Module 2: Ethics for IT Workers and IT Users Flashcards
A document that stipulates restrictions and practices that a user must agree in order to use organizational computing and network resources.
acceptable use policy (AUP)
A group that provides assistance to the board of directors in fulfilling its responsibilities with respect to the oversight of the quality and integrity of the organization’s accounting and reporting practices and controls, including financial statements and reports; the organization’s compliance with legal and regulatory requirements; the qualifications, independence, and performance of the company’s independent auditor; and the performance of the company’s internal audit team.
audit committee
An agreed-upon sets of skills and abilities that all licensed professionals must possess.
body of knowledge
The failure of one party to meet the terms of a contract.
breach of contract
The failure to act as a reasonable person would act.
breach of the duty of care
The act of providing money, property, or favors to someone in business or government in order to obtain a business advantage.
bribery
A trade group that represents the world’s largest software and hardware manufacturers.
BSA | The Software Alliance
Indicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of the certifying organization. Certification can also apply to products (e.g., the Wi-Fi CERTIFIED logo assures that the product has met rigorous interoperability testing to ensure that it will work with other Wi-Fi-certified products) and is generally voluntary.
certification
To be in accordance with established policies, guidelines, specifications, or legislation.
compliance
A conflict between a person’s (or firm’s) self-interest and the interests of a client.
conflict of interest
The obligation to protect people against any unreasonable harm or risk.
duty of care
Hardware or software (or a combination of both) that serves as the first line of defense between an organization’s network and the Internet; a firewall also limits access to the company’s network based on the organization’s Internet-usage policy.
firewall
An act that makes it a crime to bribe a foreign official, a foreign political party official, or a candidate for foreign political office.
Foreign Corrupt Practices Act (FCPA)
The crime of obtaining goods, services, or property through deception or trickery.
fraud
A government-issued permission to engage in an activity or to operate a business.
government license
A group within an organization managing the processes, tools, and policies necessary to prevent, detect, document, and counter threats to digital and nondigital information, whether it is in transit, being processed, or at rest in storage.
information security (infosec) group
The process established by an organization’s board of directors, managers, and IT systems people to provide reasonable assurance for the effectiveness and efficiency of operations, the reliability of financial reporting, and compliance with applicable laws and regulations.
internal control
A person who uses a hardware or software product; the term distinguishes end users from the IT workers who develop, install, service, and support the product. IT users need the product to deliver organizational benefits or to increase their productivity.
IT user
The failure of one party to perform certain expressed or implied obligations, which impairs or destroys the essence of the contract.
material breach of contract