HNC Computing - Professionalism & Ethics

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/10

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:08 PM on 4/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

11 Terms

1
New cards

Laws: Computer Misuse Act

Proper title: Computer Misuse Act 1990

What it covers:

  • Criminalises unauthorised access to computer systems (hacking)

  • Covers unauthorised modification (e.g. malware, viruses)

  • Includes offences like DDoS attacks and creating hacking tools

Application to computing:

  • Core cybercrime law for IT professionals

  • Ethical hacking/penetration testing must have permission

  • Organisations must secure systems to prevent breaches

2
New cards

Laws: Copyright, Designs and Patent Act

Proper title: Copyright, Designs and Patents Act 1988

What it covers:

  • Protects intellectual property (software, code, digital media)

  • Gives creators rights over copying, distribution, and modification

Application to computing:

  • Software piracy is illegal

  • Developers own code unless contracted otherwise

  • Impacts open-source licensing and digital content use

3
New cards

Equality Act

Proper title: Equality Act 2010

What it covers:

  • Protects individuals from discrimination (e.g. race, gender, disability)

  • Requires fair treatment in employment and services

Application to computing:

  • IT workplaces must avoid discrimination

  • Software and websites should be inclusive

  • Links to accessibility requirements (e.g. UI design)

4
New cards

GDPR

Proper title: UK General Data Protection Regulation (UK GDPR) + Data Protection Act 2018

What it covers:

  • Governs how personal data is collected, stored, and processed

  • Gives individuals rights (access, deletion, correction)

  • Requires lawful, fair, and transparent data use

Application to computing:

  • Affects databases, websites, apps, cloud systems

  • Requires encryption, security, and data minimisation

  • Data breaches must be reported

5
New cards

Health & Safety at Work Act

Proper title: Health and Safety at Work etc. Act 1974

What it covers:

  • Ensures safety of employees in the workplace

Application to computing:

  • Covers workstation ergonomics (RSI, screen use)

  • Safe server rooms, electrical equipment

  • Risk assessments for IT environments

6
New cards

Freedom of Information Act

Proper title: Freedom of Information Act 2000

What it covers:

  • Gives public access to information held by public bodies

Application to computing:

  • Public sector IT systems must store retrievable data

  • Data management systems must support information requests

  • Requires proper data organisation and security

7
New cards

Disability Discrimination Act

Proper title: Disability Discrimination Act 1995 (largely replaced by Equality Act 2010)

What it covers:

  • Prevented discrimination against disabled people

Application to computing:

  • Basis for accessibility standards (now under Equality Act)

  • Influences screen readers, captions, accessible UI design

8
New cards

Consumer Protection Act

Proper title: Consumer Protection Act 1987

What it covers:

  • Protects consumers from unsafe or defective products

Application to computing:

  • Hardware/software must be safe and reliable

  • Faulty software causing damage could lead to liability

  • Applies to apps, devices, and digital products

9
New cards

WEEE

Proper title: Waste Electrical and Electronic Equipment (WEEE) Regulations 2013

What it covers:

  • Governs disposal and recycling of electronic waste

Application to computing:

  • IT companies must recycle old hardware properly

  • Impacts disposal of PCs, servers, peripherals

  • Encourages environmentally responsible computing

10
New cards

Regulation of Investigatory Powers Act

Proper title: Regulation of Investigatory Powers Act 2000 (RIPA)

What it covers:

  • Regulates surveillance, interception of communications

Application to computing:

  • Impacts network monitoring and data interception

  • Employers must follow rules when monitoring employees

  • Relevant to cybersecurity and law enforcement

11
New cards

Telecommunications Regulations Act 2000

Proper title: Telecommunications (Lawful Business Practice) (Interception of Communications) Regulations 2000

What it covers:

  • Allows limited interception of communications for business purposes

Application to computing:

  • Employers can monitor emails/internet use (within limits)

  • Requires transparency and legitimate purpose

  • Important for IT network administration and security