Ethical, legal, privacy and data security Flashcards

5

1
Q

Ethical definition

A

It’s about knowing what’s right and wrong and choosing to do what’s right, even when it’s hard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ethical issues in IT

A

Privacy: Collecting personal data without consent, or sharing it without permission, violates people’s privacy rights.
Security: Failing to protect sensitive information from hackers or other threats can lead to data breaches and harm to individuals.
Accessibility: Not ensuring that technology is accessible to everyone, regardless of disabilities or socioeconomic status, can lead to exclusion and unfairness.
Workplace Issues: Monitoring employees’ digital activities excessively or without their knowledge can violate their privacy and trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

BCS Code of conduct

A

The BCS Code of Conduct is like a guidebook for IT professionals. It lays out the rules and principles they should follow to do their job ethically and responsibly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Legal issues

A

Computer crime(Computer Misuses Act 1990)
Protecting personal data
(Data Protection Act (1998, 2018),
GDPR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Computer Crime and abuse

A

Theft
Hacking
Spamming
Denial of service attack
Sniffing
Identify theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Theft definition

A

Theft is taking something that doesn’t belong to you without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hacking

A

Hacking is like breaking into a digital lock without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spamming

A

Spamming is like sending lots of unwanted messages to people, usually through email or social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Denial of service

A

It’s when someone floods a website or online service with so much traffic that it becomes overwhelmed and can’t work properly for legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Sniffing

A

In the digital world, it’s when someone intercepts and eavesdrops on data being sent between computers or devices over a network, like spying on private information being transmitted over Wi-Fi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identify theft

A

Identity theft is like someone pretending to be you, using your personal information without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Computer Misuse Act 1990

A

The Computer Misuse Act 1990 is a law in the UK that makes it illegal to misuse computers and related technology.
The Act helps protect against hacking, unauthorized access, and other cybercrimes.
Section 1 is the basic offence of hacking (including failed attempts).
Section 2 comes in when the hacking leads to another offence (e.g. theft).
Section 3 covers the use viruses, worms; also phishing and DoS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Privacy

A

Privacy refers to the protection of sensitive information stored within the database.
Privacy is the ability of an individual/group to stop data or information about
themselves from becoming known to people other than those whom they
choose to give access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data protection Act

A

The Data Protection Act 1998 was a UK law that aimed to protect individuals’ personal data stored by organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Protection Act (1998)
8 key principles:

A
  1. Personal data should be processed fairly and lawfully and only if necessary
  2. Personal data shall be obtained for one or more specified purposes, and not
    processed further for other purposes
  3. Personal data should be adequate, relevant and not excessive
  4. Personal data should be accurate and kept up to date
  5. Personal data should not be kept for longer than is necessary for the original
    purpose
  6. Personal data shall be processed in accordance with the rights of data subjects
    under this Act
  7. Appropriate technical and organisational measures shall be taken against
    unlawful processing, accidental loss, destruction or damage of personal data
  8. Personal data should not be transferred to a country outside of the EU unless
    they ensure an adequate level of protection for the rights and freedoms of
    data subjects in relation to the processing of personal data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Data Protection (2018)

A

The Data Protection Act 2018 is a UK law that governs how personal data is handled.

17
Q

The Data Protection Act (2018) 6 key principles:

A

1.)Requirement that processing be lawful, fair and transparent.
2.)Requirement that the purposes of processing be specified, explicit and
legitimate.
3.)Requirement that personal data be adequate, relevant and not excessive.
4.)Requirement that personal data be accurate and kept up to date
5.)Requirement that personal data be kept for no longer than is necessary
6.)Requirement that personal data be processed in a secure manner.

18
Q

General Data Protection Regulation

A

It’s a law that makes sure companies and organizations handle your data responsibly and keep it safe.
The EU General Data Protection Regulation (GDPR) has now come to replace
the for Data Protection Directive 95/46/EC. It was created to:
* Harmonise data privacy laws Europe wide,
* Effectively empower all EU citizens data privacy
* Remodel the way organisations in the region approach data privacy.

19
Q

Consent

A

It’s when you agree to something, like sharing your information or participating in an activity, with full understanding of what you’re agreeing to.

20
Q

Individual rights

A

1.)The right to be informed
2.) The right of access
3.)The right to rectification
4.)The right to erasure
5.)The right to restrict processing
6.)The right to data portability
7.)The right to object
8.)Rights in relation to automated decision making and profiling.

21
Q

Data security

A

Security can be breached in different ways:
-Theft and fraud.
-Loss of integrity – damage or loss of data.
-Loss of confidentiality – rights of organisation to secrecy.
-Loss of privacy – rights of control over personal data.
-Loss of availability – system down-time.
-A security breach can be catastrophic to an organisation leading to:
-Lost revenue
-Unexpected repair costs
-Damaged reputation
-Legal liability
-Loss of IP / competitive advantage

22
Q

Threats to security

A

Hardware
Users
Programmers/operators
Communication networks
Database

23
Q

Reducing security risks

A

Authorisation
Backup and recovery
Encryption
Redundant Array of Inexpensive Disks
Firewalls

24
Q

Legal Issues

A

Intellectual property
Copy rights
Patents

25
Q

Intellectual property

A

It’s a set of rules that protect things you invent, write, or design so that others can’t copy or use them without your permission.

26
Q

Copyright

A

It’s a legal right that protects your original works, like books, music, or art, from being copied or used by others without your permission.

27
Q

Patents

A

They’re a legal protection that gives you exclusive rights to your new and useful inventions for a certain period of time.

28
Q

IPR issues for software

A

4 main types of license:
Commercial(Perpetual use)
Commercial(annual use)
Shareware
Freeware

Patentability
Copyright

29
Q

IPR issues for data

A

There is a lucrative market for customer transaction
histories.
So long as no data protection issues sharing limited data
may be a valuable revenue stream.
Need to treat as IP and protect with appropriate license
terms

30
Q
A