Professional Documents
Culture Documents
IT0025 - M1 - Social and Professional Issues
IT0025 - M1 - Social and Professional Issues
IT0025 - M1 - Social and Professional Issues
Misrepresentation
is the misstatement or incomplete statement of a
material fact.
the other party to enter into a contract, that party may
have the legal right to cancel the contract or seek
reimbursement for damages.
Breach of Contract
one party fails to meet the terms of a contract
1
IT0025 - M1 - Social and Professional Issues
Distinguishing between bribes and gifts Here are the skills that employers mostly seek in new hires, ranked
in terms of priority.
Bribes Gifts Oral communication
Are made in secret, as they are Are made openly and publicly, Listening
neither legally nor morally as a gesture of friendship or Written communication
acceptable goodwill Public speaking
Are often made indirectly Are made directly from donor Adaptability
through a third party to recipient
Encourage an obligation for Come with no expectation of a How do you improve communication?
the recipient to act favorably future favor for the donor Start using the right tools for your business
toward the donor Encourage two-way communication
Tell people what they are doing right
Relationships Between IT Workers and Other Professionals Specific and descriptive feedback
Professionals owe each other adherence to profession’s Schedule a compulsory check-in
code of conduct.
Ethical problems between members of the IT profession
o resume inflation - Communication can be formal, informal, internal or external. And
o Inappropriate sharing of corporate information within an organization, it is important to develop a healthy and
beneficial communication process.
Relationships Between IT Professionals and IT Users
IT user refers to a person who uses a hardware or - Effective Communication is the key to achieving long-term
software product; the IT workers who develop, install, success, so make sure you follow the above outline strategies.
service, and support the product.
How to develop your Professional Communication Skills?
IT professionals’ duty Ask for feedback: If you carry out a presentation, ask
Understand users’ needs and capabilities yourself how you think you could improve next time.
Deliver products and services that best meet those needs Learn from others: If you look up to someone who has
Establish an environment that supports ethical behavior good communication skills, watch what they do and learn
by users from them.
Try active listening: A good communicator listens.
Relationships Between IT Workers and Society Enroll in a course: To really become a better
Society expects members of a profession to provide communicator, you should consider enrolling in a course
significant benefits and to not cause harm through their that can refresh your skills and develop new ones.
actions.
The actions of an IT worker can affect society. Encouraging the Professionalism of IT Workers
- IT workers of all types can improve their profession’s reputation
Effective Professional Communication for professionalism by
Communication is one of the major concerns in the 1. subscribing to a professional code of ethics;
workplace. 2. joining and participating in professional organizations;
According to the statistics, 57% of employees report not 3. obtaining appropriate certifications, and;
being given clear directions and 69% of managers are not 4. supporting government licensing where available
comfortable communicating with the employees in
general. Professional Codes of Ethics
From the statistics, it is clear that there is a need to A professional code of ethics states the principles and core
improve communication in the workplace. values that are essential to the work of a particular
Communication in the workplace is one of the signs of a occupational group.
high-performance culture. Codes of ethics created by professional organizations
Exchanging information and ideas within an organization have two main parts:
is called workplace communication. o The first outlines what the organization aspires
However, effective communication occurs when a to become.
message is sent and received accurately. o Lists rules and principles by which members of
the organization are expected to abide.
Why is communication so important in the workplace? Benefits for individual, profession, and society
It avoids confusion Improves ethical decision making
It provides purpose Promotes high standards of practice and ethical behavior
It builds a positive company culture Enhances trust and respect from the general public
It creates accountability Provides an evaluation benchmark
2
IT0025 - M1 - Social and Professional Issues
Professional Organizations CompTIA A+ Performing computer and
No universal code of ethics for IT professionals. network maintenance,
No single, formal organization of IT professionals has troubleshooting, and
emerged as preeminent. installation including
addressing security issues
IT Professional Organizations Project Management Leading and directing projects
Institute’s Project
Organization URL for code of ethics Management Professional
Association for www.acm.org/about/code-of-ethics (PMP)
Computing Machinery
Institute of Electrical Seeri.etsu.edu/Codes/TheSECode.ht Common Industry Certifications
and Electronics m
Engineers Computer Category Certification Certifying
Society (IEEE-CS) organization
Association of www.aitp.org/?page=Ethics Security CompTIA Security+ Computer
Information Technology
Technology Industry
Professionals (AITP) Association
SysAdmin, Audit, www.sans.org/security- Security Certified Security International
Network, Security resources/ethics.php Analyst Council of E-
(SANS) Institute commerce
Consultants (EC)
Certification Forensics Certified The International
Indicates a professional possesses a particular set of Computer Society of Forensic
skills, knowledge, or abilities in the opinion of a certifying Examiner Computer
organization. Examiners
Can also apply to products. Governance Certified in the ISAGA
On the other hand, because certification is no substitute Governance of
for experience and doesn’t guarantee that a person will Enterprise IT
perform well on the job. Project Project Project
IT employees are motivated to learn new skills, and management Management Management
certification provides a structured way of doing so. Professional Institute
3
IT0025 - M1 - Social and Professional Issues
ST2 - IT Professional Malpractice Applications from the Google Play store without paying
for them, and then use the software or sell it to others.
Intended Learning Outcomes The software piracy rate for that same game from Apple’s
Explain the common ethical issues of the IT users; and App store is closer to 60 percent.
Understand the ethical practices of the users. Software piracy can have a negative impact on future
software development if professional developers
- For most IT workers, becoming licensed as a software engineer is become discouraged watching revenue from legitimate
optional because they practice under the “industrial exemption” sales sink while the sales of pirated software and games
clause of their state’s licensing laws that permits them to work skyrocket.
internally for an organization without licensure so long as they are
not making final decisions to release product to the public or Inappropriate Use of Computing Resources
offering engineering services directly to the public (for example, Some employees use their computers to surf popular
software engineering consultant). websites that have nothing to do with their jobs,
participate in chat rooms, view pornographic sites, and
Negligence has been defined as not doing something that play computer games.
a reasonable man would do, or doing something that a These activities eat away at a worker’s productivity and
reasonable man would not do. waste time.
Duty of care refers to the obligation to protect people A survey by the Fawcett Society found that one in five
against any unreasonable harm or risk. men admit to viewing porn at work, while a separate
Courts consistently reject attempts to sue individual study found that 30 percent of mobile workers are
parties for computer-related malpractice. viewing porn on their web-enabled phones
The courts decide whether parties owe a duty of care by Organizations typically fire frequent pornography
applying a reasonable person standard to evaluate how offenders and take disciplinary action against less
an objective, careful, and conscientious person would egregious offenders.
have acted in the same circumstances.
A breach of the duty of care is the failure to act as a Inappropriate Sharing of Information
reasonable person would act. Every organization stores vast amounts of information
Professionals who breach the duty of care are liable for that can be classified as either private or confidential.
injuries that their negligence causes. Private data describe individual employees—for
This liability is commonly referred to as professional example, their salary information, attendance data,
malpractice. health records, and performance ratings.
For example, a CPA who fails to use reasonable care, An IT user who shares this information with an
knowledge, skill, and judgment when auditing a client’s unauthorized party, even inadvertently, has violated
books is liable for accounting malpractice. someone’s privacy or created the potential that company
information could fall into the hands of competitors.
Common Ethical Issues for IT Users
Ethical Practices of IT Users
Software piracy The growing use of IT has increased the potential for new
Inappropriate use of computing resources ethical issues and problems; thus, many organizations
o Private data have recognized the need to develop policies that protect
o Confidential Information against abuses.
Sometimes IT users are the ones who commit software Adherence to a policy can improve services to users,
piracy. increase productivity, and reduce costs.
A common violation occurs when employees copy
software from their work computers for use at home. Supporting the Ethical Practices of IT Users
The increasing popularity of the Android smartphone The growing use of IT has increased the potential for new
operating system has created a serious software piracy ethical issues and problems; thus, many organizations
problem. have recognized the need to develop policies that protect
Some IT end users have figured out how to download against abuses.
4
IT0025 - M1 - Social and Professional Issues
Adherence to a policy can improve services to users, Information security (infosec) group’s responsibilities
increase productivity, and reduce costs. include managing the processes, tools, and policies
necessary to prevent, detect, document, and counter
Ethical Practices of IT Users threats to digital and nondigital information, whether it
Establishing Guidelines for Use of Company Software is in transit, being processed, or at rest in storage.
Defining the Appropriate Use of IT Resources
Structuring Information Systems to Protect Data and Structuring Information Systems to Protect Data and Information
Information Organizations must implement systems and procedures
Installing and Maintaining a Corporate Firewall that limit data access to just those employees who need
it.
Establishing Guidelines for Use of Company Hardware and Software For example, sales managers may have total access to
Company IT managers must provide clear rules that sales and promotion databases through a company
govern the use of home computers and associated network, but their access should be limited to products
software. for which they are responsible.
Some companies negotiate contracts with software
manufacturers and provide PCs and software so that IT Installing and Maintaining a Corporate Firewall
users can work at home. A firewall is hardware or software (or a combination of
The goal should be to ensure that employees have legal both) that serves as the first line of defense between an
copies of all the software they need to be effective, organization’s network and the Internet; a firewall also
regardless of whether they work in an office, on the road, limits access to the company’s network based on the
or at home. organization’s Internet usage policy.
A firewall can be configured to serve as an effective
Defining an Acceptable Use Policy deterrent to unauthorized web surfing by blocking access
An acceptable use policy (AUP) is a document that to specific objectionable websites.
stipulates restrictions and practices that a user must
agree to in order to use organizational computing and Compliance
Compliance means to be in accordance with established
network resources.
policies, guidelines, specifications, or legislation.
It is an essential information security policy—so Records management software, for example, may be
important that most organizations require that developed in compliance with the U.S. Department of
employees sign an acceptable use policy before being Defense’s Design Criteria Standard for Electronic
granted a user or network ID. Management Software applications (known as DoD
5015) that defines mandatory functional requirements
An effective acceptable use policy is clear and concise and contains for records management software used within the
Department of Defense.
the following five key elements:
Commercial software used within an organization should
be distributed in compliance with the vendor’s licensing
1. Purpose of the AUP - Why is the policy needed and what agreement.
are its goals?
2. Scope - Who and what is covered under the AUP?
3. Policy - How are both acceptable use and unacceptable
use defined; what are some examples of each?
4. Compliance - Who is responsible for monitoring
compliance and how will compliance will be measured?
5. Sanctions - What actions will be taken against an
individual who violates the policy.
5
IT0025 - Social and Professional Issues
Some of the key issues are: controlling access to
M2 - Freedom of Expression information on the Internet, Internet censorship, strategic
lawsuits against public participation, anonymity in the
Intended Learning Outcomes internet, john doe lawsuits, hate speech, pornography
Know the legal basis for the protection of freedom of and fake news.
speech; Some of the key issues are: controlling access to
Discuss some key federal laws that affect online freedom information on the Internet, Internet censorship,
of expression, and how do they impact organizations; defamation, hate speech, and pornography.
Know how the Internet present new challenges in the
area of freedom of expression; and (1) Controlling Access to Information on the Internet
Understand the issues related to the use of information One of the main reasons to support control of access
technology. to information in the internet is the children’s
capability of accessing the Internet.
First Amendments Rights
The Internet enables a worldwide exchange of news, The Communications Decency Act (CDA)
ideas, opinions, rumors, and information. This act aimed at protecting children from online
Its broad accessibility, open discussions, and anonymity pornography. The CDA imposed $250,000 fines and
make the Internet a remarkable communications prison terms of up to two years for the transmission
medium. of ―indecent‖ material over the Internet.
People must often make ethical decisions about how to An Internet filter is software that can be used to
use such remarkable freedom and power. block access to certain websites that contain
The right to freedom of expression is one of the most material deemed inappropriate or offensive.
important rights for free people everywhere.
In other words, the First Amendment protects (2) Internet Censorship
Americans’ rights to freedom of religion, freedom of is the control or suppression of the publishing
expression, and freedom to assemble peaceably. or accessing of information on the Internet.
Government entities may pressure “upstream”
- The Supreme Court has held that the following types of speech Internet service providers
are not protected by the First Amendment and may be forbidden o limit access to certain websites
by the government. o allow access to only some content or
modified content at certain websites
Obscene Speech o reject the use of certain keywords in
An obscenity is any statement or act which strongly search engines
offends the prevalent morality of the time, is a profanity, o track and monitor the Internet
or is otherwise taboo, indecent, abhorrent, or disgusting, activities of individuals.
or is especially inauspicious.
(3) Strategic Lawsuit Against Public Participation
Defamation A strategic lawsuit against public participation
also called calumny, vilification, traducement, slander (SLAPP) is employed by corporations, government
(for transitory statements), and libel (for written, officials, and others against citizens and community
broadcast, or otherwise published words). groups who oppose them on matters of public
The two different types of defamation are: Slander and interest.
Libel
Although people have the right to express opinions, they (4) Anonymity on the Internet
must exercise care in their Internet communications to Anonymous expression is the expression of opinions
avoid possible charges of defamation. by people who do not reveal their identity.
Anonymity is even more important in countries that
Freedom of Expression: Key Issues don’t allow free speech.
Information Technology has provided amazing new ways Doxing involves doing research on the Internet to
to communicate with people around the world. obtain someone’s private personal.
1
IT0025 - Social and Professional Issues
(5) John Doe Lawsuits
Businesses must monitor and respond to both the
public expression of opinions that might hurt their
reputations and the public sharing of confidential
company information.
When anonymous employees reveal harmful
information online, the potential for broad
dissemination is enormous.
An aggrieved party can file a John Doe lawsuit
against a defendant whose identity is temporarily
unknown because he or she is communicating
anonymously or using a pseudonym.
2
IT0025 - Social and Professional Issues
Software Copyright Protection
M3 - Intellectual Property The use of copyrights to protect computer software
raises many complicated issues of interpretation. -
ST1 - What is Intellectual Property? Registering a copyright for a software program is a simple
process.
Objectives
-Understand how to protect Intellectual Property; The Prioritizing Resources and Organization for Intellectual Property
-Explain the factors that can be used in deciding whether a use of Act of 2008
copyrighted material is fair; and
-Understand the strength and limitations of using copyright, The Prioritizing Resources and Organization for
patent, trade secret laws to protect intellectual property. Intellectual Property (PRO-IP) Act of 2008 (Public Law 110-
403) created the position of Intellectual Property
Intellectual Property Enforcement Coordinator within the Executive Office of
is a term used to describe works of the mind—such as art, the President
books, films, formulas, inventions, music, and One of its programs, called Computer Hacking and
processes—that are distinct and owned or created by a Intellectual Property (CHIP), is a network of over 150
single person or group. experienced and specially trained federal prosecutors
who focus on computer and intellectual property crimes.
Copyright Law
protects authored works, such as art, books, film, and General Agreement on Tariffs and Trade
music; patent law protects inventions; and trade secret The General Agreement on Tariffs and Trade (GATT) was a
law helps safeguard information that is critical to an multilateral agreement governing international trade.
organization’s success. GATT however, copyright protection varies greatly from
country to country, and an expert should be consulted
Copyrights when considering international usage of any intellectual
A copyright is the exclusive right to distribute, display, property.
perform, or reproduce an original work in copies or to
prepare derivative works based on the work The WTO and the WTO TRIPS Agreement (1994)
Copy right protection is granted to the creators of original The WTO is a global organization that deals with the rules
works of authorship in any tangible medium of of international trade based on WTO agreements that are
expression. negotiated and signed by representatives of the world’s
Copyright infringement is a violation of the rights secured trading nations.
by the owner of a copyright. The goal of the WTO is to help producers of goods and
Infringement occurs when someone copies a substantial services, exporters, and importers conduct their business
and material part of another’s copyrighted work without globally
permission.
The World Intellectual Property Organization Copyright Treaty
Copyright Term (1996)
Copyright law guarantees developers the rights to their The World Intellectual Property Organization (WIPO),
works for a certain amount of time. Since 1960, the term headquartered in Geneva, Switzerland, is an agency of
of copyright has been extended 11 times from its original the United Nations established in 1967.
limit of 28 years. WIPO is dedicated to “the use of intellectual property as
a means to stimulate innovation and creativity.
Eligible Works WIPO has strongly advocated for the interests of
The types of work that can be copyrighted include intellectual property owners. Its goal is to ensure that
architecture, art, audiovisual works, choreography, intellectual property laws are uniformly administered.
drama, graphics, literature, motion pictures, music,
pantomimes, pictures, of copyright, fair contracts, and
free speech.
1
IT0025 - Social and Professional Issues
The Digital Millennium Copyright Act (1998) manufacture,” permits its owner to exclude others from
The DMCA (Public Law 105-304) was signed into law in making, using, or selling the design in question.
1998 and implements two 1996 WIPO treaties: the WIPO Patent infringement, or the violation of the rights secured
Copyright Treaty and the WIPO Performances and by the owner of a patent, occurs when someone makes
Phonograms Treaty. unauthorized use of another’s patent
The act is divided into the following five sections: Trade Secrets
1. Title I (WIPO Copyright and Performances and
Phonograms Treaties Implementation Act of 1998) Trade Secret
a. This section implements the WIPO treaties by business information
making certain technical amendments to the has required effort or cost to develop,
U.S law in order to provide appropriate has some degree of uniqueness or novelty, is generally
references and links to the treaties. unknown to the public, and is kept confidential.
2. Title II (Online Copyright Infringement Liability Limitation
Act) Trade Secret Laws
a. This section enables website operators that Protection laws very greatly from country to country.
allow users to post content on their website
(e.g., music, video, and pictures) to avoid Uniform Trade Secrets Act
copyright infringement liability if certain “safe was drafted in the 1970s to bring uniformity to all the
harbor” provisions are followed. United States in the area of trade secret law.
3. Title III (Computer Maintenance Competition Assurance
Act)
a. This section permits the owner or lessee of a
computer to make or authorize the making of a
copy of a computer program in the course of
maintaining or repairing that computer.
4. Title IV (Miscellaneous provisions)
a. This section adds language to the Copyright Act
confirming the Copyright Office’s authority to
continue to perform the policy and
international functions that it has carried out
for decades under its existing general authority.
5. Title V (Vessel Hull Design Protection Act)
a. This section creates a new form of protection
for the original design of vessel hulls.
Patents
A patent permits its owner to exclude the public from
making, using, or selling a protected invention, and it
allows for legal action against violators.
A utility patent is “issued for the invention of a new and
useful process, machine, manufacturer, or composition
of matter, or a new and useful improvement.
It generally permits its owner to exclude others from
making, using, or selling the invention for a period of up
to twenty years from the date of patent application filing,
subject to the payment of maintenance fees.”
A design patent, which is “issued for a new, original, and
ornamental design embodied in or applied to an article of
2
IT0025 - Social and Professional Issues
ST2 - Current Intellectual Property Issues As a result, organizations that want to change database
vendors are faced with rewriting existing applications
Intended Learning Outcome using the new vendor’s database programming language.
- Understand some of the current issues associated with the Using reverse engineering, a developer can use the code
protection of intellectual property of the current database programming language to
recover the design of the information system application.
Current Intellectual Property Issues Next, code-generation tools can be used to take the
Plagiarism is the act of stealing someone’s ideas or words design and produce code (forward engineer) in the new
and passing them off as one’s own. database programming language. This reverse-
The explosion of electronic content and the growth of the engineering and code generating process greatly reduces
web have made it easy to cut and paste paragraphs into the time and cost needed to migrate the organization’s
term papers and other documents without proper applications to the new database management system.
citation or quotation marks.
Open-Source Code
Partial list of plagiarism detection services and software Program whose source code is made available for use or
modification, as users or other developers see fit.
Name of Service Website Provider A considerable amount of open-source code is available,
iThenticate www.ithenticate.com iParadigms and an increasing number of organizations use open
Turnitin www.turnitin.com iParadigms source code.
SafeAssign www.safeassign.com Blackboard For example, much of the Internet runs on open source
Glatt Plagiarism www.plagiarism.com Glatt Plagiarism code; when you access a web page, send a text, or post a
Services Services status update, you are likely using an open source
program such as Linux, Apache HTTP, PHP, Perl, Python,
The following list shows some of the actions that schools or Ruby.
can take to combat student plagiarism:
o Help students understand what constitutes A common use of open source software is to move data
plagiarism and why they need to cite sources from one application to another and to extract,
properly. transform, and load business data into large databases.
o Show students how to document web pages Two frequently cited reasons for using open source
and materials from online databases. software are that it provides a better solution to a specific
o Schedule major writing assignments so that business problem and that it costs less.
portions are due over the course of the term, Open-source software is used in applications developed
thus reducing the likelihood that students will for Apple’s iPhone, Android smartphones, and other
get into a time crunch and be tempted to mobile devices.
plagiarize to meet the deadline.
o Make clear to students that instructors are Commonly used open source software
aware of Internet paper mills.
o Ensure that instructors both educate students Open-source web Open-source Open-source
about plagiarism detection services and make browsers database accounting
them aware that they know how to use these management applications
services. systems
o Incorporate detection software and services Chrome MySQL GnuCash
into a comprehensive antiplagiarism program. Firefox PostgreSQL SQL Ledger
Opera SQLite X Tuple PostBooks
Reverse Engineering Chromium MongoDB Compiere
The process of taking something apart in order to Midori Cubrid Turbo Cash
understand it, build a copy of it, or improve it. QupZilla MariaDB KashFlow
It was originally applied to computer hardware but is now
commonly applied to software as well.
3
IT0025 - Social and Professional Issues
Reasons that firms or individual developers create open source Trademark Infringement
code, even though they do not receive money for it, include the A logo, package design, phrase, sound, or word that
following: enables a consumer to differentiate one company’s
Some people share code to earn respect for solving a products from another’s.
common problem in an elegant way.
Some people have used open-source code that was Cybersquatting
developed by others and feel the need to pay back by registered domain names for famous trademarks or
helping other developers. company names to which they had no connection, with
A firm may be required to develop software as part of an the hope that the trademark’s owner would eventually
agreement to address a client’s problem. buy the domain name for a large sum of money.
Competitive Intelligence
Legally obtained information that is gathered to help a
company gain an advantage over its rivals.
Competitive intelligence is not the same as industrial
espionage, which is the use of illegal means to obtain
business information not available to the general public.
4
17/20 ● It is an effort by an employee to
● A trade secret is information, attract attention to a negligent,
generally unknown to the public, illegal, unethical, abusive, or
that a company has taken strong dangerous act by a company
measures to keep confidential. that threatens the public
○ True interest.
○ False ○ Duty of Care
○ Breach of the duty
● Government License ○ Whistle Blowing
substantially improve IT ○ Negligence
workers’ salaries and career
prospects. ● Many people believe that the
○ True licensing and certification of IT
○ False workers would increase the
reliability and effectiveness of
● Client often have special information systems.
information based on their ○ True
expertise or position within the ○ False
offending organization Link:
○ True https://media.lanecc.edu/users/
○ False rossj/LCCWebs/JerryClassPages/
Link: Jerry/CS160New/CourseTechnol
https://www.slideshare.net/mar ogy/0-619-06277-0_02_op.pdf
kjhonoxillo/ethics-for-it-
workers-and-it-users ● Which of the following is not
one of the five key elements of
● The client makes decision about an acceptable use policy (AUP)?
a project on the basis of ○ Purpose of the AUP, why
information, alternatives, and it is needed and what are
recommendations provided by its goals
the IT user. ○ Scope of who and what is
○ True covered under the AUP.
○ False ○ Background and make-
up of the infosec
● Bribery is information, generally organization that
unknown to the public, that a enforces the AUP
company has taken strong ○ Definition of the actions
measures to keep confidential. that will be taken against
○ True an individual who
○ False violates the policy
● Which of the following key ● What does SLAPP stand for?
elements in AUP that actions will ○ strategic law against
be taken against an individual public participation
who violates the policy? ○ strategic lawsuit against
○ Policy public participation
○ Scope ○ strategic lawsuit against
○ Sanctions private participation
○ compliance ○ strategic law against
public participants
● It refers to the obligation to
protect people against any ● Which of these is NOT protected
unreasonable harm or risk. by the First Amendment?
○ Duty of Care ○ A protest march against
○ Professional Malpractice illegal immigration
○ Breach of the duty ○ A threat against
○ Negligence someone
○ A cartoon that makes fun
● A threatening private message of a religion
sent over the Internet to a ○ A text message criticizing
person. a public official
○ Libel
○ Hate Speech ● Freedom of speech is
○ Obscene Speech guaranteed to all U.S. citizens by
○ Slander the ______ Amendment.
○ Third
● It is a written defamatory ○ First
statement. ○ Fourth
○ Libel ○ Second
○ Obscene Speech
○ Slander ● A threatening private message
○ Hate Speech sent over the Internet to a
person.
● A Drexel University survey of ○ Anonymity on the
college students revealed that Internet
64 percent had sent received ○ Hate Speech
sexually explicit text messages ○ John Doe Lawsuits
or images when they were ○ Obscene Speech
under age 18.
○ True
○ False
● Freedom of speech is
guaranteed to all U.S. citizens by
● A threatening private message the ______ Amendment.
sent over the Internet to a ○ Third
person, what kind of freedom ○ First
expression is? ○ Fourth
○ Hate Speech ○ Second
○ Anonymity in the
Internet
● Anonymity is even more ● A group that is responsible for
important in countries that don’t monitoring compliance to the
allow free speech. AUP.
○ True ○ Internet security
○ False ○ Data security
○ Information security
________________________________ ○ Data privacy
_
● The courts decide whether
● Suppliers strive to maintain parties owe a duty of care by
positive relationships with their applying a reasonable person
customers in order to make and standard to evaluate how an
increase sales. objective, careful, and
○ True conscientious person would
○ False have acted in the same
circumstances.
● Bribery are made in secret, as ○ True
they neither legally nor morally ○ False
acceptable.
○ True ● It involves in the collection,
○ False reporting, analysis, and
dissemination of news, opinions,
● IT workers have a relationship and photos.
with clients who may be ○ Forum
affected by their actions. ○ Fake news
○ True ○ Blogs
○ False ○ Social Media