gained from many sources to market additional business services Unauthorized Access of Personal Files Collecting telephone numbers, email addresses, credit card numbers, and other information to build customer profiles Chapter 13 Security and Ethical Challenges 33.