Computer Science__Ethical and Legal Issues For Developers of Software Flashcards
What is privacy in technology
<ul>
<li>Right of individuals to
control personal data, ensuring data is collected and used responsibly</li>
<div> </div>
<ul>
<li>Involves getting informed
consent, and having transparent data handling when using user data,
including encryption of sensitive information</li></ul></ul>
What are the implications of privacy in software development
<ul>
<li><div><span>Implications:
</span>Breaches to user
data causes harm to user, and harms trust</div><ul>
<ul>
<li>Companies must implement
strong security measures to prevent</li>
</ul></ul></li></ul>
<ul><ul>
</ul></ul>
How to integrate privacy through software design
<div><span>Access Control: </span>Implement
role-based controls in class designs, restricting data access to authorised
entities</div>
<div> </div>
<div><span>Transparency and Accountability: </span>Use
logging mechanisms & getter/setter
methods to track who accessed or modified data, helping in legal compliance</div>
<div> </div>
<ul>
<li>Helps to create audit trails
verifying compliance</li>
</ul>
<div> </div>
<div> </div>
<div><span>Encryption & Anonymisation: </span>Mitigating
risks of leaks, even if data stolen or leaked it remains unreadable</div>
<div> </div>
<div> </div>
<div><span>Data Minimisation: </span>Only
necessary data collected, stored, processed, where prevents unnecessary data
retention, reinforcing compliance</div>
<div> </div>
<ul>
<li>Design classes to manage data
solely for intended purpose</li></ul>
What is inclusivity
<ul>
<li>Designing software to serve
diverse populations without bias, </li>
<div> </div>
<ul>
<li>Accessible user interfaces,
localisation for different languages & cultures, algorithms avoiding
discrimination</li>
</ul>
<div> </div>
<ul>
<li>Enhances user experience,
broadens reach</li>
<ul>
<li>Prevents marginalisation of
certain groups</li>
</ul></ul></ul>
How to integrate inclusivity through software design?
<ul>
<li><div><span>Access Controls: </span>Implement role-based controls
in class designs, ensuring fair access to services, and allowing different
accessibility features per role</div>
<div> </div>
<div> </div>
<div><span>Transparency and Bias Preventions in AI Systems: </span>Prevents
bias in AI models, and logging decision-making processes for accountability</div>
<div> <br></br><br></br></div>
<div><div><span>Data Minimisation: </span>Only necessary data
collected, stored, processed, preventing unnecessary data retention, preventing
discrimination based on unnecessary personal data, and avoids data misuse that
could harm marginalised groups</div></div></li></ul>
What is IP Rights
<ul>
<li>Legal rights protecting
creations of the mind</li>
<div> </div>
<ul>
<li>Respecting original work and
giving proper acknowledgement when using code</li>
</ul>
<div> </div>
<ul>
<li>Encourages creativity while
protecting rights, consider the ownership of code & software</li>
</ul>
<div> </div></ul>
How does data privacy work in encapsulation OOP principle?
<ul>
<li>Restricts direct access to
internal data by using access modifiers (E.g. Private variables) </li>
</ul>
<div> </div>
<ul>
<li>Prevents accidental
modification / exposure of sensitive information</li>
</ul>
<div> </div>
<ul>
<li>Ensures only authorised
methods can interact with private data</li></ul>
How does data privacy work in abstraction OOP principle?
<ul>
<li>Hides complex implementation
details, only exposing necessary functionalities</li>
</ul>
<div> </div>
<ul>
<li>Reduces risk of accidental
exposure of sensitive logic, ensuring unauthorised users can't
manipulate / extract confidential
data</li></ul>
How does data privacy work in inheritance and polymorphism OOP principles?
<ul>
<li>Reuses code while maintaining
controlled access to minimise redundancy and errors</li>
</ul>
<div> </div>
<ul>
<li>Can be misused and may expose
sensitive information through subclassing if not properly designed</li></ul>
How to integrate IP rights through software design?
<ul>
<li><div><span>Access Controls: </span>Implement role-based controls
in class designs, preventing unauthorised copying or use of code or software
features</div>
<div> </div>
<div> </div>
<div><span>Embedding Digital Rights Management: </span>Encrypt
software assets to prevent unauthorised distribution, and use licence keys to
track legitimate usage<br></br><br></br></div>
<div> </div>
<div><div><span>Data Minimisation: </span>Only necessary data
collected, stored, processed, preventing unnecessary data retention, limits
access to sensitive information by deleting unnecessary data, reducing risks of
leaks, theft, misuse</div></div></li></ul>
What are best practices in managing data?
<ul>
<li>Integrate ethical reviews
into development cycles</li>
<ul>
<li>Conduct regular code reviews
& compliance audits to keep pace with evolving legal standards,
continually updating it</li>
</ul>
</ul>
<div> </div>
<ul>
<li>Documentation ensures clear
legal compliance records</li>
<ul>
<li>Maintain detailed records of
data flows, storage practices, access controls, supporting transparency
and accountability</li>
</ul>
</ul>
<div> </div>
<ul>
<li>Be transparent &
accountable, ensuring organisations take responsibility for user data</li></ul>
What is the ethical implications in software development?
<ul>
<li><span>Societal
Impact: </span>Society
rely on software systems for everyday functions, and platforms facilitate
digital social interaction, ensures software benefits users without harm,
and keeps data private</li></ul>
<div><br></br></div>
<ul><li>Design for inclusivity and
accessibility, accessible to diverse groups</li></ul>
<div><br></br></div>
<ul><li>Avoid bias and ensure
fairness</li></ul>
<div><br></br></div>
<ul><li>Uphold ethical standards
throughout development, promoting trust</li></ul>
What is regulated data handling in Australian Privacy Principles?
<div><span>Regulated Data Handling:</span></div>
<ul>
<li>Enforcing strict guidelines
on how personal information is collected, used, disclosed</li></ul>
What is transparency and accountability in Australian Privacy Principles?
<div> <span>Transparency and Accountability:</span></div>
<ul>
<li>Ensures clear communication
about data practices, holding organisations accountable</li></ul>
What is individual rights in Australian Privacy Principles?
<div><span>Individual Rights:</span></div>
<ul>
<li>Grants individuals the right
to access, correct, and manage their personal information</li></ul>
What is security & breach notifications in Australian Privacy Principles?
<div><span>Security & Breach
Notifications:</span></div>
<ul>
<li>Mandate robust data security
measures and prompt notification in the event of a breach</li></ul>
What is copyright?
<ul>
<li>Laws that protect creators'
rights over their original works</li>
</ul>
<div> </div>
<ul>
<li>Fair use, digital rights
management (DRM) and copyright infringement uphold creators' rights</li>
</ul>
<div> </div>
<ul>
<li>E.g. Software piracy and its
legal consequences</li></ul>
What is code of conduct and its key considerations?
<ul>
<li>Guidelines that govern
professional behaviour in the tech industry</li>
</ul>
<div> </div>
<div><span>Key Considerations:</span></div>
<ul>
<li>Maintaining ethical standards
in workplaces</li>
</ul>
<div> </div>
<ul>
<li>Addressing harassment,
discrimination, misconduct</li>
</ul>
<div> </div>
<ul>
<li>Encouraging transparency and
accountability</li></ul>
What is software piracy?
Unauthorised use or reproduction of copyrighted software
What is cyber safety and responsible digital citizenship?
<ul>
<li><span>Cyber
Safety: </span>Measures
to protect users and systems from digital threats</li>
</ul>
<div> </div>
<ul>
<li><span>Responsible
Digital Citizenship:</span> Ethical behaviour online to protect personal and public interests</li></ul>