A CASE RELATED TO CORPORATE SPY WORK. Dates back to 6 th century. Unethical and illegal method of collecting information related to- * Corporate strategies.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

By : Edwar Hernandez : Lillian Tai : Pat Khamlaksana.
TGT - Debtor and Creditor Monitoring Program Risk Mitigation Experts - Managing your current and contingent liability" 1.
McGraw-Hill/Irwin Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Chapter 10 MERGERS AND ACQUISITIONS Behavioral Corporate Finance.
Robert Libby Patricia A. Libby Daniel G. Short
6/1/ Analyzing Technology Stocks Written by: Kristen Spotz CGS 1060 July 22, 2002.
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Legal Workshop for Entrepreneurs Presented to the Stanford GSB Entrepreneur Club.
Ethics in Finance PGDM-Session 7.
Forensic Accounting. Agenda Definition History Skills Business scandals Cases.
CASE ANALYSIS.
Michal Bodlák. Definition  An investment bank is a financial institution that assists: individuals, corporations and governments companies involved in.
Software Licensing and Compliance Initech is the consulting firm for Bust It Airlines Tiffany, CIO Clayton, CFO Becca, CEO.
By: Joni Perry and Mark Tsai Group Project for Finance 500 Texas A&M University Central Texas Professor: Dr. Mary Kelly.
Introduction to Fraud Examination. Discount Plus Company has been concerned for some time about its cash flows. Since the company began five years ago,
FOR EMPLOYEE MONITORING By: Tabitha Seehousen Section: August 11, 2010.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Financial Statements and Business Decisions Chapter 1.
Teresa Macklin Information Security Officer 27 May, 2009 Campus-wide Information Security Activities.
Jolly Phan Cal State University of San Marcos Professor Fang Fang IS News 11/12/2009.
ANNUAL REPORT HEWLETT-PACKARD VICTORIA KENWARD ACG2021 SECTION 002.
1-1 Managing Information Technology. 1-2 Information ●What information do businesses keep and use? ●What information have you been exposed to today?
Annual Report HP Maria Farinez ACG Executive Summary HP is the leading company in technology around the world. At the end of 2003 HP had a revenue.
Presented by Group H: Abigail Smith, Glen McDonald, Lee Kryzinski, Tom Hoang, Jerry Jimenez.
Fraud and Forensic Auditing Chapter Ten. Definition of Fraud “…any act involving the use of deception to obtain an illegal advantage.” (ISACA Irregularities.
Group E: Balmaceda, Henry Montez, Monea Parra, Jorge Tjia, Claire.
Case 5: Hewlett-Packard’s Secret Surveillance of Directors and Journalists Group Presentation Elvia Ortiz, Tabatha Thurman, and Justin Hysmith.
Patricia E. Scipio, CIA, CPA Vice President, Auditing Wellchoice, Inc. Empire Blue Cross Blue Shield.
Presentation Case study 2: Ethics at hewlett-packard
Ethics in Finance.
The DoubleClick controversy and other related issues pertaining to privacy on the Internet.
Copyright © 2007 by The McGraw-Hill Companies, Inc. All rights reserved. Financial Statements and Business Decisions Chapter 1.
Company Life By: Kaleb Simmons 9/29/2014 Google The Googleplex is located at 1600 Amphitheatre Parkway in Mountain View, Santa Clara County, California,
Chapter 10Chapter 11Chapter 12Chapter 13Potpourri Final Jeopardy Score: Player 1 Player 2 Player 3.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Laws and Resources. Understanding Case Law  Technology is evolving at an exponential pace  Existing laws and statutes can’t keep up change  Case law.
ESOPs: It’s More Than a Matter of Trust Presented by: Dan Reser President; Fiduciary Services, Inc
Technology Industry Four Largest Computer Hardware Makers IBM DELL Gateway Hewlett Packard.
PTGC Part Time General Counsel Prepared for:. The Concept Having a high caliber, senior level “legal insider” on location part-time, compared to the outside.
CHAPTER1 Accounting in Action. Chapter 1: Accounting in action What is accounting?The building blocks of accountingThe basic accounting equationUsing.
Lenovo Group Ltd. Yellow Ling, Class 2. Mission statement Our mission: to innovate for customers. We are now one company with one goal: To build the best,
Investor Presentation November Forward Looking Statements This presentation may contain forward-looking statements which are subject to a number.
The Industry, the Company and its Products
Hosted by Dr. William J. Frey Hewlett- Packard Case Hughes CaseCorporate Governance
Role of Montana State Fund. Montana State Fund is committed to the health and economic prosperity of Montana through superior service, leadership and.
Making Your Career Decision…. Is CalPERS the place for you?
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
TAMILLA CURTIS AND JOHN LEDGERWOOD EMBRY-RIDDLE AERONAUTICAL UNIVERSITY, USA THE COURAGE TO SPEAK UP A TEACHING CASE STUDY WORKPLACE AND PROFESSIONAL ETHICS.
Page 1 | CATERPILLAR CONFIDENTIAL: YELLOW DELIVERING THE COMMITMENT Helping our Customers Succeed: An information professional ’ s perspective Lea McCall,
Peter A. Sokoloff & Co. Specializing in Mergers and Acquisitions of Security and Telecommunications Companies. Peter A. Sokoloff & Co. 550 North Brand.
DELL – CURRENT COMPETITIVE ENVIRONMENT TYPE: Public TRADED: NASDAQ INDUSTRY: Computer Hardware & Software, IT Consulting, IT Services PRODUCTS: Desktop,
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Montgomery College Acceptable Use Policy (AUP). 2 This Acceptable Use Policy (AUP) PowerPoint presentation was developed by the Office of the Information.
FINANCIAL ANALYSIS BY EBBONY PAGE. Overview  History of Organization  CEO & Mission Statement  Products and Services  Current Events  Horizontal.
Effective Leaders Dealing with a Problem
Objective 4.04 Understand Marketplace Experience
HP support phone number
HP tech support number Call Us Now :
Dell Technical Support Number Visit this website link to get instant technical support and information on dell …. Dell laptop customer.
Society of Risk Management Consultants Annual Conference
Cyber Trends and Market Update
Chapter 3 Emerging Business Ethics Issues
Chapter 21 Accounting Practices.
Warburg Pincus: A Leading Private Equity Firm
Far Niente: A California Winery Producing a Variety of Wines
Freemark Abbey: A California Winery Producing a Variety of Wines
Grgich Hills Cellar: A California Winery Producing a Variety of Wines
Aberdare Ventures: A Leading Venture Capital Firm
Kendall-Jackson: A California Winery Producing a Variety of Wines
Geyser Peak: A California Winery Producing a Variety of Wines
Presentation transcript:

A CASE RELATED TO CORPORATE SPY WORK

Dates back to 6 th century. Unethical and illegal method of collecting information related to- * Corporate strategies. * New product development/launch plans. * Target markets. * Customer and supplier plans. * Merger and acquisition plans. * Pricing, advertising, packaging etc.

Agents do not abide by any legal or ethical guidelines, & do anything to get competitive information. It includes dumpster diving, social engineering, interviewing disgruntled employees, bugging offices, hacking computer systems and telephone lines.

Type : Public Founder(s): Bill Hewlett & David Packard Headquarters: Palo Alto, CA, United States Area served: Worldwide Largest technology company in the world Industry: Computer Systems, Computer Peripherals, Computer Software, Consulting IT Services

Products: Computer Monitors, Digital Cameras, Indigo Digital Press, Networking, Personal Computers and Laptops, Personal Digital Assistants, Printers, Scanners, Servers, Storage Televisions.

Operating income: US$ billion (2008) Revenue: US$ billion (2008) Net income: US$ billion (2008) Total assets: US$ billion (2008) Total equity: US$ billion (2008) Employees: 321,000 (2008)

PERSONS INVOLVED 1. Patricia Dunn, Chairwoman, HP. 2. George Keyworth, Board Member. 3. Ann Baskins, Head Attorney.

BACKGROUND HP found that some of its highly confidential data regarding HP’s long term strategy leaked during January, 2006.

On September 5, 2006, Newsweek published a story……. “Chairwoman of HP, Patricia Dunn, has hired a team of independent electronic- security experts who spied on HP board members and several journalists, to determine the source of a leak of confidential details regarding HP's long- term strategy in January, 2006.”

TECHNIQUES USED BY SECURITY EXPERTS: 1. Pre-texting to obtain call records of HP board members and nine journalists, including reporters for CNET, the New York Times and the Wall Street Journal. 2. Investigators dressed as cleaners and entered inside the San Francisco offices of The Wall Street Journal and CNET.

RESULT OF SPYING: ADVANTAGE: Board member George Keyworth was found guilty for leakage of confidential data. On September 12, 2006 Keyworth resigned from the board.

RESULT OF SPYING: DISADVANTAGE: On September 22, 2006,Dunn was forced to resign. On September 28, 2006, Ann Baskins, HP's general counsel (head attorney) resigned hours before she was to appear as a witness for the case. Faced investigation by the government On December 7, 2006 hp paid $14.5 Million to settle civil charges brought by the California Attorney General.

UNETHICAL METHODS USED……. Lies Fraud Trapping of private telephone lines Misrepresentation

RIGHTS VIOLATED…… Right to privacy. Right to free speech. Right to private property. Right to confidentiality.

1. Never expose your internal network to outsiders 2. Make sure all storage areas are secure 3. Ensure that data at rest is properly protected

4. Protect against data deletion and data loss 5. Protection from data tampering 6. Regular auditing, random and regular monitoring