Reference no: EM133682443
Activity
Use the ACS Code of Professional Conduct V.2.1 to formulate answers for the following 3 scenarios (150 words for each scenario, 450 words in total).
Scenario 1
- Sarah is an IT security specialist working for a large multinational corporation. Her role involves safeguarding the company's digital assets, protecting sensitive data, and ensuring compliance with cyber security regulations.
- One day, Sarah discovers a vulnerability in the company's network infrastructure that could potentially expose confidential customer information to hackers. Upon further investigation, she realizes that fixing the vulnerability would require significant time and resources. as well as temporarily disrupting critical business operations. However. failing to address the vulnerability could lead to a data breach, compromising the privacy and security of the company's customers.
- What Sarah should do? Refer to ACS code and justify your suggestion.
Your answer should be about 150 words. If you used any external resources. you must cite and reference them.
Scenario 2
Pradeep, a statistical database programmer, is trying to write a large statistical program needed by his company. Programmers in this company are encouraged to write about their work and to publish their algorithms in professional journals. After months of tedious programming, Pradeep has found himself stuck on several parts of the program. His manager, not recognizing the complexity of the problem, wants the job completed within the next few days. Not knowing how to solve the problems, Pradeep remembers that a co-worker had given him source listings from his current work and from an early version of a commercial software package developed at another company.
On studying these programs, he sees two areas of code which could be directly incorporated into his own program. He uses segments of code from both his co-worker and the commercial software, but does not tell anyone or mention it in the documentation. He completes the project and turns it in a day ahead of time.
Scenario 3
John works as a data analyst for a large e-commerce company. His role involves jig customer data to improve marketing strategies and personalize user experiences on the company's website and mobile app.
While anal ig the data, John discovers that the company's data collection practices may be infringing on customer privacy. He finds that the company is collecting more data than necessary for its operations, including sensitive information such as browsing history, location data, and personal preferences, without obtaining explicit consent from users. Furthermore, there are indications that this data might be shared with third-party advertisers for targeted advertising purposes without the knowledge of the users.
- What John should do? Refer to the ACS code and justify your suggestion.
- Your answer should be about 150 words. If you used any external resources, you must cite and reference them. Answers generated by Al tools will not be acceptable.