Software Ethics

839 Words2 Pages

In a situation where a software engineer is asked to design a system with inherent security vulnerabilities, many ethical issues involving several stakeholders are encountered. Diane Jones is the owner of a software development company that has been contracted to engineer a database management system for the personnel office of a medium-sized toy manufacturing company. Management members of the toy manufacturer involved with Diane in the design of the system include the CEO, the director of computing, and the director of personnel. The database system will contain sensitive information pertaining to the employees of the toy manufacturer.

Weak security for personal data concerning employees of the toy manufacturing company creates an alarm for the software development team. This information includes medical records for insurance claims, performance evaluations, and salary information. Therefore, an ethical dilemma occurs when the toy manufacturing company is persistent in constructing an ineffectual security system in order to provide short-term financial reprieve.

The software development company and the individuals involved on this project risk a negative impact upon their reputation if the system requested from the client is fundamentally flawed, thus creating a public image relaying their inability to produce quality software that is of the highest security standards. Ms. Jones has the right to express her concern to her employer and thereby a responsibility as an ethical software engineer to attempt to convince the personnel office for the toy manufacturer to adopt a more secure system despite the increased expenditure. The previously mentioned upper management members of the toy manufacturing company involved i...

... middle of paper ...

...in order to properly secure the restricted data contained within the system. The software development team carefully explains the danger of compromised data both in the form of a technologically proficient employee along with the potentially greater and more damaging theft of data perpetrated by online hackers. Financial loss due to inadequate data storage and security is also explained to the client. The goal of this explanation is the realization that an increased preliminary investment may ultimately be significantly less expensive than a breach of an insecure system. In the event the client is unable or unwilling to modify the structure of the system, the recommended course of action is for the software development team to decline implementation of the system with consideration to the consequent damage to the repute of the software development organization.

Open Document