Cheatography
https://cheatography.com
Personal Data
Personal Privacy |
Data is being collected regardless of whether we consented |
Data Security |
It could be dangerous if the data that has been collected is used maliciously by unauthorized users. |
Misuse of Data |
Data is frequently sold to other organizations for other uses. |
Big Brother |
Privacy is a basic human right that excessive surveillance can violate. |
Profiling |
Large organizations may build up data on an individual regardless of whether they consent to it or even use the service. |
Data Protection Act
Any organization which stores personal data must register with the Information Commissioner. |
Data must be: |
1. Lawfully processed |
2. Processed for limited purposes |
3. Not excessive |
4. Accurate |
5. Not kept longer than necessary |
6. Not in violation of the user's rights |
7. Held securely |
8. Not transferred outside the EU unless the country has adequate data protection laws. |
Freedom of Information Act
This gives individuals the right to request certain types of data from government entities such as hospitals, police or schools. |
Copyright, Designs and Patents Act
This gives creators more control over how their creations are used in terms of copying or adapting them without permission. |
|
|
BCS Code of Conduct
The BCS Code of Conduct is a code of ethics that individuals and organizations should follow. Breaches of this code may make it difficult for the person to find work or keep their job. Being a member of the British Computer Society involves following this code. 1. Act in the public interest. 2. Have a duty to the organization they work for. 3. Have a duty to the profession. 4. Maintain professional integrity.
|
Legal Acts
1. Data Protection Act |
2. Computer Misuse Act |
3. Freedom of Information Act |
4. Regulation of Investigatory Powers Act |
5. Copyright, Designs and Patents Act |
Regulation of Investigatory Powers
This act is not specific to computing, though it does involve itself heavily in technology and the Internet. |
This act gives law enforcement the right to intercept communication if they suspect criminal activity. |
Also, they are given the right to decipher data by forcing the user to tell them how to decrypt it, i.e divulging a key. |
|
|
Moral and Social Issues
Unauthorised Access |
Hackers may obtain access to a computer system for either ethical or unethical reasons. |
Piracy |
Some people believe that illegally downloading software is permissible due to its price or the exploitative nature of software companies. |
Cyberbullying |
The anonymous nature of the Internet may lead to people acting more maliciously than they would offline. |
Pornography, Violence and Hatred |
There is concern as to what impact these things may have on young people or society in general. |
Freedom of Speech |
This is the question as to whether people should be allowed to say whatever they want without fear of censorship. |
Unemployment |
Some people may be replaced by Internet or technological alternatives, such as online banking or automated cash registers. |
Acess to the Internet |
15% of the UK population do not have Internet access, which may put them at a great disadvantage in the modern world. |
Computer Misuse Act
This aims to prevent hacking and contains three offences: |
1. Any unauthorized access to computer systems |
2. Unauthorized access with further criminal intent |
3. Unauthorized modification of computer material |
Cultural Issues
Excessive Use of Data We may be too dependent on data. Most decisions made by any organization are based on data analysis.
|
Invasive Technologies A lot of personal data is collected without our consent.
|
Over-Reliance on Computers If a computer system fails, consequences can be dire. People may even die in some circumstances, i.e in hospitals.
|
Over-Reliance on Corporations Giving monolithic entities(Google, Wikipedia) a lot of control over what we view on the Internet can be damaging.
|
Globalization We may be more influenced by other parts of the world more than ever before.
|
|
Created By
https://alexhoratiogamedev.blogspot.com
Metadata
Comments
No comments yet. Add yours below!
Add a Comment
Related Cheat Sheets
More Cheat Sheets by Horatio