Incident & Breach Response , Managed Detection & Response (MDR) , Security Operations

Exploring the Ethics Behind DNC Breach

What is the Propriety of Conducting One's Own Breach Probe?
Exploring the Ethics Behind DNC Breach
Bernie Sanders apologies to Hillary Clinton over a data breach. (Photo: ABC)

Most of the media coverage of a Bernie Sanders campaign aide accessing proprietary data from the Hillary Clinton campaign focused on the politics between the Democratic Party's presidential rivals. That is a battle that this audio blog will ignore.

What's addressed in this report are the ethics that confront IT security and other professionals associated with such a breach.

"It's a gray area as it is currently practiced in industry," says Purdue University Computer Science Professor Gene Spafford, executive director of the Center for Education and Research in Information Assurance and Security. "We have a lot of people who, upon finding a problem, will attempt to investigate it on their own, rather than involving the custodians or owners (of the database)."

In this report (click on player beneath the above photo to listen), you'll hear:

  • Sanders explain his intolerance for accessing his rival's proprietary information;
  • Josh Uretsky, the Sanders aide fired over the breach, defend his actions; and
  • Spafford analyze the ethics involved in such breaches.

Let us know what you think by leaving a comment in the box below.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.