4.8.1 Individual (moral), social (ethical), legal and cultural issues and opportunities Flashcards
What is personal data?
Data that can uniquely identify a living person
What is the difference between information and data?
Data is encoded information without meaning, it is raw facts that has to be submitted for processing. Information is the output of data, it is processed and structured so it is understandable.
Why is storing personal data on a computer good or bad?
Without access to a computer, the data is unreadable and it’s not stored in a human readable form. It is also easier to log who has accessed the data, it can be copied and transferred easily. But this makes data easier to steal as systems can be hacked and looked at remotely, and it’s difficult to tell how many copies of the data are in circulation.
How have computers caused concerns over an individual’s privacy?
Computers can store a large amount of data that can be searched and accessed easily remotely. Networked computers means data can be more easily shared and they encourage more information to be stored online.
Why might storing personal data concern privacy campaigners?
Data could be used to track location and activities of a person as it links them to a location, car etc
Burglary if a person’s routines are known
Information could be hacked
Concerns over identity theft, targeting bank accounts
Selling data to third parties, using it for marketing, unwanted phone calls etc
Person doesn’t know what their data may be used for
During public/private key encryption, state advantages/ disadvantages of allowing the keys to be available to trusted third parties
Increases security, helps the Government detect illegal activity
Creates ‘industrial spying’
The individual may see it as an intrusion of their privacy
What security methods are used to detect or prevent unauthorised access to computers?
Choosing strong passwords that aren’t easily guessed
Locking out of account after three incorrect password guesses
Logs on movement on confidential files
Encryption of sensitive files
CCTV
Swipe cards for accessing rooms
Bio-metric logons
What sort of things could happen to data if security fails?
Unauthorised access, deliberate corruption and loss of data. Theft or damage to the hardware, causing a hardware failure that destroys data
Loss of data through natural hazards e.g fires
What failures result in weak data integrity?
Errors on data entry due to insufficient validation checks on entered data
Virus or program error corrupting the files
Transmission errors
Data not up to date or is duplicated
What could a store use a customer’s data for?
Selling on their information
Try to sell unsolicited services
Target customers with offers, leading to more sales
What are the effects on young people by allowing unrestricted access to the internet?
Allow them to learn about others
Encourage them to form goals / expectations
Educational benefit
Less socialising because they’re on the computer
May break copyright laws
Exposed to bad influences
What is backing up and archiving?
Backup is making a copy of files so that if a file is lost or corrupted it can be restored. Usually done onto a removable storage device so it is safe such as SSD, CD, and performed regularly, such as once a week
Archive is removing the file from regular use to free up storage space but keeping it in case you need it
How does a company return to operation quickly after a system failure?
Uses a strong recovery / restore procedure, such as easily gaining access to their backup files or using alternative hardware
What is a biometric property?
A biological / physical property of a person that can be used to uniquely identify them, such as fingerprint, retina, dna, voice
What is DRM?
Access management system for digital media that encrypts so that only those with the key can use the file