LAC2 - Legal and ethical Flashcards

1
Q

2 benefits to organisations of equal access

A

High-speed broadband and connections - wider choice of locations, accessibility features and flexible working - widened the pool of skills

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 benefits to individuals of equal access

A

Social media - enables fast communications, access to information via the web - flexibility of online shopping, media streaming - wide range of entertainment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 benefits to society of equal access

A

Promote equality and fairness - wider number of people to work in flexible ways, equal access to technology - supports less developed parts of the country

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Legal requirement for equal access

A

Employees are required to make ‘reasonable adjustments’ to enable an employee to carry out their work tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3 professional guidelines

A

ISO 27000 - internationally recognised to keep data secure, netiquette (internet etiquette), use of plain English in all communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

4 principles of accessibility

A

Perceivable - content must be presented in more than one way, operable - must be able to navigate, understandable - language should be clear and easy to understand, robust - display and work on whatever device is being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

2 advantages of net neutrality

A

All internet traffic is treated the same - encourages innovation, promotes a fair, balanced web - good for individual users and start-up companies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2 disadvantages of net neutrality

A

Prevents ISPs exploiting a potential competitive advantage, stops ISPs profiting from setting up internet fast lanes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

7 aspects of acceptable use policies

A

Scope, assets, acceptable, unacceptable, monitoring, sanctions, agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What assets does the acceptable use policy cover?

A

Hardware, software, data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is monitored in an acceptable use policy?

A

Methods used to block unacceptable behaviour:

web filters, CCTV, telephone records, computer audit trails, email filters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

4 advantages of social media for business purposes

A

Allow organisations to target paid for adverts at users, provides data to organisations on the effectiveness of their posts, pay bloggers or vloggers to review their products, low-cost direct channel to customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

2 disadvantages of social media for business purposes

A

Cost business time and money, customers may make negative comments about the business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

5 principles in the Data Protection Act

A

Lawful processing, collected only for specific purpose, only needed information is collected, should be accurate, kept only as long as necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

7 data subject rights

A

Object to how your data is processed, informed about how your data is being used, access your personal data, have inaccurate data corrected, have data erased, stop or restrict the processing of your data, have data portability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3 methods of protecting/identifying intellectual property

A

Trademark - protects brands from other people using them, patents - prevent others from making a copy of an invention for a limited time, copyright - protects literary, dramatic, musical, artistic, photographic work from being copied or performed without permission

17
Q

4 unlawful use of computer systems

A

Unauthorised access, unauthorised modification of materials, creation of malware, intentional spreading of malware