Ethical, legal, privacy and data security Flashcards
5
Ethical definition
It’s about knowing what’s right and wrong and choosing to do what’s right, even when it’s hard.
Ethical issues in IT
Privacy: Collecting personal data without consent, or sharing it without permission, violates people’s privacy rights.
Security: Failing to protect sensitive information from hackers or other threats can lead to data breaches and harm to individuals.
Accessibility: Not ensuring that technology is accessible to everyone, regardless of disabilities or socioeconomic status, can lead to exclusion and unfairness.
Workplace Issues: Monitoring employees’ digital activities excessively or without their knowledge can violate their privacy and trust.
BCS Code of conduct
The BCS Code of Conduct is like a guidebook for IT professionals. It lays out the rules and principles they should follow to do their job ethically and responsibly.
Legal issues
Computer crime(Computer Misuses Act 1990)
Protecting personal data
(Data Protection Act (1998, 2018),
GDPR)
Computer Crime and abuse
Theft
Hacking
Spamming
Denial of service attack
Sniffing
Identify theft
Theft definition
Theft is taking something that doesn’t belong to you without permission.
Hacking
Hacking is like breaking into a digital lock without permission.
Spamming
Spamming is like sending lots of unwanted messages to people, usually through email or social media.
Denial of service
It’s when someone floods a website or online service with so much traffic that it becomes overwhelmed and can’t work properly for legitimate users.
Sniffing
In the digital world, it’s when someone intercepts and eavesdrops on data being sent between computers or devices over a network, like spying on private information being transmitted over Wi-Fi.
Identify theft
Identity theft is like someone pretending to be you, using your personal information without permission.
Computer Misuse Act 1990
The Computer Misuse Act 1990 is a law in the UK that makes it illegal to misuse computers and related technology.
The Act helps protect against hacking, unauthorized access, and other cybercrimes.
Section 1 is the basic offence of hacking (including failed attempts).
Section 2 comes in when the hacking leads to another offence (e.g. theft).
Section 3 covers the use viruses, worms; also phishing and DoS.
Privacy
Privacy refers to the protection of sensitive information stored within the database.
Privacy is the ability of an individual/group to stop data or information about
themselves from becoming known to people other than those whom they
choose to give access
Data protection Act
The Data Protection Act 1998 was a UK law that aimed to protect individuals’ personal data stored by organizations.
Data Protection Act (1998)
8 key principles:
- Personal data should be processed fairly and lawfully and only if necessary
- Personal data shall be obtained for one or more specified purposes, and not
processed further for other purposes - Personal data should be adequate, relevant and not excessive
- Personal data should be accurate and kept up to date
- Personal data should not be kept for longer than is necessary for the original
purpose - Personal data shall be processed in accordance with the rights of data subjects
under this Act - Appropriate technical and organisational measures shall be taken against
unlawful processing, accidental loss, destruction or damage of personal data - Personal data should not be transferred to a country outside of the EU unless
they ensure an adequate level of protection for the rights and freedoms of
data subjects in relation to the processing of personal data