Chapter 8 Legal Moral Ethical Issues Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

The Data Protection Act 1998

A

This law applies to information stored both on ​computers ​and in ​organised paper filing systems​. The law covers ​personal data​, which is any data which can be used to identify a living person​. Furthermore, data which can be used ​in combination with other data​ to identify a living person is also classified as personal data. Examples of personal data include a person’s name and address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Data Protection Act 1998 8 ways the government has laid it out:

A
  1. Personal data shall be processed fairly and lawfully
  2. Personal data shall be obtained only for one or more specified and lawful purpose
  3. Personal data shall be adequate, relevant and not excessive for its purpose(s)
  4. Personal data shall be accurate and where necessary kept up to date
  5. Personal data shall not be kept for longer than is necessary for its purpose(s)
  6. Personal data shall be processed in accordance with the rights of data subjects
    under this Act
  7. Appropriate technical and organisational measures shall be taken against
    unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data
  8. Personal data shall not be transferred to a country or territory outside the European
    Economic Area, unless that country or territory ensures an adequate level of data protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Computer Misuse Act 1990

A

Sometimes referred to as ​CMA​, The Computer Misuse Act 1990 concerns the ​malicious use of computers​. The Act was originally created to ensure that computer hacking was covered by law, but has since been frequently ​updated ​to ensure it remains relevant.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Computer Misuse Act 1990 outlines three primary offences:

A
  1. Unauthorised access to computer materials.
    For example: Finding a teacher’s password and opening their files.
  2. Unauthorised access with intent to commit further offences.
    For example: Finding a teacher’s password and opening their files with the
    intention of increasing your mark on their markbook.
  3. Unauthorised modification of computer material.
    For example: Finding a teacher’s password, opening their files and
    increasing your mark on their markbook.
    The consequences of the second and third offenses are generally worse than the first, with
    each offence being punishable with imprisonment.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Copyright, Design and Patents Act 1988

A

This act was brought in to ​protect people’s property​ online. It covers everything from logos to music recordings. If a work is ​original​, copyright ​automatically applies ​and doesn’t expire until ​25-70 years after the death of the creator​, depending on the type of work.
In 1992, the Act was extended to include ​computer programs​ as a type of literary work, meaning that copyright ​automatically applies to code​.
If an individual believes that their work has been copied, it is ​their responsibility ​to take action under the Act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Regulation of Investigatory Powers Act 2000

A

Sometimes referred to as ​RIPA​, the Regulation of Investigatory Powers Act covers investigation, surveillance and interception of communication​ by ​public bodies​. For example, the Secret Service can legally wire-trap online conversations in the interests of national security provided that a ​warrant ​has been issued.

Furthermore, the act enforces​ internet service providers​ and ​mobile phone companies​ to give up information upon request from an authorised authority and to ensure that their networks have sufficient hardware installed to ​facilitate surveillance​.

This Act is particularly controversial as ​its powers extend to small agencies ​like local councils. In addition, some people feel that the Act is an​ invasion of privacy​, or that it is often ​improperly used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ethics and Morals

A

Ethics ​are concerned with our ​values as a community​ and how these will ​impact different groups of people​ in society. ​Morals ​are to do with our ​personal code of conduct​ and encompass ​how we choose to behave​, including the ​decisions we make​ at the expense of others.
With computers becoming an integral part of almost ​every aspect of our day-to-day lives​, it is important that we consider the​ moral, ethical, environmental, social and cultural implications​ of these changes. Identifying these issues is the first step to resolving them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Advantages of computers in the workplace

A

There are many advantages to involving computers in the workforce, which is why they are key to modern businesses. First, they ​improve efficiency​. For companies such as Amazon and Effidence, machines have successfully been used to ​reduce delivery times​ and ​speed up manufacturing processes​, thus i​mproving customer satisfaction​ and reducing ​unit labour costs​ which feed through as ​lower prices for consumers​. While Amazon uses robots in their warehouses to package and transfer goods between stations, Effidence’s PostBot is able to navigate through neighbourhoods to deliver letters and parcels from door-to-door. Another advantage of these computerised roles is that they ​reduce strain on workers​ and reduce the need to work in a​ repetitive and tedious environment​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Disadvantage of computers in the workplace

A

On the other hand, this has resulted in a number of people losing their jobs, creating high levels of ​structural unemployment​. The effects of this may not necessarily be long-term as it is likely that higher consumer demand due to cheaper services will ​create employment in other sections of the business​. For the effects to be made less severe, governments must invest in providing ​retraining programmes​ so people are able to change occupation. The question is whether this is enough to counteract the effects of computerisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly