As it gets simpler to store our information utilizing various advancements like distributed storage, there is a worry about how a person’s data is being put away. Information penetrates and unreliably putting away a person’s information upset trust, is a lack of respect to law, and abuses moral standards. A portion of the moral issues that emerge while putting away electronic data of people are 1. Improper utilization of information, 2. Saving a person’s very own information for more than needed, 3. Offering clients’ very own data to outsider organizations with the end goal of business 4. Not declaring information penetrates that manage clients’ very own data. The absence of a moral and expert culture of managing individual data in an association will contrarily affect the standing of the business. Moreover, Ethical oversight is expected to guarantee that proper security estimations are taken to store individual information. Vagueness and disarray that include putting away information need to be eliminated and clear standards and moral codes ought to be introduced to individuals so; they understand what the correct route is to act. Other than that, to have a thorough rundown of good and moral codes of managing electronic information, we should think about both current and future utilization of information. Regardless of whether we are gathering information, or our information is being gathered, we need to think about posing these inquiries. How my information will be put away, who will approach my information, and what security estimations have been taken to store my information. Discovering answers to these inquiries will assist with having a reasonable thought of how your information is being utilized and does the gatherer guarantees the honesty, secrecy, and accessibility of information. The secrecy and obscurity of the put away information should be protected to keep information security. Exploitative utilization of individual data adversely affects a business’ standing and is a conspicuous infringement of the terms of assent.  The United States has one of the best cyber security systems in the world.  There are many countries that are not sensitive to cyber security systems and one of those countries is Tajikistan.  This country has one of the worst cyber security systems in the world.