ACCA Strategic Business Leader (SBL) Practice Exam

Disable ads (and more) with a membership for a one time $4.99 payment

Study for the ACCA SBL Exam. Utilize quizzes with multiple choice questions, hints, and explanations to enhance your learning. Prepare confidently for your exam!

Practice this question and more.


Which of the following describes 'data security' as an ethical implication of technology?

  1. The use of cloud storage

  2. Protection of sensitive data from unauthorized access

  3. Utilization of big data for market analysis

  4. Sharing information freely across platforms

The correct answer is: Protection of sensitive data from unauthorized access

Data security, as an ethical implication of technology, specifically refers to the protection of sensitive data from unauthorized access. This encompasses practices and measures put in place to ensure that personal and organizational information is safeguarded against threats such as data breaches, hacking, and identity theft. In today's digital age, where information is increasingly vulnerable, maintaining data security is crucial for preserving trust and ensuring compliance with various regulations, such as GDPR and HIPAA. The focus on protecting sensitive data emphasizes the responsibility organizations have to manage data ethically, ensuring it is only accessed by authorized personnel and used for legitimate purposes. This includes implementing various security protocols like encryption, access controls, and regular audits. Other options, while related to technology and data, do not adequately capture the essence of data security. For example, cloud storage involves where data is stored rather than how it is protected. Similarly, utilizing big data for market analysis pertains to data usage rather than its security. Lastly, sharing information freely across platforms contrasts with the concept of data security, which prioritizes controlled access and protection from unauthorized parties. Thus, the essence of data security lies in the diligent protection of sensitive information, making it the correct description in this context.