1.5 - Legal, moral, cultural and ethical issues Flashcards
What are the four computing related legislation?
- The Data Protection Act (1998)
- The Computer Misuse Act
- The Copyright, Designs and Patents Act (1988)
- The Regulatory of Investigatory Powers Act 2000
What are the 8 principles of The Data Protection Act 1998?
- Data must be processed fairly and lawfully.
- Data must be adequate, relevent and not excessive.
- Data must be accurate and up to date.
- Data must not be retained for longer than neccesary.
- Data can only be used for the purpose for which it was collected.
- Data must be kept secure.
- Data must be handeled in accordance with people’s rights.
- Data must not be transferred outside the EU without adequate protection.
What is the purpose of The Computer Misuse Act 1990?
To prevent unauthorised access or ‘hacking’ of programs or data.
What are the 4 offences of The Computer Misuse Act?
- Unauthorised access to computer material.
- Unauthorised access with intent to commit or facilitate a crime.
- Unauthorise modification of computer material.
- Making, suppying or obtaining anything which can be used in computer misuse offences.
What is the purpose of The Copyright Designs and Patents Act 1988?
To protect the creators of books, music, video and software from having their work illegally copied.
What is the purpose of The Regulation of Investigatory Powers Act 2000?
Regulates the powers of public bodies to carry out surveillence and investigation, and covers the interception of communications.
What are the 6 rules of The Regulation of Investigatory Powers Act 2000?
- Enables certain public bodies to demand than an ISP provide access to a customer’s communications in secret.
- Enables mass surveillance of communications in transit.
- Enables certain public bodies to demand ISPs fit equipment to facilitate surveillance.
- Enables certain public bodies to demand that someone hand over keys to protected information.
- Allows certain public bodies to monitor people’s internet activities.
- prevents the existence of interception warrants and any data collected with them from being revealed in court.
What are 3 ways the software industry can prevent the illegal copying of software?
- User must enter a unique key before the software is installed.
- Some software will only run if the CD is present in the drive.
- Some applications will only run if a special piece of hardware called a ‘dongle’ is plugged into a USB in a computer
What are two examples of pirates being prosecuted?
- 2011 - Anne Muir convicted of distributing £54,000 worth of music.
- 2012 - Two Leeds men convicted of running film streaming websites.
What were the Snowden files?
- Edward Snowden provided an insight into how bulk data is collected and used by the US and other Governments.
- Revealed the aim of US Government was to collect, store, monitor and analuse metadata about all electronic communications by everybody in the world.
2 examples of how has Digital Technology impacted the workforce?
- 1989, Kodak employed 145,000 people, by 2015 was selling patents to escape bankrupty and emplys 8,000.
- 2013, Instagram had 13 full staff and sold to Facebook for $1bn.
Positive and negative of Digital content.
+ Consumers pay less / nothing.
- Musicans, Film makes + authors earn less / nothing.
What 5 ethical questions can buyers have about production methods?
- Country of manufacture
- Use of child labour, animal testing.
- Toxic, recycled or organic ingredients.
- Renewable energy use.
- Charitable or community activities of producers.
2 statistics of British online shoppers.
- 3/4 of British consumers purchase goods + services online.
- It increased by 9.6% between 2014 & 2015.
How does pricing online impact what people buy?
- Can use price comparison sites.
- Economists say competition works best when buyers + sellers have perfect information about price, usefulnesss, quality + production methods.