1/16
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What are the eight principles of the Data Protection Act 2018?
Data must be accurate and up-to-date
Data must be processed fairly and lawfully
Data must be adequate, relevant and not excessive
Data must not be retained for longer than necessary
Data can only be used for the purpose it was collected
Data must be kept secure
Data must only be stored within the physical boundaries of the UK
Data controllers must be able to prove that their data protection measures are sufficient
Who is the data subject and what are their rights?
The individual about whom personal data is stored. Rights/responsibilities
Freedom information request - view data held about you
Make a complaint/ raise concern to the information Commissioner
Getting copies of your data
Be compensated in the case of a data breach
Get your data corrected
Who is the data controller and what are their responsibilities?
This is the person in a company or organisation who is responsible to ensure the DPA is adhered to.
They must:
Register with the ICO
Pay a fee
Specify security procedures for your data
Must train your staff on DPA measure e.g. Not saving confidential data on removable drives, using BCC instead of TO, deleting old data
Who is the Information Commissioner and what are their responsibilities?
Appointed by the Government to oversee the implementation of the Act.
Responsibilities:
Serving prosecutions on organisations that breach the Act
Investigating complaints from data subjects
Maintaining the register of all data controllers
An accountant’s practice was found to have thrown old customer records from 2005 in waste bins outside their offices. Which principle(s) of the Act may have been broken?
Data should not be kept for longer than necessary
Data should be kept secure
What are the three main principles of the Computer Misuse Act 1990?
Unauthorised access to a computer material
Unauthorised access with intent to commit or facilitate a crime
Unauthorised modification of computer material
Give examples of the types of activities which are illegal under the Copyright Designs and Patents Act 1988:
Using proprietary software without paying for the appropriate license
Copying proprietary software without paying for the appropriate license
Distributing proprietary software without paying for the appropriate license (PIRACY)
E.g. Copying a game/software CD
E.g. Sharing login credentials for proprietary software
Lauren is a Computer Science teacher. She is building a website for her Computing class where they can share ideas, send each other programs and discuss computing concepts. The students will have
individual accounts that they can log into.
Discuss the ethical and legal issues Lauren will have to consider when setting up the website.
Points may include:
Legal:
Data Protection Act
Rules of DPA:
Students data should be removed when the students have left
Students should give permission for their personal data to be used
Data should not be used for any other purpose other than the website
Methods of restricting access
Rules of the Copyright Designs & Patents Act:
They must not send copies of proprietary software
They must not share license keys or log on credentials of proprietary software
Ethical:
Dealing with issues such as abuse or cyberbullying
Plagiarism
Communication of inappropriate materials for students/school/teacher
Backing up to preserve/save data
Gaining parental consent for communication online
E-safety
Acceptable use policy
Describe the key features of Open Source Software:
Source code is openly available for everyone
Software can be modified and redistributed
Developed through online collaboration/communities
Usually free
Can be installed on any number of devices
Describe the key features of Proprietary Software:
Source code is not available
Software cannot be modified and redistributed
Developed by a software provider business
You must purchase correct type of license
Can be installed on any number of devices dictated by the license
Carry out a comparison of Open Source and Proprietary Software:
Open Source vs Proprietary | ||
Criteria | Open Source | Proprietary |
Source Code | Openly available | Not available |
Distribution/Modification Of Software | Freely distributed any amount of times | Cannot be distributed or modified |
Licenses | No charge for the license | Must purchase the correct type of license |
Cost | Usually free | Cost of the license which depends on the type of software |
Support | Community based help | More reliable as it comes direct from the organisation |
Developers | Multiple developers from the community through collaboration | A company by paid employees |
Updates | Less predictable, depends on the community of developers and their pace of work | Commercial organisation must provide regular updates to ensure the software continues to sell well. |
Explain the Environmental Considerations of using computers:
Computers and Waste:
Incorrect disposal of computing equipment leads to the release of harmful materials into the environment e.g. Mercury, Dioxins
Computer devices should be recycled correctly to allow reuse of precious metals e.g. Lead and Nickel in phones
Working from home/pollution:
Less pollution from cars and public transport
Heating and lighting, electricity usage
Online meetings e.g. Zoom, Teams saves on long range travel e.g. air travel
Fossil Fuels:
Electricity production to supply data centres
Use of fossil fuels in the computer production process
Explain the Cultural Considerations of using computers:
This refers to the impact of computers on the daily lives, behaviours and values
General Issues:
Digital divide - unequal access to technology due to the country, location or wealth
Censorship - Some countries or cultures restrict access to online material (e.g. for political reasons)
Software tends to be “westernised”, programming languages written in English
Pace of technological change affects:
How we socialise (social media)
Physical exercise
Working from home - not helping communication/ interpersonal skills
AI - is it making us lazier/ less creative
A shopping centre has a security system that includes CCTV cameras to record activities in the centre. The security system is being upgraded to include the use of facial recognition to identify, track the movements of and record individuals throughout the shopping centre.
Discuss the positive and negative impacts of this upgrade including:
• ethical issues
• privacy issues
• legal issues
Legal
In cases of legal issues or crimes inside the building such as theft or assault. CCTV is good to determine what actually happened and by who
Data should not be held for longer than necessary and kept secure
The CCTV footage must be used for only what it’s intended for
Is there bias built into the software regarding different ethnic groups e.g. Highlighting black people as suspicious
Data should be held securely to prevent unauthorised access
Ethical
Is it right to record people without their permission
Users feel safer knowing they are being monitored and action will be taken if needed
Users feel unsafe as they are being watched
If they haven't done anything there is no reason for them to be tracked and recorded
Privacy
Users may not know the system that exists
User may feel it is an invasion of privacy
Users are in a public place and could be recorded by anyone anyways
Users may feel like they are being watched all the time
Users must allow their permission to be tracked
Users may not know the system exists
Describe the cultural impacts of the company bringing out new devices twice a year:
people may feel their devices are out-of-date
increased cost
social pressure to keep up-to-date
increase digital divide
more secondhand become available for people who cannot afford new technology
Increase employment where the devices are being built
Discuss the general impacts of digital technology on employment:
Impact on employers Advantages:
Disadvantages:
| Impact on employees Advantages:
Disadvantages:
|
For more examples see the booklet: https://docs.google.com/document/d/1l6jK9hIiw0j-hxsKa7byyDSLyPigMX9zcQAqjtyB-mw/edit?tab=t.0
Boom Shakalaka