Answer the following four questions in the form of essays. Use class reading assignments,
journal articles, cases from our readings, or other authoritative sources to support your ideas.
Use correct in-text citations and ONE list of references at the bottom of the exam.
These criteria will be used to evaluate your submission:
Quality and originality of the response to each question
Research reflected in each response
Grammar/spelling/communications style.
Question 1: (25 points) Copyright versus Academic Integrity
Compare copyright and academic integrity. Discuss restrictions on copying imposed
by copyright law. Discuss restrictions on plagiarism and paraphrasing in the
University’s academic integrity policy. Discuss similarities and differences between
these two sets of restrictions.
Question 2: (25 points) Analysis of a Current IT Security Breach
Choose an IT security breach that has occurred during the current year (2018) and
illustrates legal concepts that this course has covered to date. Prepare an essay that
describes the issue – citing factual sources as well as sources that may illuminate the
issues, as you now understand them. Discuss the legal framework around this
issue/event. Analyze the facts considering the legal framework and offer your own
conclusion on who should be responsible from a legal or ethical perspective.
Question 3: (25 points) Ethical Decision Making
The city will face catastrophic flooding following the failure of its power grid and the
infrastructure, which supports that grid. As the Chief Technology Officer for a local
power company, you must decide where to send limited company resources after a
regional disaster. Using ethical decision making frameworks provided in the course,
outline the actions you will take and justify them on ethical grounds.
Question 4: (25 points): Electronic Medical Records
Consider a fictional health care organization, which is planning to implement an
automated patient care system that will enable the organization to electronically
share information with their patients. They would like to provide patients with
access to medical records, submit consent forms for treatment, and enable
electronic payment of bills. Address ethical and legal concerns of the new patient
care system. Also, identify relevant security technologies necessary to protect the
privacy of patients and laws necessary to protect the privacy of patients.


