An underage actor is admitted to a local hospital. A nurse from another department wants to know what the patient's ailment is. The nurse accesses the patient's medical record and is subsequently flagged for unauthorized access.
Which law has the nurse violated?
An organization is concerned about its cybersecurity after identifying unauthorized records in its payroll database. The organization hires a consultant to test its cyberdefenses. The consultant executes several test attacks on the organization's software and successfully demonstrates that by using Structured Query Language (SOL) injection, the consultant can add rows to the payroll database without obtaining the proper permissions.
Which hacker classification does the consultant fall under?
A data scientist selects publicly available demographic data from a limited group of familiar zip codes when training an algorithm. What are two ethical concerns with this approach? Choose 2 answers.
A company wants to improve its chances of winning business with a prospective client. The company sends an expensive watch to the home address of each of the client's directors. Which ethical issue is the company engaging in?
A team of game designers must decide if players whose game characters commit violent and unlawful acts should be rewarded. The team agrees that the acts are simul-ations, and the game will be rated for adult or mature audiences. One designer raises questions about how contributing to this work will reflect upon the team's moral character.
Which ethical theory does this represent?
A factory manager must decide whether to replace assembly-line workers with robots but is concerned about employees losing their jobs. The factory manager also believes this automation would enhance worker safety, save the factory money, raise corporate profits, and lower the prices of goods produced. The factory manager weighs all possible outcomes and chooses the action that produces the greatest good.
Which ethical theory does this approach represent?
A tech worker's computer acts abnormally shortly after the worker starts their shift. The computer is up-to-date on all relevant patches and updates. The installed antivirus software has not identified any malicious code. During the investigation, the worker discovers that an attacker compromised the system, even though the worker did not engage in any behavior that could have introduced a virus or other external malicious software into the computer.
Which method of attack was used to compromise the worker's machine?
An organization gathers data using various technologies to optimize sales processes for its current and prospective customers. The data consists of demographic, geographic, and behavioral customer changes.
Which data collection method is the organization using?
Which principle, according to the Organisation for Economic Co-operation and Development's (OECD) privacy guidelines, states that people have the right to review their data, challenge its correctness, and have incorrect data changed?
An internet company develops a search engine to index websites and documents published online. The index displays short excerpts from search results in response to queries. Many of the indexed sites and documents are copyrighted.
Which doctrine covers the company's employment and reproduction of these materials?