ITS 321 - Legal and Ethical Issues in Information Technology

Review for First Test

The following questions are provided to help you study for the first test. Do not expect to see these exact questions on the test.

  1. You should know the distinctions between key words in the chapter. Explain the meanings of:

  2. What are vices and virtues? Come up with two situations in which the same quality is a virtue in one, but a vice in the other.

  3. Discuss the concept of respondeat superior, in terms of a rogue employee and in terms of an employee who is "only following orders".

  4. The text lists five reasons for a company to have a code of ethics. Explain two of these reasons using a company you have worked for or want to work for as an example.

  5. What is the main requirement established in section 404 of the Sarbanes-Oxley Act of 2002? What are the two main requirements of section 406 of the same act?

  6. What circumstances would make it useful for a company to release its annual social audit to the public?

  7. How does establishing ethics training give a company a form of plausible deniability?

  8. Discuss the differences between the four kinds of ethics listed in chapter 1.

  9. Why are IT staff not considered professionals under the legal definition? What advantage does that give them?

  10. How might an employee act unethically with regard to their employer in a way that involves software?

  11. Why might a company choose to keep something as a trade secret instead of copyrighting it?

  12. Is a whistle blower acting in an ethical or unethical way? How can you tell?

  13. What are the requirements listed in the text for an act to be considered as fraud? What is the fifth requirement not listed in the text?

  14. What would be the difference between a breach of contract and a material breach of contract, with regard to legal remedies that might be sought?

  15. What is a general definition of a bribe? Under what circumstances is a bribe "legal"?

  16. What is résumé inflation, explained in simpler terms?

  17. Name some examples of industry associations that offer certifications for IT workers.

  18. Explain the meaning of negligence, as it relates to an IT activity.

  19. Explain the difference between the reasonable person standard and the reasonable professional standard.

  20. You should be familiar with the terms asset, threat, exploit, and vulnerability with regard to computer security.

  21. What is a zero day attack?

  22. Why are employees possible security threats? Explain three ways they could be.

  23. What is the difference between a cybercriminal and a cyberterrorist?

  24. What makes an email spam?

  25. Viruses and worms both infect systems. What is an operational difference between them?

  26. Why can a rootkit virus be called a privilege elevator?

  27. What is a denial of service attack?

    Why would a botnet be useful for this kind of attack?

  28. What is the purpose of a firewall?

  29. What are three elements that appear in the manager's checklist on page 115 that contribute to the value of a security policy?

  30. Which ammendment to the US Constitution provides protection from unreasonable search and seizure?
    What must a warrant state regarding searching and seizing?

  31. What would be an example of an aspect of employment where the employee should have no expectation of privacy?

  32. Which law, listed in the text, restricts collection and use of credit information by credit agencies?

  33. Which law, listed in the text, allowed the same agencies to offer banking, investments, and insurance services?

  34. Which law, listed in the text, established a format for sharing health information but restricted who it may be shared with?

  35. Which law, listed in the text, made it a crime to collect personal information from pre-teens without parental consent?

  36. What did the Patriot act allow the FBI to do without a court order? What must they use instead?

  37. Discuss some of the suggestions that the text makes about protecting yourself from identity theft. Are any of them practical?

  38. How do browser cookies relate to consumer profiling?

  39. Name a recent or famous case of a company whose customer data files were breached by an attacker. What should the customers have done previously to be better protected, and what should they have done when told about the breach?