2023-11-24T10:03:47+03:00[Europe/Moscow] en true Ethics, Morals, Law, Corporate Social Responsibility (CSR), Code of ethics, Certification, Security Policy, Software Alliance (BSA), Trade Secret, <p>Whistle-blowing</p>, Fraud, Misrepresentation, Breach of Contract, Internal Control, Professional Code of Ethics, Bribery, Policies, Communication Privacy, Data breach, Ransomware, IT Professional Malpractice, Virus, Worm, Trojan Horse, Email Spam, Identity theft, Exploit, Computer Forensics, Information privacy, Republic Act No. 10175, Republic Act No. 10173 or Data Privacy Act of 2012, Family Educational Rights and Privacy Act, Financial Data, Health Information, Access to Government Records, Fair Information Practices, <p>Ethics</p> flashcards
DCIT65

DCIT65

  • Ethics

    deals with placing a “value” on acts according to whether they are “good” or “bad”.

  • Morals
    are the personal principles upon which an individual bases his or her decisions about what is right and what is wrong.
  • Law
    is a system of rules that tells us what we can and cannot do. Laws are enforced by a set of institutions (the police, courts, law-making bodies).
  • Corporate Social Responsibility (CSR)
    is the concept that an organization should act ethically by taking responsibility for the impact of its actions on its shareholders, consumers, employees, community, environment, and suppliers.
  • Code of ethics
    is a statement that highlights an organization’s key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making.
  • Certification
    indicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of the certifying organization.
  • Security Policy
    defines an organization’s security requirements, as well as the controls and sanctions needed to meet those requirements.
  • Software Alliance (BSA)
    are trade groups that represent the world’s largest software and hardware manufacturers.
  • Trade Secret
    is information, generally unknown to the public, that a company has taken strong measures to keep confidential.
  • Whistle-blowing

    is an effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest.

  • Fraud
    is the crime of obtaining goods, services, or property through deception or trickery.
  • Misrepresentation
    is the misstatement or incomplete statement of a material fact.
  • Breach of Contract
    occurs when one party fails to meet the terms of a contract.
  • Internal Control
    is the process established by an organization’s board of directors, managers, and IT systems people to provide reasonable assurance for the effectiveness and efficiency of operations, the reliability of financial reporting, and compliance with applicable laws and regulations.
  • Professional Code of Ethics
    states the principles and core values that are essential to the work of a particular occupational group.
  • Bribery
    is the act of providing money, property, or favors to someone in business or government to obtain a business advantage.
  • Policies
    are the guidelines, standards, and laws by which the organization must abide.
  • Communication Privacy
    is the ability to communicate with others without those communications being monitored by other people or organizations.
  • Data breach
    is the unintended release of sensitive data or the access of sensitive data.
  • Ransomware
    is malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.
  • IT Professional Malpractice
    Negligence has been defined as not doing something that a reasonable person would do, or doing something that a reasonable person would not do.
  • Virus
    is a piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manner.
  • Worm
    is a harmful program that resides in the active memory of the computer and duplicates itself.
  • Trojan Horse
    is a seemingly harmless program in which malicious code is hidden. A victim on the receiving end of a Trojan horse is usually tricked into opening it because it appears to be useful software from a legitimate source, such as an update for software the user currently has installed on his or her computer.
  • Email Spam
    is the use of email systems to send unsolicited email to large numbers of people.
  • Identity theft
    stealing of personal information, which is then used without the owner’s permission.
  • Exploit
    is an attack on an information system that takes advantage of a particular system vulnerability. Often this attack is due to poor system design or implementation.
  • Computer Forensics
    Branch of science that deals with computer crime investigations.
  • Information privacy
    is the combination of communications privacy (the ability to communicate with others without those communications being monitored by other persons or organizations) and data privacy (the ability to limit access to one’s personal data by other individuals and organizations in order to exercise a substantial degree of control over that data and its use).
  • Republic Act No. 10175
    Cybercrime Prevention Act of 2012 (CPA) which is the comprehensive legislation on cybercrimes. Notably, it defined "cybersecurity" as the "application of security measures to ensure confidentiality, integrity, and availability of data.
  • Republic Act No. 10173 or Data Privacy Act of 2012
    An act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a national privacy commission, and for other purposes.
  • Family Educational Rights and Privacy Act
    federal law that assigns certain rights to parents regarding their children’s educational records.
  • Financial Data
    Individuals must reveal much of their personal financial data in order to take advantage of the wide range of financial products and services available, including credit cards, checking and savings accounts, loans, payroll direct deposit, and brokerage accounts.
  • Health Information
    Individuals are rightly concerned about the erosion of privacy of data concerning their health.
  • Access to Government Records
    The government has a great capacity to store data about each and every one of us and about the proceedings of its various organizations.
  • Fair Information Practices
    Overall goal of these guidelines is to stop the unlawful storage of personal data, eliminate the storage of inaccurate personal data, and prevent the abuse or unauthorized disclosure of such data.
  • Ethics

    It is the code of behavior that is defined by the group to which an individual belongs.