Ethical, legal and environmental impacts of digital technology on wider society, including issues of privacy

0.0(0)
studied byStudied by 2 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/102

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

103 Terms

1
New cards

What is meant by the ethical impact of digital technology?

The moral principles guiding how technology should be used

2
New cards

Give an example of an ethical issue with technology.

Use of AI for surveillance, bias in algorithms

3
New cards

What is a legal impact of digital technology?

Effect of law on use, development, and distribution of technology

4
New cards

Name a legal law on digital technology in the UK.

Data Protection Act (DPA), Computer Misuse Act (CMA), Copyright, Designs and Patents Act (CDPA), GDPR

5
New cards

What is the Data Protection Act (DPA)?

UK law controlling how personal data is collected, stored, and used

6
New cards

What is the Computer Misuse Act?

Law against unauthorised access to digital information (hacking)

7
New cards

What does the Copyright, Designs and Patents Act protect?

Intellectual property rights of creators of original content

8
New cards

What is the environmental impact of digital technology?

How technology manufacturing, use, and disposal affects nature

9
New cards

List one environmental issue caused by computers.

E-waste, energy usage, CO₂ emissions

10
New cards

What is e-waste?

Electronic waste from discarded digital devices

11
New cards

Why is e-waste a problem?

Contains toxic materials; difficult to recycle safely

12
New cards

How can technology impact privacy?

Personal data may be collected, stored, shared, or hacked

13
New cards

What is surveillance?

Monitoring of behaviour, activities, or information for security

14
New cards

Give an ethical concern about surveillance.

Invasion of privacy, misuse of personal data

15
New cards

What is digital divide?

The gap between those with and without access to digital technology

16
New cards

How can the digital divide affect society?

Causes inequality in education, opportunities, access to services

17
New cards

What is cyberbullying?

Harassing, threatening, or bullying others via digital communication

18
New cards

How can companies reduce environmental impact?

Use renewable energy, recycle, design for efficiency

19
New cards

How do laws protect intellectual property rights?

Prevent unauthorised copying or use of software, digital media

20
New cards

What is GDPR?

General Data Protection Regulation—EU law for the protection of personal data

21
New cards

Give a principle of GDPR.

Data must be collected lawfully, used fairly, kept secure, and not kept longer than needed

22
New cards

What is meant by the term 'data breach'?

Unauthorized access/exposure of personal or sensitive data

23
New cards

What should companies do after a data breach?

Notify affected people, inform authorities, fix vulnerabilities

24
New cards

Why is personal data valuable?

Can be used for targeted marketing, identity theft, fraud

25
New cards

How can users protect their privacy online?

Use strong passwords, privacy settings, limit sharing, encryption

26
New cards

What is social engineering?

Tricking people into giving away confidential information

27
New cards

Name a method of social engineering.

Phishing, pretexting, baiting

28
New cards

What is software piracy?

Illegal copying or use of software

29
New cards

Why is software piracy a problem?

Loss of revenue for creators, potential malware

30
New cards

What is open-source software?

Software with source code available for anyone to view, modify, and distribute

31
New cards

What is proprietary software?

Software that is owned, restricts access to its source code, usually sold for profit

32
New cards

Give an advantage of open-source software.

Free to use, adaptable, can be improved by community

33
New cards

Give an advantage of proprietary software.

Reliable support, frequent updates, secure funding for development

34
New cards

How does technology affect employment?

May automate jobs, but create new roles and opportunities

35
New cards

What is an algorithmic bias?

When a computer system's outcomes are prejudiced due to flawed data or design

36
New cards

Why must companies consider accessibility?

To ensure technology is usable by people with disabilities, comply with the law

37
New cards

Give an example of technology improving the environment.

Efficient transport, energy-saving appliances, smart grids

38
New cards

Give an example of technology harming the environment.

Increased e-waste, higher energy consumption, mining for rare metals

39
New cards

How can users reduce their technology footprint?

Recycling devices, limiting upgrades, using energy-efficient products

40
New cards

What is net neutrality?

Principle that Internet service providers must treat all data equally

41
New cards

Why is net neutrality important?

Prevents blocking/throttling of content, ensures fair access online

42
New cards

What is cybercrime?

Criminal offenses involving computers/networks (e.g., hacking, fraud)

43
New cards

How does digital technology impact freedom of expression?

Enables wider sharing of ideas, but may be restricted/monitored

44
New cards

What is the right to be forgotten?

Legal right to have personal data deleted from websites, search engines

45
New cards

What are cookies (digital)?

Small files stored by websites to track, remember info about users

46
New cards

What is the main concern with cookies?

Can be used to monitor browsing habits without consent

47
New cards

How do digital technologies impact health?

Screen time, eye strain, mental health issues, ergonomics

48
New cards

What is digital addiction?

Excessive, compulsive use of digital devices or platforms

49
New cards

What is the ethical issue with deepfakes?

Can be used for misinformation, impersonation, blackmail

50
New cards

What is green computing?

Designing, manufacturing, using, and disposing of computers in an environmentally friendly way

51
New cards

How do backup systems reduce risk of data loss?

Allow recovery after hardware failure, cyber attack, or error

52
New cards

What is fair use?

Legal doctrine allowing limited use of copyrighted material without permission

53
New cards

What constitutes copyright infringement?

Unauthorised copying, sharing, or modification of copyrighted works

54
New cards

How does CCTV impact society?

Improves security, but raises concerns about privacy and mass surveillance

55
New cards

What is whistleblowing?

Reporting illegal or unethical behaviour within an organisation

56
New cards

What is a digital footprint?

The data trail left by a user's online activity

57
New cards

Why is managing your digital footprint important?

Impacts privacy, reputation, and future opportunities

58
New cards

What is ethical hacking?

Hacking with permission to find and fix security risks

59
New cards

Give an example of responsible disclosure.

Informing a company privately about a bug/security flaw

60
New cards

What is malware?

Malicious software designed to harm, disrupt, or steal data

61
New cards

Give two types of malware.

Virus, worm, Trojan, ransomware, spyware

62
New cards

How does encryption support data security?

Makes information unreadable without a decryption key

63
New cards

Why are strong passwords important?

Reduce likelihood of unauthorised access

64
New cards

What are computer ethics?

The study of moral issues related to computing technology use

65
New cards

Give a legal requirement for collecting personal data.

Obtaining consent, explaining use, storing it securely

66
New cards

What is an environmental concern of cloud computing?

Large data centers require lots of power/cooling

67
New cards

Name a technology that helps the environment.

Smart thermostats, electric vehicles, remote sensors

68
New cards

What is the Digital Economy Act?

UK law regulating online copyright, age verification, data access

69
New cards

What is VPN?

Virtual Private Network; encrypts Internet traffic for privacy/security

70
New cards

Why should companies have a privacy policy?

To meet legal obligations and inform users how data is used/stored

71
New cards

What is two-factor authentication?

Requires two types of evidence (password + code/device) to prove identity

72
New cards

What is censorship?

Blocking/restricting access to certain information/products

73
New cards

What are the dangers of sharing too much on social media?

Fraud, identity theft, unwanted attention, loss of privacy

74
New cards

How does the law treat cyberbullying?

May be prosecuted under harassment, communications, or stalking laws

75
New cards

What are the consequences of digital exclusion?

Limited access to jobs, services, education, social isolation

76
New cards

How can technology support inclusion?

Assistive technologies, affordable access programs, digital literacy training

77
New cards

How does big data affect society?

Enables advanced analytics but raises privacy/ethical risks

78
New cards

What is clickbait?

Content designed to attract clicks, often misleading or sensational

79
New cards

Why must companies notify users of privacy policy changes?

Legal requirement, informs users, maintains trust

80
New cards

How do data brokers use personal data?

Buy/sell information used for marketing, or risk profiling

81
New cards

What is online radicalisation?

Internet used to encourage extremist views/behaviour

82
New cards

How does the Internet enable activism?

Facilitates organisation, information sharing, raising awareness

83
New cards

What is phishing?

Fraudulent attempt to obtain sensitive info by pretending to be trustworthy source

84
New cards

Why do laws regulate online advertising?

Protect consumers from misleading, harmful or targeted ads for children

85
New cards

What is a digital certificate?

Proves identity of a website, used for secure connections (SSL/HTTPS)

86
New cards

What is the impact of algorithms on job recruitment?

Bias in filtering candidates, lack of transparency

87
New cards

Name a right digital users have under GDPR.

Right to access data, right to erasure, right to rectify data

88
New cards

What is a privacy impact assessment?

Process of evaluating risks to privacy in new projects/systems

89
New cards

Why is recycling electronics important?

Reduces landfill, pollution, and resource extraction

90
New cards

What is DDoS attack?

Distributed denial-of-service: many computers overwhelm a network/resource

91
New cards

What is digital forensics?

Investigation of digital devices for evidence of crime/misuse

92
New cards

Why are age restrictions sometimes used on websites or apps?

To comply with law, protect children from harmful content or data harvest

93
New cards

What is meant by digital cultural impact?

Effects of technology on communication, sharing, values, creativity

94
New cards

What is sexting and why is it a legal concern?

Sending sexual images via digital devices—may be illegal if underage or without consent

95
New cards

State a legal reason to monitor employees' digital activities.

Prevent data leaks, monitor performance, legal compliance

96
New cards

What is meant by privacy by design?

Systems built with privacy and security as a key principle from the start

97
New cards

Why is algorithm transparency important?

Users need to understand how decisions are made, prevents unfairness

98
New cards

Why are electronic records preferred in the NHS?

Faster access, easier sharing, less paper, but must protect patient privacy

99
New cards

What is the "Internet of Things" (IoT)?

Network of connected physical devices exchanging data

100
New cards

How can the IoT raise ethical or privacy issues?

Data collection/storage by many devices, often without clear consent