1.9 Economics, Moral etc. issues Flashcards
What is the Data protection act 2018
-replaces the old data protection act from 1998
-controls how personal information is used by organisations, businesses or government
the principles are that:
-data is used fairly, lawfully and transparently
-used for specified, explicit purposes
-used in a way that is adequate, relevant and limited to only what is necessary
-data is accurate and kept upto date
-kept for no longer than is necessary (the right to be forgotten)
-handled in a way that ensures appropriate security, including protection against unlawful or unauthorised processing, access, loss, destruction or damage
under the Data protection act 2018 what must happen in a data breach or hacking situation
its reported to the relevant authorities within 72 hours
consumer has a right to know when a data breach occurs
What are the individual rights in the data protection act 2018
individuals have the right to know the data that is stored about them, this includes the right to:
be informed about how their data is being used
access/view their personal data
have incorrect data updated
have data erased
stop or restrict the processing of their data
data portability (allowing them to get and reuse their data for different services)
What must an organisation do when data is requested under the data protection act 2018
-supply a copy of data held as soon as possible, usually within a month or 2 depending on how complex the request
-requests are usually free but organisations can charge if a lot of information is being asked for and will take time to process
what are the exemptions for when data is requested under the data protection act 2018
situations when the organisation are allowed to withhold information (they dont have to provide a reason):
-the prevention, detection or investigation of a crime
-national security or the armed forces
-the assessment or collection of tax
-judicial or ministerial appointments
what is the computer misuse act 1990
protect computer users against wilful attacks and theft of information
the three criminal offences introduced as a result:
-unauthorised access to computer material
-unauthored access with intent to commit further offences
-unauthorised modification of computer material
what is the coverage made by the computer misuse act 1990
will cover any hacking attempt (even unsuccessful) to try to login to a computer using another persons username and password without authority
would also cover impersonating another person using email, social media etc.
people who write or circulate viruses/worms, trojans etc.
how is the computer misuse act 1990 used in prosecution
-police need to prove that they had carried out the misuse act deliberately. It is difficult for someone to prove if someone does something by accident
-cases may go unreported as e.g. banks dont want others to know about their security compromisation as it will affect their reputation
what is the freedom of information act 2000
provides public access to information held by public authorities e.g. government, NHS, state schools, police etc.
people have the right to know about the activities of public authorities, unless there is a good reason not to (gets rid of unnecessary secrecy)
covers any recorded information e.g. computer files, letters, photos etc.
this act DOES NOT give people access to their own personal data, they have to put in a data protection subject access request to e.g. look at health records
requests have to be in writing, and firms respond to the request (20 days to respond):
-tell the applicant whether they hold data within the scope they are asking
-to provide that information
how can a request be refused in the freedom of information act 2000
-would cost too much or take too much staff time to deal with it
-request is vextacious e.g. someone who has had a history of issues with the organisation and the request may cause unjustifiable levels of distress or irritation
the request repeats a previous request from the same person
might prejudice a criminal investigation
what is the copyright, designs and patents act 1988
protects creative works e.g. plays, movies, painting from being stolen
illegal activities:
-selling pirated copies of software at car boot sales or ebay
-forcing others to illegally copy the files
-running multiple copies of the software not allowed by the license
disadvantages:
-not entitled to technical support
-do not qualify for upgrades
-software may be incomplete
-may contain viruses, malware etc.
what is the regulation of investigatory powers act 2000
under the act, it allows the legal decryption of encrypted data and the interception of electronic communications etc. by security services, the secret intelligence service etc.
under the act they can intercept emails, access private communications and plant surveillance
devices
This data can be accessed by a range of public bodies including British security services and the police, upon issue of a warrant.
What is the human rights act 1998 article 8
Incorporates the rights in the European Convention on Human Rights into UK law.
Article 8 provides a right to respect an individuals ‘private and family life, their home and correspondence’
This can be ignored by some public authorities under certain circumstances, for example under RIPA.
what are the codes of conduct by people (how they are expected to behave)
Programmers should have due regard for public health, privacy, security and wellbeing of others and the environment.
Programmers should have due regard for the legitimate rights of any person or organisation that might be affected by their activities.
Programmers should conduct their professional activities without discrimination on the any grounds.
Programmers should promote equal access to the benefits of IT and seek to promote the inclusion of all sectors in society wherever opportunities arise
Programmers should not claim any level of competence that they do not possess.
Programmers should develop their professional knowledge, skills and competence on a continuing basis, maintaining awareness of technological developments, procedures, and standards that are relevant to their field.
Programmers should ensure that they have the knowledge and understanding of legislation and that they comply with such legislation, in carrying out their professional responsibilities.
what are the advantages of computers in the workplace
Many new jobs have been created: programmers, network administrators, hardware manufacturers, social media managers, etc.
Computers can speed up the repetitive, boring parts of jobs, leaving people free to more interesting, creative tasks. E.g. stamping metal, copying documents, etc.
Computers have increased the speed at which tasks can be carried out, e.g. logistics (scheduling transport of goods), stock control, financial data, robotics. This has led to a reduction in cost of manufactured goods.
Better communications, data can be sent instantly around the world. Online meetings can save the requirement to travel, etc.
Ability to work from home – advantages for mental health, childcare, people with disabilities, etc.