Cyber security is the primary concern of the internet age. Cyber security maybe defined as the protection and regulation of the use of data in the cyber space. In the present global scenario it is impractical to assume that data is protected if it is stored in a database that is linked to the cyber space. The advent of reverse engineering and hacking tools has lead to universal access to data on databases from remote locations.
Cyber security in the United States is governed under the Computer Fraud and Abuse Act of 1986 (Eichensehr, 2014). This act defines various unethical activities that maybe considered as cyber crimes and prescribes penalties for the same.
In the given set of circumstances, the employee in question was apprehended while having National Security Information on her computer. Under section 1030 of the act this is prescribed as a cyber crime. The computer used by her is the HP Spectre 13-v122TU which has its own fingerprint and facial recognition locking system. The investigation conducted shows that the system was logged into through fingerprint and that the national security information downloaded was within the time frame of the log in. This proves beyond reasonable doubt that the information was accessed by her and no one else could have downloaded the same. The act prescribes for 10 years imprisonment in such a case for a first time offender (Schmitt, 2014).
To conclude, the national security information located on the system was accessed by the identified employee and the same is unethical behavior which, beyond repercussions within the organization, attracts criminal liability for the same. Conduct of this nature cannot be condoned in an organization and it is the organizations responsibility to report the same to the concerned authorities.
Eichensehr, K. E. (2014). The cyber-law of nations. Geo. LJ, 103, 317.
Schmitt, M. N. (2014). The law of cyber warfare: quo vadis. Stan. L. & Pol'y Rev., 25, 269.