using cookies to improve the customer experience. I would make sure that customers are informed, and the data collected are used according to the stated purpose. Therefore, adhering to the established rules would make the application of cookies in business ethics.

Data Mining Techniques

Data mining techniques play an integral role in understanding customers’ behavior patterns. As with any iterative process, data mining usually begins with a clearly stated business objective, such as increasing sales, retaining customers, or improving marketing effectiveness. I understand that tracking patterns is a fundamental data mining technique used to discover patterns in large data sets. This technique entails identifying some of the aberrations in data that occur at regular intervals and also assists in identifying the flow of variables over time. For example, it can be used to understand customers’ behavior in purchasing products. As a result, the tracking patterns method is used to identify these data patterns.

Sharing The Analysis Results with Other Parties Without Customer Permission

In my view, it is morally right to share the outcome of the analysis with other parties without customer permission because it does not infringe on their rights. The sharing of the result does not interfere with the privacy of the customer. In addition, it will not expose the customer to the public. According to the social contract theory, an action is morally right if it does not break the established rules and laws (Quinn, 2020). Since personal identifying information will not be released, the action does not interfere with the rights of the customer. In addition, based on act utilitarianism, the action is morally correct because it ensures the benefits of many people. For example, the public might benefit from the information if the outcome is released. Therefore, I considered the action morally right since it does not affect an individual’s privacy.


Using images from another website without the permission of the owner is wrong. I would not engage in such an action because it is unethical and can lead to litigation, especially if the products were copyrighted. The action may damage the reputation of an individual or an organization because one is likely to be viewed as a thief. In addition, taking another person’s image may affect the legitimacy of my action. Based on this, it is wrong to take images of products on another website and post them as mine.

The Benefits and Harms of Collecting and Tracking Customers’ Information

There are various benefits of collecting and tracking customer data through the website. Firstly, it is very easy to obtain information from customers through the website. For example, when a customer signs in on the website, they provide their personal information such as their full names, email address, location, identity card number, and many more. Secondly, it is possible to get a lot of information on the website due to the possibility of increased traffic. Thirdly, it gives an individual the opportunity to use the existing privacy rules to collect data. For instance, the social contract theory posits that an action is right if it follows the established rules and laws (Quinn, 2020). As a result, the advantages of collecting data through the website are accessibility and the ability to collect more data.

On the contrary, there are a number of demerits to collecting and tracking data through the website. The first disadvantage is the possibility of litigation due to failure to adhere to the established rules and laws. For example, it is important to obtain consent from a customer before proceeding to collect the data. The second disadvantage is the likelihood of data breach, especially when storing data. It is the responsibility of the person collecting the data to ensure that the collected data is protected. The third disadvantage is that the information may not be corrected due to a lack of validation. Therefore, the disadvantage of collecting data via a website is its susceptibility to a data breach.

The Limits of Censorship

Censorship is the practice of restricting or publishing content on the website. The first limit that can be applied is a restriction to information. This is because the success of the website depends on sharing of information between online businesses and users. With this restriction, customers may not be able to access the contents of the website. Censorship is usually applied when one has violated privacy rights or has copyright issues. For example, if a business collected customer information and was unable to protect it, censorship can be introduced to restrict the business from accessing any personal information from customers.

The second censorship limit is applied to protect an individual from accessing harmful information. Censorship might keep harmful information from getting out, but it also creates a relationship where one group has more power than another. This means that people in charge can decide what the average person sees when they start to look around on the web. However, there are arguments that people should not be told what they can or cannot do. According to act utilitarianism, an action is right when it makes many people happy. If the restriction is likely to protect many people from wrong content on the internet, it is a good course. Therefore, censorship can be exercised to reduce sharing of harmful content to the public.


Quinn, M.J. (2020). Ethics for the information age (8th ed.). Upper Saddle River, NJ: Addison-Wesley.