Should Obama go through your Facebook, Twitter and other social media accounts?

Politicians are now coming to software companies asking for back doors to be able to track terrorists and cyber-attacks. In his recent State of the Union address in January, Obama said:
“No foreign nation, no hacker, should be able to shut down our networks, steal our trade secrets, or invade the privacy of American families, especially our kids.”

British Prime Minister David Cameron also was concerned in a joint press conference earlier in the week. “As technology develops, as the world moves on, we should try to avoid the safe havens that would otherwise be created for terrorists to talk,” said Cameron.

Obama didn’t take the same position on Cameron’s proposal, but he did say that it was important to be able to keep tabs on terrorists who are using social media and the Internet. “When we have the ability to track that, in a way that is legal, conforms with due process, rule of law and oversight, then that’s a capability we have to preserve,” said Obama.

Obviously, politicians represent the views of a significant portion of the population. However, even if they represent the majority, we should not assume that what they are proposing is ethical. If there is a law that requires social media companies to give them ways to keep tabs on people, then we must comply. But we must do our own analysis to see if this intrusion is ethical. As I explained in one of my first blogs, ethics is not about the standards of behavior our society accepts.

In Canada, the Supreme Court recently ruled that the police must have a warrant to get internet user’s information, but it was long overdue for the implementation of this law. The scary thing is that prior to this decision, search warrants were not part of the standard protocol of what is clearly a systematic breach of privacy. In Canada, at least, all it required was a casual request. And these were submitted hundreds of thousands of times a year.

While politicians and law catch up to the reality of current IT abilities, IT should offer opinions as the knowledgeable professionals in this area. We know the parallels between a phone tap and supplying an IP address for a specific customer. The CIPS Code of Ethics has specific instructions about maintaining confidential information and privacy but it also says to put protecting the public interest first. Do we think the warrant process that managed phone taps will work for IP addresses?

I guess I’m Canadian enough to agree with the Canadian Supreme Court. Now we will see what Obama and the U.S. want.

Would you recommend this article?


Thanks for taking the time to let us know what you think of this article!
We'd love to hear your opinion about this or any other story you read in our publication.

Jim Love, Chief Content Officer, IT World Canada
Donna Lindskog
Donna Lindskog
Donna Lindskog is an Information Systems Professional (retired) and has her Masters degree in Computer Science from the University of Regina. She has worked in the IT industry since 1978. Most of those years were at SaskTel where she progressed from Programmer, to Business Analyst, to Manager. At one point she had over 48 IT positions reporting to her and she has experience outside of IT managing Engineers. As a Relationship Manager, Donna worked with executive to define the IT Principles so departmental roles were defined. As the Resource Manager in the Corporate Program/Project Management Office, she introduced processes to get resources for corporate priorities. In 2003 she was given the YWCA Woman of Distinction Award in Technology.

Featured Download

IT World Canada in your inbox

Our experienced team of journalists and bloggers bring you engaging in-depth interviews, videos and content targeted to IT professionals and line-of-business executives.

Latest Blogs

Senior Contributor Spotlight