Pre-Assessment Flashcards
What is Fraud?
Fraud in business ethics refers to deceptive or dishonest practices carried out within a business or organizational setting for personal or financial gain. It involves intentionally misrepresenting information, manipulating records, or engaging in fraudulent activities with the intention to deceive stakeholders, such as customers, investors, employees, or business partners.
What is cyberloafing?
Cyberloafing refers to the act of employees using their work computers or internet access for personal activities during work hours. It involves engaging in non-work-related online activities, such as browsing social media, shopping, watching videos, playing games, or chatting with friends, instead of focusing on their assigned tasks.
What is industrial espionage?
Industrial espionage, also known as corporate espionage or economic espionage, refers to the clandestine practice of gathering confidential or proprietary information from a competitor or rival company for the purpose of gaining a competitive advantage. It involves the unauthorized acquisition or theft of trade secrets, intellectual property, research and development data, customer lists, pricing information, marketing strategies, or any other sensitive information related to a company’s operations or competitive edge.
What is bribery?
Bribery refers to the act of offering, giving, receiving, or soliciting something of value, such as money, gifts, favors, or benefits, with the intention of influencing the actions or decisions of an individual in a position of power or authority. It is a form of corruption that undermines fair and transparent practices, distorts decision-making processes, and creates an unfair advantage for those involved.
Is it legal for a person to break a traffic law in order to get a critically injured man to a hospital?
In many jurisdictions, there are legal provisions that allow for emergency exceptions or defenses when it comes to traffic laws. However, it is defined as “illegal” at the outset.
Why is it important for leaders to understand how technology affects their organization’s daily practices?
To understand possible legal ramifications. Technology is evolving rapidly, and its integration into business operations can have significant legal consequences.
From an employer’s POV, all policies are implicitly
ethical and legal.
In a system attack, data is released
A) Intended by unauthorized user
B) Ethically
C) In an unintended manner
D) Intended by authorized user
A) Intended by unauthorized user
A employee sharing personal customer information with 3rd parties is
A) Unintended release of sensitive data by unauthorized user
B) Intended release of sensitive data by authorized user
B) Intended release of sensitive data by authorized user
IT worker crashes in a company vehicle, who is responsible for damages?
A) The company owns the vehicle and is, thus, liable for negligence.
B) IT workers who breach the duty of care are accountable for injuries.
B) IT workers who breach the duty of care are accountable for injuries.
In the context of IT personnel working on a research project involving data mining and algorithmic decision-making, it is essential for them to possess the necessary knowledge, skills, and expertise related to data management, data privacy, security, and the ethical considerations involved in handling sensitive information.
Which practice standard is described?
The reasonable professional standard relates to the performance and conduct of professionals in their respective fields, while the reasonable assurance standard pertains specifically to auditing and assurance engagements, emphasizing the level of confidence that auditors can provide in the information being reviewed.
It is a United States federal law that was enacted in 1986, primarily aimed at addressing computer-related crimes and unauthorized access to computer systems. It provides a legal framework to prosecute individuals who engage in activities that involve unauthorized access, computer fraud, and abuse.
The Computer Fraud and Abuse Act (CFAA)
Codified under 18 U.S.C. Section 1029, primarily focuses on criminalizing actions related to unauthorized access or use of access devices, which typically include credit cards, debit cards, ATM cards, and other similar payment cards or electronic access devices.
The Access Device Fraud statute
It is a federal law in the United States that was enacted as part of the Electronic Communications Privacy Act of 1986 (ECPA). It regulates the government’s access to and disclosure of electronic communications and certain related records held by third-party service providers.
The Stored Communications Act (SCA)
Federal law enacted in the United States in response to the September 11, 2001 terrorist attacks, signed into law on October 26, 2001, by President George W. Bush.
The USA PATRIOT Act, short for the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act, enhances the ability of law enforcement and intelligence agencies to prevent and investigate acts of terrorism. The act expanded the surveillance powers of the government and provided authorities with new tools to gather intelligence and combat terrorism.
Specifically represents companies primarily engaged in providing computer programming services, including writing, modifying, testing, and supporting software applications.
Standard Industrial Classification code for Computer Programming Services.
SIC 7371
Corresponds to the North American Industry Classification System code for Custom Computer Programming Services. It is a newer classification system that replaced SIC codes in the United States, Canada, and Mexico. It is similar to SIC 7371, as it encompasses companies primarily engaged in custom computer programming activities, including the design, development, and modification of software applications to meet specific client needs.
NAICS 541511
Protects original works of authorship, such as literary, artistic, and musical creations, from being copied, distributed, displayed, or performed without the owner’s permission.
A) Copyright
B) Patent
C) Trade secret
D) Trademark
A) Copyright
Protects new inventions, processes, methods, or useful and non-obvious improvements to existing inventions. They provide exclusive rights to the inventor to prevent others from making, using, selling, or importing the invention at play.
A) Copyright
B) Patent
C) Trade secret
D) Trademark
B) Patent
Protects valuable and confidential business information that provides a competitive advantage. This can include formulas, processes, techniques, customer lists, marketing strategies, or other confidential information.
A) Copyright
B) Patent
C) Trade secret
D) Trademark
C) Trade secret
Protects brands, logos, names, slogans, or symbols that distinguish goods or services from those of others in the marketplace. They help consumers identify and associate products or services with a specific source.
A) Copyright
B) Patent
C) Trade secret
D) Trademark
D) Trademark
It involves legally obtaining information through various methods such as market research, data analysis, and monitoring competitor activities.
A) Competitive intelligence
B) Reverse engineering
C) Plagiarism
D) Infringement
A) Competitive intelligence
It involves analyzing and dissecting a product or technology to understand its design, functionality, and underlying processes. It typically involves deconstructing and studying a competitor’s product to gain knowledge about its technical specifications, construction, or algorithms.
A) Competitive intelligence
B) Reverse engineering
C) Plagiarism
D) Infringement
B) Reverse engineering
It refers to the act of presenting someone else’s work, ideas, or content as one’s own without proper attribution or permission.
A) Competitive intelligence
B) Reverse engineering
C) Plagiarism
D) Infringement
C) Plagiarism
It typically refers to the unauthorized or illegal use, reproduction, distribution, or exploitation of someone else’s intellectual property rights or trade secrets. It involves violating the exclusive rights granted to the intellectual property owner and can result in legal consequences and liabilities.
A) Competitive intelligence
B) Reverse engineering
C) Plagiarism
D) Infringement
D) Infringement
What does PAPA stand for?
Privacy, Accuracy, Property, and Access
It is a nonprofit organization dedicated to improving patient safety and promoting a culture of safety in healthcare. They offer educational resources, training programs, and initiatives to enhance patient safety and support caregivers.
National Patient Safety Foundation (NPSF)
It is a federal agency within the U.S. Department of Health and Human Services that administers the Medicare and Medicaid programs.
Centers for Medicare & Medicaid Services (CMS)
It is a federal agency responsible for protecting public health by ensuring the safety, efficacy, and security of drugs, medical devices, food, and other products.
Food and Drug Administration (FDA)
It is a professional organization representing pharmacists who practice in hospitals, health systems, and other healthcare settings.
Association Society of Health‐System Pharmacists (ASHP)
It is a set of guidelines and rules established by an organization to define acceptable and appropriate use of its computer systems, network, and resources.
An Acceptable Use Policy (AUP)
It is a U.S. federal law enacted in 1999 that governs the privacy and security of consumers’ personal financial information. It applies to financial institutions, including banks, credit unions, and insurance companies, and requires them to implement safeguards to protect the privacy and security of customer information.
The Gramm-Leach-Bliley Act (GLBA)
It refers to various laws and regulations that aim to ensure fair and non-discriminatory practices in the banking industry.
The Fair Banking Act
It is a set of rules and guidelines that govern the access and usage of computer systems and networks within an organization.
A System Access Policy outlines procedures and controls for granting, managing, and revoking user access privileges to systems, applications, and data.
Utilizing ideas generated through team collaboration without the explicit consent of all involved parties can constitute an act of
Piracy
The ownership and usage rights of ideas generated through team collaboration can vary depending on various factors such as the nature of the collaboration, any applicable agreements or contracts, and the legal framework in place.
Misrepresentation, in the context of impersonation, refers to the act of
intentionally presenting oneself as someone else or assuming another person’s identity in order to deceive or mislead others. It involves deliberately creating a false impression about one’s identity, qualifications, or intentions.