3 Months Free Update
3 Months Free Update
3 Months Free Update
An organization collects data in aggregate format about its employees to improve workflow. Managers at the organization must ensure that the data collected is for business purposes only. Which data collection method should the organization implement?
An incident handler discovers an unauthorized change in the security key vault's database file, which caused a disclosure of confidential information. Which ethical issue does this incident pose?
A software company continues to refine and update the predictive algorithm that makes its product the market leader. Although the company announces some changes, most are unannounced so that people and businesses remain unaware.
What is this company protecting?
To gain access to the electronic health record of a critically injured patient, an intensive care specialist decided to circumvent privacy policies to save the patient Which decision-ma king process guided the action of the specialist?
A consulting company employs H-1B workers. Even though companies applying for H*1B visas must offer a wage that is at least 95% of the average salary for the occupation, a close review of salarieswithin the consulting firm suggests that its H-1B workers are often paid 20% less on average than those with similar skill sets.
Which loophole is the company using to avoid paying H-1B workers a fair wage?
After Alliah Company and Quiet Flag Industries signed an exclusive data exchange deal, Alliah Company received a better offer from Endothon Company. Despite legal obligations. Alliah Company signs a deal with Endothon Company and immediately ceases activities with Quiet Flag Industries.
Which ethical issue is Alliah Company engaging in by signing the deal with Endothon Company and ceasing activities with Quiet Flag Industries?
Which piece of legislation outlines who may access a person's credit data?
A hacker attacked an organization's server to obtain the health records of a specific employee. The hacker posts the information online as an act of revenge. Which attack did the hacker perform?
How can organizations differentiate between ethical decision-making and legal decision-making frameworks?
A software development company's executive management team recently met to review its progress on ethical and social responsibility goals. After the review, the team planned a new set of goals for the upcoming year. The team shared the results of this review and the new goats with the employees and the board of directors.
Which process did the team complete?
A data scientist selects publicly available demographic data from a limited group of familiar zip codes when training an algorithm. What are two ethical concerns with this approach? Choose 2 answers.
An organization's security policy states that only authorized employees are granted access to the payroll database. During the onboarding process, two newly hired employees realize they have been erroneously granted access to the payroll database.
Which security practice has been violated?
A publicly-traded organization listed on the New York Stock Exchange has been flagged for possible accounting malpractices. An auditor discovers that the company used funds to disguise payments to international officials. The auditor also finds that the system of internal control does not adequately maintain books and records that reflect all business transactions.
Which law did the organization potentially violate?