THE ISSUES Flashcards
Cybersecurity
Government cyber security may actually weaken own privacy if it grants govt access to personal data
Company may be held liable if it doesn’t protect data from unauthorised access - sued
Mobile technologies
Amount your phone knows about you is already a breach of privacy
Constant replacement of mobile phones and batteries has negative impact on environment
Wireless networking
Easier access for unauthorised Tesoro than wired network
Better for environment as less cabling
Privacy can be breached
Cloud storage
Others may gain access to data when stored remotely
Providers must adhere to Data Protection Act
Fewer, more centralised data stores are better for environment as they reduce transport costs associated with distribution
Theft of computer code / copyright of algorithms
Stealing code - ethically unsound
Gain advantage over others’ work
Cracking
Ethically unsound as you are getting software which others pay money for
Privacy breach
Hacking
Unauthorised access potentially breaches people’s privacy
Breaches CM act and DP act
Hacking often leads to additional crimes like stalking / breach of copyright
Wearable technologies / Computer based implants
Wearable technologies same as mobile technologies
Implants - addition complication of replacement
May be potential major breach of privacy e.g. Contains biometric data / data about illnesses.