View all detail and faqs for the Ethics-In-Technology exam
Which action can IT leaders take to encourage ethical behavior in their organizational culture?
A publicly-traded organization listed on the New York Stock Exchange has been flagged for possible accounting malpractices. An auditor discovers that the company used funds to disguise payments to international officials. The auditor also finds that the system of internal control does not adequately maintain books and records that reflect all business transactions.
Which law did the organization potentially violate?
An organization creating a new consumer-profiling software tool has concerns about the software's ability to accurately capture and process data. The team decides to use an iterative approach to write the code, allowing for continuous testing and adjustment of requirements. The organization believes this will help ensure the software's data collection capabilities are both efficient and accurate.
Which methodology has the organization employed?
An organization's security policy states that only authorized employees are granted access to the payroll database. During the onboarding process, two newly hired employees realize they have been erroneously granted access to the payroll database.
Which security practice has been violated?
A team of game designers must decide if players whose game characters commit violent and unlawful acts should be rewarded. The team agrees that the acts are simul-ations, and the game will be rated for adult or mature audiences. One designer raises questions about how contributing to this work will reflect upon the team's moral character.
Which ethical theory does this represent?
An underage actor is admitted to a local hospital. A nurse from another department wants to know what the patient's ailment is. The nurse accesses the patient's medical record and is subsequently flagged for unauthorized access.
Which law has the nurse violated?
Which organization licenses software developers who implement safety and health software in the United States?
Which technology has the National Security Agency (NSA) used to intercept and record telephone conversations in several non-U.S. countries?
Which act prohibits U.S. government agencies from concealing the existence of personal data record-keeping systems?
A new IT employee has questions about how the organization determines resolutions to issues that impact its values and overarching principles. What should the employee refer to first for guidance?