Lesson 3 Flashcards

1
Q

A rule; mandates certain behavior; dictates permissible or forbidden conduct; carry sanctions.

A

Laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define socially acceptable behavior ans do not carry sanctions.

A

Ethics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The fixed moral attitudes of a group.

A

Cultural Mores

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The legal obligation of an entity.

A

Liability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Compensating for wrongs done by an employee or an organization.

A

Restitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Insures that the employees know what constitutes acceptable behavior.

A

Due Care

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Body of expectations; functions as laws within an organization; ignorance of a policy is an acceptable defense.

A

Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the criteria for policy enforcement? (5)

A

Dissemination (Distribution)
Review (Reading)
Comprehension (Understanding)
Compliance (Agreement)
Uniform Enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of law that governs nation or state; manages conflicts between people.

A

Civil Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A type of law that involves violations that are harmful to society.

A

Criminal Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of law that regulates relationship between individuals and organizations.

A

Private Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of law that regulates the structure of government agencies.

A

Public Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the four (4) common types of laws?

A

Civil
Criminal
Private
Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A cybersecurity law that penalizes cybercrimes. (e.g. hacking, identity theft, online fraud)

A

RA 10175 | Cybercrime Prevention Act of 2012

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Established the DICT, tasked with developing policies, plans, and programs for the ICT sector in the Philippines.

A

RA 10844 | Department of Information and Communications Technology Act of 2015

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A strategic framework developed to strengthen the Philippine’s cybersecurity posture.

A

National Cybersecurity Plan (NCSP)

17
Q

A republic act that governs intellectual property rights. (e.g. patents, copyrights, trademarks, trade secrets)

A

RA 8293 | The Intellectual Property Code of the Philippines

18
Q

A cybersecurity law that regulates the processing of personal data in the Philippines.

A

RA 10173 | Data Privacy Act of 2012

19
Q

The state of being free from unsanctioned intrusion.

A

Privacy

20
Q

What do you do when suspected of identity theft? (10)

A

Report to Authorities
Notify Financial Institutions
Check Credit Report
Place Fraud Alert
Update Security
Monitor Accounts
Seek Legal Help
Document Everything
Educate Yourself
Follow Up

21
Q

An executive order that promotes transparency; grants people access to information held by government agencies.

A

Executive Order No. 2, S. 2016 | Freedom of Information (FOI) Law

22
Q

Establishes an int’l task force overseeing internet security functions; attempts to improve int’l investigation; lacks realistic provisions.

A

European Council Cyber-Crime Prevention Convention

23
Q

Made by the World Trade Organization (WTO), the first significant international effort to protect intellectual property rights.

A

Agreement on Trade-Related Aspects of Intellectual Property Rights

24
Q

A U.S. contribution to reduce impact of copyright infringement, trademarks, etc.

A

Digital Millennium Copyright Act (DMCA)

25
Q

What are the Ten (10) Commandments of Computer Ethics?

A

Thou shalt not use a computer to harm other people.
Thou shalt not interfere with other people’s computer work.
Thou shalt not snoop around in other people’s computer files.
Thou shalt not use a computer to steal.
Thou shalt not use a computer to bear false witness.
Thou shalt not copy or use proprietary software for which you have not paid.
Thou shalt not use other people’s computer resources without authorization/proper compensation.
Thou shalt not appropriate other people‘s intellectual output.
Thou shalt think about the social consequences of the program you are writing or the system you are designing.
Thou shalt always use a computer in ways that insure consideration and respect for your fellow humans.

26
Q

Create difficulty in determining ethical behavior.

A

Cultural Differences

27
Q

How are scenarios in Ethical Differences Across Cultures grouped? (3)

A

Software License Infringement
Illicit Use
Misuse of Corporate Resources

28
Q

The overriding factor in leveling ethical perceptions within a small population is…

A

Education

29
Q

What are the general causes of unethical & illegal behavior? (3)

A

Ignorance
Accident
Intent

30
Q

The best method for preventing an illegal or unethical activity. (e.g. laws, rules, etc.)

A

Deterrence

31
Q

Laws and policies can only deter if these conditions are satisfied: (3)

A

Fear of Penalty
Probability of Being Caught
Probability of Penalty Being Administered

32
Q

Leads ICT development at national level.

A

Department of Information & Communications Technology (DICT)

33
Q

Leads ICT development at national level.

A

Department of Information & Communications Technology (DICT)

34
Q

Ensures protection of data and enforces the Data Privacy Act of 2012.

A

National Privacy Commission

35
Q

In-charge of the regulation of telecommunications and broadcasting industries.

A

National Telecommunications Commission

36
Q

Private-sector-led; collaborates with the gov’t to promote ICT development and the local IT-BPM industry.

A

National ICT Confederation of the Philippines

37
Q

Coordinates law enforcement efforts to combat cybercrime.

A

Cybercrime Investigation & Coordination Center

38
Q

A national cybersecurity organization that coordinates responses to cyber incidents.

A

Philippine Computer Emergency Response Team (PH-CERT)