How can organizations differentiate between ethical decision-making and legal decision-making frameworks?
An organization's security policy states that only authorized employees are granted access to the payroll database. During the onboarding process, two newly hired employees realize they have been erroneously granted access to the payroll database.
Which security practice has been violated?
An auto manufacturer is developing a new line of autonomous vehicles. Multiple accidents, including fatalities, involving competitors' autonomous vehicles have already occurred. Management is concerned about potential liability, reputational damage, and financial loss. In response, the system safety engineer conducts a review at each stage of the software development process to record, assess, and account for detected issues.
Which type of log is the system safety engineer using?
An engineer is working on a project to manufacture radar processing equipment for the U.S. military. As part of the project contract, all devices must be new. The engineer discovers that the manufacturer has a policy of using refurbished parts. The engineer speaks to their manager about it and is ignored.
What should this engineer do?
An organization decides to provide its employees with additional parental leave benefits that exceed legal requirements. Which concept is the organization acting on to support employees?
An organization creating a new consumer-profiling software tool has concerns about the software's ability to accurately capture and process data. The team decides to use an iterative approach to write the code, allowing for continuous testing and adjustment of requirements. The organization believes this will help ensure the software's data collection capabilities are both efficient and accurate.
Which methodology has the organization employed?
Which legislation provides a safe harbor for internet service providers (ISPs) whose customers violate intellectual property rights?
An internet company develops a search engine to index websites and documents published online. The index displays short excerpts from search results in response to queries. Many of the indexed sites and documents are copyrighted.
Which doctrine covers the company's employment and reproduction of these materials?
A consulting company employs H-1B workers. Even though companies applying for H*1B visas must offer a wage that is at least 95% of the average salary for the occupation, a close review of salarieswithin the consulting firm suggests that its H-1B workers are often paid 20% less on average than those with similar skill sets.
Which loophole is the company using to avoid paying H-1B workers a fair wage?
Employee A works as a developer for a software company. Their sibling is also a developer at a competitor company. Both companies are working on a similar application. The sibling's company struggles to get a feature to work, so the sibling copies the source code for the relevant sections of the application from Employee A's laptop after it was left unattended.
How should this behaviorbe classified?
An incident handler discovers an unauthorized change in the security key vault's database file, which caused a disclosure of confidential information. Which ethical issue does this incident pose?
A hacker attacked an organization's server to obtain the health records of a specific employee. The hacker posts the information online as an act of revenge. Which attack did the hacker perform?
Which technology has the National Security Agency (NSA) used to intercept and record telephone conversations in several non-U.S. countries?
During an investigation into a bank robbery, the Federal Bureau of Investigation (FBI) wants to monitor the telephone calls of identified suspects in the case for a two-week period. Due to the short time frame of the investigation, the FBI does not have time to pursue judicial authorization and get a warrant for surveillance.
Which type of telephone calls is legal for the FBI to monitor under the Foreign Intelligence Surveillance Act (FlSA). given the time frame of the investigation?
An IT company adopts a professional cod© of ethics suggested by a nationally recognized IT professionals organization. Which benefit to the company can be directly derived from adopting a professional code of ethics?
An underage actor is admitted to a local hospital. A nurse from another department wants to know what the patient's ailment is. The nurse accesses the patient's medical record and is subsequently flagged for unauthorized access.
Which law has the nurse violated?
A credit reporting agency collects personally identifiable information (Pll) from customers. The agency appoints a data protection officer (DPO), who is responsible for overseeing the agency's data protection strategy and enforcing data compliance requirements.
Which legislation should the DPO use as the basis for governing the collection and disclosure of Pll?
A company notices a drift in model performance due to suspicious alterations of the source data. It hires a specialist to test the security of its information systems and look for vulnerabilities attackers might have exploited.
Which name describes this specialist?
A robotics company engages an IT firm to deliver a marketing software solution. During the project, the robotics company asks for additional features that were not in the initial contract. The IT firm's project leader is unsure whether it can deliver these features but verbally agrees to the scope change. On delivery, the robotics company notes that several of the additional features are not included and that because of this, the solution is not compatible with certain legacy systems the company did not initially disclose.
Which factor might have mitigated the problem if the IT firm's project leader had abided by a professional code of ethics?