This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Module 3 Discussion Should Apple Comply.

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Module 3 Discussion Should Apple Comply.edited

Apple against the government gives a wide view of how the company should base its operations with the set regulation to protect its customers’ privacy of their information. The act of finding a solution to the challenges if the company should comply with giving up their consumers information is not an easy task (Kinicki and Williams, 2018). After the analysis of the options outlined, I picked statement number four “Invent other options.” My understanding and believe on this statement is that it can be used as a tool to tweak the aspects concerning the situations to which Apple should allow access to personal information and a new type of warrant should be put in place.

First, as mentioned earlier, the company should comply with the investigations which comprise of any terrorist incidents together with any criminal activities with felonies classification. Once the investigations have been completed, and enough information or evidence has been gathered to determine the extent of a felony or terrorist incident, there should e existence of the new warrant for such case that allows law enforcement to gain access to the suspected individuals’ phone and the respective company unlock them for law enforcement (Kinicki and Williams, 2018).

Secondly, the action of acquiring a search warrant which is very crucial in identifying the goal of searching for leading evidence (Kinicki and Williams, 2018). Search Warrants are given by the judges or the magistrates in which any law enforcement officer is required to submit evidence that has a high degree of leading the potential cause to believe that search is justified to be done over the suspects’ phone.

Finally, in conclusion, I know have the best understanding to why CEOs to companies like Google, Facebook and Apple grants access to personal information to the law enforcement agencies or simply the government that is very protected by security policies.

Reference

Kinicki, A., &; Williams, B. K. (2018). Management: A practical introduction. New York, NY: McGraw-Hill Education.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask