Cheatography
https://cheatography.com
Personal DataPersonal Privacy | Data is being collected regardless of whether we consented | Data Security | It could be dangerous if the data that has been collected is used maliciously by unauthorized users. | Misuse of Data | Data is frequently sold to other organizations for other uses. | Big Brother | Privacy is a basic human right that excessive surveillance can violate. | Profiling | Large organizations may build up data on an individual regardless of whether they consent to it or even use the service. |
Data Protection ActAny organization which stores personal data must register with the Information Commissioner. | Data must be: | 1. Lawfully processed | 2. Processed for limited purposes | 3. Not excessive | 4. Accurate | 5. Not kept longer than necessary | 6. Not in violation of the user's rights | 7. Held securely | 8. Not transferred outside the EU unless the country has adequate data protection laws. |
Freedom of Information ActThis gives individuals the right to request certain types of data from government entities such as hospitals, police or schools. |
Copyright, Designs and Patents ActThis gives creators more control over how their creations are used in terms of copying or adapting them without permission. |
| | BCS Code of ConductThe BCS Code of Conduct is a code of ethics that individuals and organizations should follow. Breaches of this code may make it difficult for the person to find work or keep their job. Being a member of the British Computer Society involves following this code. 1. Act in the public interest. 2. Have a duty to the organization they work for. 3. Have a duty to the profession. 4. Maintain professional integrity. |
Legal Acts1. Data Protection Act | 2. Computer Misuse Act | 3. Freedom of Information Act | 4. Regulation of Investigatory Powers Act | 5. Copyright, Designs and Patents Act |
Regulation of Investigatory PowersThis act is not specific to computing, though it does involve itself heavily in technology and the Internet. | This act gives law enforcement the right to intercept communication if they suspect criminal activity. | Also, they are given the right to decipher data by forcing the user to tell them how to decrypt it, i.e divulging a key. |
| | Moral and Social IssuesUnauthorised Access | Hackers may obtain access to a computer system for either ethical or unethical reasons. | Piracy | Some people believe that illegally downloading software is permissible due to its price or the exploitative nature of software companies. | Cyberbullying | The anonymous nature of the Internet may lead to people acting more maliciously than they would offline. | Pornography, Violence and Hatred | There is concern as to what impact these things may have on young people or society in general. | Freedom of Speech | This is the question as to whether people should be allowed to say whatever they want without fear of censorship. | Unemployment | Some people may be replaced by Internet or technological alternatives, such as online banking or automated cash registers. | Acess to the Internet | 15% of the UK population do not have Internet access, which may put them at a great disadvantage in the modern world. |
Computer Misuse ActThis aims to prevent hacking and contains three offences: | 1. Any unauthorized access to computer systems | 2. Unauthorized access with further criminal intent | 3. Unauthorized modification of computer material |
Cultural IssuesExcessive Use of Data We may be too dependent on data. Most decisions made by any organization are based on data analysis. | Invasive Technologies A lot of personal data is collected without our consent. | Over-Reliance on Computers If a computer system fails, consequences can be dire. People may even die in some circumstances, i.e in hospitals. | Over-Reliance on Corporations Giving monolithic entities(Google, Wikipedia) a lot of control over what we view on the Internet can be damaging. | Globalization We may be more influenced by other parts of the world more than ever before. |
|
Created By
https://alexhoratiogamedev.blogspot.com
Metadata
Comments
No comments yet. Add yours below!
Add a Comment
Related Cheat Sheets
More Cheat Sheets by Horatio