Gerlyn(reviewer)

- deals with placing a “value” on acts according to whether they are “good” or “bad”
- code of behavior that is defined by the group to which an individual belongs
Are the personal principles upon which an individual bases his or her decisions about what is right and what is wrong
a system of rules that tells us what we can and cannot do. Enforced by a set of institutions
Concept that an organization should act ethically by taking responsibility for the impact of its actions on its shareholders, consumers, employees, community, environment, and suppliers
A statement that highlights an organization’s key ethical issues and identifies the overarching values and principles that are important to the organization and its decision making
Indicates that a professional possesses a particular set of skills, knowledge, or abilities, in the opinion of the certifying organization
Defines an organization’s security requirements, as well as the controls and sanctions needed to meet those requirements
trade groups that represent the world’s largest software and hardware manufacturers.
Is information, generally unknown to the public, that a company has taken strong measures to keep confidential.
An effort by an employee to attract attention to a negligent, illegal, unethical, abusive, or dangerous act by a company that threatens the public interest.
the crime of obtaining goods, services, or property through deception or trickery
The misstatement or incomplete statement of a material fact
Occurs when one party fails to meet the terms of a contract
States the principles and core values that are essential to the work of a particular occupational group
The act of providing money, property, or favors to someone in business or government in order to obtain a business advantage
The process established by an organization’s board of directors, managers, and IT group to provide reasonable assurance for the effectiveness and efficiency of operations, the reliability of financial reporting, and compliance with applicable laws and regulations.
The guidelines, standards, and laws by which the organization must abide.
The ability to communicate with others without those communications being monitored by other person or organizations.
The unintended release of sensitive data or the access of sensitive data.
malware that stops you from using your computer or accessing your data until you meet certain demands, such as paying a ransom or sending photos to the attacker.
Negligence has been defined as not doing something that a reasonable person would do, or doing something that a reasonable person would not do
Defined as not doing something that a reasonable person would do
A piece of programming code, usually disguised as something else, that causes a computer to behave in an unexpected and usually undesirable manne
A harmful program that resides in the active memory of the computer and duplicates itself
A seemingly harmless program in which malicious code is hidden
use of email systems to send unsolicited email to large numbers of people
Stealing of personal information, which is then used without the owner’s permission.
An attack on an information system that takes advantage of a particular system vulnerability. Often this attack is due to poor system design or implementation
Branch of science that deals with computer crime investigations
The combination of communications privacy (the ability to communicate with others without those communications being monitored by other persons or organizations) and data privacy (the ability to limit access to one’s personal data by other individuals and organizations in order to exercise a substantial degree of control over that data and its use).
Cybercrime Prevention Act of 2012 (CPA) which is the comprehensive legislation on cybercrimes. Notably, it defined "cybersecurity" as the "application of security measures to ensure confidentiality, integrity, and availability of data (number na lang)
Act protecting individual personal information in information and communications systems in the government and the private sector, creating for this purpose a national privacy commission, and for other purposes.
Federal law that assigns certain rights to parents regarding their children’s educational records.
- Individuals must reveal much of their personal financial data in order to take advantage of the wide range of financial products and services available, including credit cards, checking and savings accounts, loans, payroll direct deposit, and brokerage accounts.
Individuals are rightly concerned about the erosion of privacy of data concerning their health.
The government has a great capacity to store data about each and every one of us and about the proceedings of its various organizations.
Overall goal of these guidelines is to stop the unlawful storage of personal data, eliminate the storage of inaccurate personal data, and prevent the abuse or unauthorized disclosure of such data.
Data Privacy Act of 2012 is also known as what republic act (number)
Republic act no 10175 is also known as
Ability to limit access to one's personal data by other individuals and organizations in order to exercise a substantial degree of control over that data and its use
Defined as the application of security measures to ensure confidentiality, integrity, and availability of data
{"name":"Gerlyn(reviewer)", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"- deals with placing a “value” on acts according to whether they are “good” or “bad”, - code of behavior that is defined by the group to which an individual belongs, are the personal principles upon which an individual bases his or her decisions about what is right and what is wrong","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker