Hackers Case
Firstly, I would define ethical hacking as someone who breaches a security system for a benevolent cause. For example, breaking your own system, in order to test the strength of your security, qualifies as ethical hacking. The reason of breaching your own system is to improve your system and to also find the vulnerabilities that a malevolent hacker could take advantage of. Ethical hackers, also known as white hats, use the same techniques as actual hackers (black hats) to breach a system. The difference between them is that white hats report problems and weaknesses, instead of taking advantage of them.
A Code of Ethics has to contain the provisions strongly against invading an individuals private property. It should identify and guarantee that the rights of the individual will not be a casualty to any damages. To ensure the safety of an individual’s privacy, ethical hacking should be carried out with caution. For example, when the “Ethical Hacker” does not take the appropriate precautions while doing what was requested then the action could qualify as unethical behavior.
Some professions, associated with online activities and behaviors, which come to mind are those that deal with customers, and customer service. As we are all consumers, in some way or another, we give out personal information such as our address, phone number, credit card numbers, etc. All this information is stored in a database which the exclusive professional has access to. The individuals with access to this information must have the principled mindset with the characteristics such as trust, objectivity, fairness, and integrity.
Everyone has different principles and standards. Therefore, the effectiveness of a Code of Ethics depends on the individual and what each specific individual values. When a Code of Ethics is being developed, it should be built on values, beliefs, and expectations. The effectiveness of a Code of Ethics can be improved with