Law and Ethics Flashcards
positives of computers in the workplace
- more effective communications
- removal of humans in construction processes
shifting skill sets
automated decision making
computers make decisions and take actions based on sets of pre-defined rules and parameters without human involvement
Artificial intelligence
writing software and algorithms which appear to behave as if they were intelligent
Data mining
automated process which looks at large sets of data and tries to identify patterns in order to predict something
censorship
the deliberate supression of material, either in the form of what can be published or what can be accessed
DPA year
1998
CMA year
1990
CDPA year
1988
RIPA year
2000
Data Protection act
sets out requirements for the control or storage of individuals personal data.
In a company the data controller has to control the processing and storage of data based on the data subject.
Data Protection Act parts
Data processed fairly and lawfully
Data should only be collected for specific purposes
Data should be relevant and not excessive
Data should be accurate and up to date
Data should not be kept longer than needed
The user has a right to access and correct data
The organisation must have suitable security
Data can not be transferred outside the UK to any country with no data protection laws
The Computer Misuse Act
makes unauthorized access to computer systems illegal:
The intent to commit or facilitate commission of further offences with intent to impair the operating of a computer
Copy Right Design and Patents Act
protects the intellectual property rights of individuals and organisations. This law makes it illegal to Copy, Modify or Distribute any software or any other intellectual property without permission of the original creator.
The Regulation of Investigatory Powers Act
gives certain bodies the right to monitor communications and internal activity. It was made due to modern threats from criminals and terrorist organizations.
RIPA Grants rights to:
- Demand ISPs provide access to a customer’s surveillance
- Demand ISPs fit equipment to facilitate surveillance
- Demand access be granted to protected information
- Prevent existence of such interception activities being revealed in court