FINAL TEST EXAM Flashcards
SKILL
t a crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office. The act applies to any U.S. citizen or company and to any company with shares listed on any U.S. stock exchange.
FORIEGN CORRUPTION PRACTICE ACT
TWO REASONS FOR VENDOR CERTIFICATION
SALARY
INCREASED HIRING DEMAND
people are often aggressive in striving for what they want and are used to having privileged access to information, people, and other resources. Furthermore, their success often inflates their belief that they have the ability and the right to manipulate the outcome of any situation
CORRUPTION
people in power, which is often facilitated by a tendency for people to look the other way when their leaders act inappropriately has been given the name
Bathsheba syndrome
The process of sharing patient-level electronic health information between different organizations.
HIE - HEALTH INFORMATION EXCHANGE
THE CIA INTEGRITY ENSURES THAT DATA WILL BE?
CONSISTENT AND TRUSTWORTHYNESS OF DATA GUARTEED
ACCURATE
ELIMINATION OF BIAS IN PLATFORM
PREPROCESSIN
NAME SOME POTENTIAL RISK OF USING H-1B EMPLOYEES
LACK OF EMPLOYEE LOYALTY
LOSS OF EXPERTISE
ENSURES DATA CAN BE ASSESSED WHEN AND WHERE NEEDED
AVAILABILITY
HOW TO SECURE EMPLOYEE DATA MISUSE
LIMIT WHO CAN VIEW EMPLOYEE DATA
HOW TO AVOID BIASS TESTING
EQUAL REPRESENTATION
malware that stops you from using your computer or accessing your data until you meet certain demands
RANSOMEWEAR
The key to prevention of a computer security incident is to implement a ? security solution to make computer break-ins so difficult that an attacker eventually gives up or is detected before much harm is inflicted. In THIS solution, if an attacker breaks through one AREA of security, another LEVEL must then be overcome.
LAYERED SOLUTION
After the solution to the problem has been implemented, monitor the results to see if the desired effect was achieved and observe its impact on the organization and the various stakeholders. Were the success criteria fully met? Were there any unintended consequences?
EVALUATION BENCHMARK
habit that inclines people to do what is acceptable CHOICE BETWEEN GOOD AND BAD TYPE OF FRAMEWORK
VIRTUE
a theory that says whether something is good or bad depends on its outcomes. An action that brings about more benefit than harm is good, while an action that causes more harm than benefit is not.
CONSEQUENTIALISM
The personal principles upon which an individual bases his or her decisions about what is right and what is wrong.
MORALS
a code of behavior that is defined by the group to which an individual belongs.
ETHICS
BYOD - BRING YOUR OWN DEVICE ISSUES
NO AUTHENTICATION
NON WORK RELATED INFO
MALEWARE
business policy that permits, and in some cases encourages, employees to use their own mobile devices (smartphones, tablets, or laptops) to access company computing resources and applications, including email, corporate databases, the corporate intranet, and the Internet.
BYOD - BRING YOUR OWN DEVICE
acts are acts that conform to the law.
A system of rules that tells us what we can and cannot do.
LEGAL
bring about the most happiness for the greatest number of people.
UTILITARANISM
A lawsuit filed by corporations, government officials, and others against citizens and community groups who oppose them on matters of concern. The lawsuit is typically without merit and is used to intimidate critics out of fear of the cost and effort associated with a major legal battle.
SLAPP -STRATIGIC LAWSUIT AGAINST PUBLIC PARTICIPATION
Also known as the Lincoln Law, was enacted during the U.S. Civil War to combat fraud by companies that sold supplies to the Union Army. War profiteers sometimes shipped boxes of sawdust instead of guns, for instance, and some swindled the Union Army into purchasing the same cavalry horses several times. When it was enacted, the act’s goal was to entice whistle-blowers to come forward by offering them a share of the money recovered.
FALSE CLAIMS ACT
, also known as the Wiretap Act, regulates the interception of wire (telephone) and oral communications. It allows state and federal law enforcement officials to use wiretapping and electronic eavesdropping, but only under strict limitations. Under this act, a warrant must be obtained from a judge to conduct a wiretap.
TITLE III - OMNIBUS CRIME CONTROL AND SAFE STREETS ACT
An individual has the right to elect not to have his or her personal data collected. ONE OF THE ELEMENTS UNDER THE EUROPEAN UNION DATA PROTECTION DIRECTIVE
CHOICE
Aimed at protecting children from pornography. imposed $250,000 fines and prison terms of up to two years for the transmission of “indecent” material over the Internet.
CDA - COMMUNICATION DECENCY ACT
concept that an organization should act ethically by taking responsibility for the impact of its actions on its shareholders, consumers, employees, community, environment, and suppliers
CSR - CORPORATE SOCIAL RESPONSIBILITY
The reduction in either the likelihood or the impact of the occurrence of a risk.
MITIGATION
officially known as Regulation EU 2016/679) is designed to strengthen data protection for individuals within the EU by addressing the export of personal data outside the EU, enabling citizens to see and correct their personal data, and ensure data protection consistency across the EU. Organizations anywhere in the world that collect, store, or transfer personal data of EU citizens must work to ensure that their systems and procedures are compliant with this strict new framework
GDPR - GENERAL DATA PROTECTION REGULATION
A type of lawsuit that organizations may file in order to gain subpoena power in an effort to learn the identity of anonymous Internet users who they believe have caused some form of harm to the organization through their postings.
JOHN DOE LAW
(1)
subscribing to a professional code of ethics,
(2)
joining and participating in professional organizations,
(3)
obtaining appropriate certifications, and
(4)
supporting government licensing where available.
PROFESSIONAL PRACTICES FOR ENGINEERS