Governance , Identity & Access Management , Next-Generation Technologies & Secure Development

Misusing Privileges: The Gray Areas

Audio Blog: Evaluating the Ethics of Accessing Data
Misusing Privileges: The Gray Areas

Misusing data access privileges can pose a threat to the integrity of an organization's information systems and the privacy of individuals.

But gray areas exist, and it's not always clear cut when "unofficially" accessing protected data means users are abusing their privileges.

In this audio blog, you'll hear the executive director of the Delaware Criminal Justice Information System, Peggy Bell, describe a situation involving a police officer accessing the court records of one of his child's friends because the friend was too nosy about guns kept in the officer's home. Was the friend a potential burglar? Was the officer right to use the system, known as DELJIS, to check out the friend, or was he misusing his access privileges?

Please listen to the audio blog (it's only 4 minutes), and let us know whether you believe the officer was correct ethically in accessing the records of his child's friend. Leave your comments in the box below.

DELJIS is the central state agency responsible for providing the development and operation of the hardware, software, network and database that comprise the criminal justice information system.

The system uses technology from Bottomline Technologies that captures data through network sniffing and provides advanced analytics and enterprise alerts and case management. DELJIS analysts use the technology to determine whether privileged users might have used the system without proper authorization.

Bell has worked at DELJIS since 1986, first as a security and operations manager and since 2006 as its executive director. Previously, she served for nearly a decade as a quality control and records supervisor for the Delaware State Police.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.