Unit 1.8 Ethical, legal, cultural and environmental concerns

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
Regulation of Personal Information Daniel Pettitt, Leon Sewell and Matthew Pallot.
General Purpose Packages
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection Act AS Module Heathcote Ch. 12.
The Data Protection Act [1998]
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Intellectual Property Basics
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
Laws Jamie Dunn.
Information Systems Unit 3.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Computing, Ethics and The Law
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Let’s Talk about Intellectual Property Copyright Plagiarism Fair Use.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
The Data Protection Act 1998
The Data Protection Act 1998
Learning Intention Legislations impact on security of information
Data Protection GCSE ICT Mrs N Steventon-2005.
Misuses of ICT Malpractice and crime © Folens 2008.
Handling Personal Data
Handout 2: Data Protection and Copyright
Legislation in ICT.
Data Protection Act.
TB2 Lesson 5 Data Protection
The Data Protection Act 1998
Regulation of Investigatory Powers Act 2000
Data Protection Legislation
Lesson 2- Ethical Use of Digital Resources
The Data Protection Act & ICT Law
Ethical, Legal, Cultural and Environmental Concerns
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
Copyright, Designs and Patents Act 1988
Information management and communication
Ethical, Legal, Cultural and Environmental Concerns
Legislation in ICT.
Data Protection.
Communicating in the IT Industry
Presentation transcript:

Unit 1.8 Ethical, legal, cultural and environmental concerns

Thought for the day – Computer Misuse in the news – 8 September 2017 Massive Equifax data breach hits 143 million The firm's core consumer and commercial credit databases were not accessed. About 143 million US customers of credit report giant Equifax may have had information compromised in a cyber security breach, the company has disclosed. Security checks Equifax said hackers accessed the information between mid-May and the end of July, when the company discovered the breach. Equifax said cyber-criminals accessed data such as Social Security numbers, birth dates and addresses during the incident. Malicious hackers won access to its systems by exploiting a "website application vulnerability", it said but provided no further details. Some UK and Canadian customers were also affected. The hackers accessed credit card numbers for about 209,000 consumers, among other information

The Big Picture: Computer Science and Technology Issues legislation relevant to Computer Science: o The Data Protection Act 1998 o Computer Misuse Act 1990 o Copyright Designs and Patents Act 1988 o Creative Commons Licensing o Freedom of Information Act 2000. open source vs proprietary software investigate and discuss Computer Science technologies and the impact and implications of technology, while considering: o ethical issues o cultural issues o environmental issues o privacy issues. how key stakeholders are affected by technologies

In today's lesson: What are we learning today? Why are we learning it? Legal issues in Computing - 5 laws relating to technology and Computer Science Why are we learning it? To understand and be able to describe the implications of these laws on our use of technology How will it help reach your OPT? You need to know the key features of the laws You need to be able to answer shorter answer questions, and probably longer ones too! How long? 2 lessons

Starter: match the definitions behaving in ways considered by most people to be correct and honest Morals and Ethics are slightly different but work along the same ideas It is something that may feel wrong, or be unacceptable – but doesn’t actually break a law in accordance with principles of conduct that are considered correct, especially those of a given profession Moral Ethical

Introduction to the issues There are a number of different issues surrounding technology and these issues can be categorised as ethical, legal, privacy, environmental and cultural. Over the next few weeks, we will explore examples of a range of issues, but it is worth noting that most issues involving technology encompass a mixture of these categories. Discussing what is morally right and morally wrong. Discussing what is right and wrong in the eyes of the law. Discussing how ethic groups, counties, religions affect and are affected by technology Discussing how technology impacts the environment and how environmental issues affect technological progress. Discussing how technology affects the privacy of our data and of our identity.

Ethics / Morals Moral: Ethical: behaving in ways considered by most people to be correct and honest Ethical: in accordance with principles of conduct that are considered correct, especially those of a given profession You will often find that professional bodies have “Code of Ethics” which members must follow.

Moral & Ethical Questions Discuss whether each of these questions would be Ethical or Moral issues, or neither! A company decides to install a range of computer software and hardware that would make most of its workforce unemployed Digging for shale gas (Fracking) to release more energy supplies like they’re doing near Preston The advancement of Artificial Intelligence You notice I’ve got 3 files open on my computer with the newly released NEA tasks on. I’ve gone to make a cup of tea and chat to Mrs Rennie. I’m gone a while….. The use of live animals for testing cosmetics/medicine

Moral & Ethical Questions Answers A company decides to install a range of computer software and hardware that would make most of its workforce unemployed (MORAL) Digging for shale gas (Fracking) to release more energy supplies (MORAL) The advancement of Artificial Intelligence (MORAL/ETHICAL) You notice I’ve got 3 files open on my computer with the newly released NEA tasks on. I’ve gone to make a cup of tea and chat to Mrs Rennie. I’m gone a while….. (MORAL) The use of live animals for testing (MORAL/ETHICAL) Answers As you can see, the cross over in Moral and Ethical is often very similar It can be difficult to decide Key Point: Ethical Issues – usually written down and are linked to organisations

The Law As computers develop and computer use increases people are finding more and more ways to use computers to their advantages but often to the disadvantage of others. More and more laws are being passed concerning computer use and this is due to the rapid way in which this technology develops. There are 5 major laws concerning computers which you must be aware of: Data Protection Act (1998) Computer Misuse Act (1990) Copyright, Design and Patents Act (1988) Creative Commons Licencing Freedom of Information Act (2000)

Data Protection Act (1998) With computers now holding so much personal information about people, companies have to look after this data properly. The law forces companies to have highly secure systems and to only hold onto personal information that a company really needs. DPA was introduced in 1984 and updated in 1998. In order to comply with this law, organisations must first contact the government to say that they will be storing people’s personal information. They must make it clear WHAT information they will be storing and how they will use it. There are in fact 8 principles of the data protection act that organisations must follow: Data must be used in a fair way and lawfully Data must only be used for the purpose it is intended for Data must be relevant – cannot gather more than you need Data must be up-to-date and accurate Data must not be kept for longer than it is needed for The person whom the data is about must able to access the data if they wish Data must be kept safely and secure Data must not be transferred without protection (i.e. encryption)

How to remember the 8 principles R – relevant A – accurate T – time – kept for as long as needed, no longer S – secure T – transferred not outside EU and not without protection R – respect the law when using data A – access to our data if we want to see it P – purpose it was collected for only

Data Protection Act (1998) Rights of data subjects Data subjects can normally see all of the data held about them, with some exceptions, for example if it would affect:- The way crime is detected or prevented Catching or prosecuting offenders Assessing or collecting taxes or duty Demand that data is corrected if incorrect Demand the data not be used in a way that could cause harm or distress Demand data is not used for direct marketing.

Data Protection Act (1998) Exemptions to the Act Exemptions are possible for: Maintenance of a public register; Some not-for-profit organisations; Processing personal data for personal, family or household affairs (including recreational purposes) : If you only process personal data for staff administration  advertising, marketing and public relations accounts and records

Data Protection Act (1998) The Data Protection Commissioner An independent officer appointed by the queen. Reports directly to Parliament. Duties include: Maintaining a register of the names and addresses of all data controllers; Considering complaints from data subjects about data controllers who have not followed the principles of information handling and prosecuting or serving notices on offenders.

Computer Misuse Act (1990) With the internet connecting people, businesses and the world, people can access sensitive data for more easily. The Computer Misuse Act aims to prevent sensitive data getting into the wrong hands and being edited or destroyed. The act has three main laws. You must not: Gain unauthorised access to a network eg looking at someone else's files Modify data on a network without permission - accessing computer material without permission with intent to commit further criminal offences, eg hacking into the bank's computer and wanting to increase the amount in your account Altering computer data without permission - Create and / or supply Malware. , eg writing a virus to destroy someone else's data, or actually changing the money in an account

Copyright, Design and Patents Act (1988) The World Wide Web contains vast quantities of ideas and information in a digital format. It is therefore very easy to copy and share other people’s work, ideas and files. Copyright gives the creators of some types of media rights to control how they're used and distributed. This law makes it illegal to copy and / or share other people’s work and ideas (intellectual property) without acknowledgement and permission. When you buy software, for example, copyright law forbids you from: giving a copy to a friend making a copy and then selling it using the software on a network (unless the licence allows it) renting the software without the permission of the copyright holder The law doesn’t just govern digital work – it also covers written work and people’s ideas too! Music, books, video and software can all be covered by copyright law.

Copyright, Design and Patents Act (1988) When it comes to illegal downloading, it is becoming very difficult to enforce the law due to the number of people who download media without permission. Having said that, a number of torrent hosting sites have been prosecuted and shut down – but then they just host the site again in another country…!? The Federation Against Software Theft (FAST) FAST was founded in 1984 by the software industry and is now supported by over 1,200 companies. It is a not-for-profit organisation with an aim to prevent software piracy and has a policy of prosecuting anyone found to be breaching copyright law. FAST also works to educate the public about good software practice and legal requirements.

Creative Commons Licencing There are times that the owner of some intellectual property would like other people to be able to use, share and edit their work. To enable this to occur without being in breach of copyright law, the owner of some intellectual property can make their work available under the Creative Commons Licence. When they do this they can choose exactly how people can use their work: Attribution – Work can be copied, modified and shared but the owner must be acknowledged Share-alike – If work is modified it can only be shared with the same licence that the original piece of work had Non-Commercial – Cannot re-use the work for own profit No Derivative Works – Can copy and share but cannot modify They can promote their work under one or a mixture of these licences.

Creative Commons Licencing The Creative Commons Licensing give everyone from individual creators like you and me, to large companies and institutions a simple, standardised way to grant copyright permissions to their creative work. This means there is a vast and growing pool of content that can be copied, distributed, edited, remixed, and built upon, all within the boundaries of copyright law. https://creativecommons.org/share-your-work/

Freedom of Information Act (2000) This act allows the public to gain access to ‘public’ information held by public sector organisations (organisations that are funded by the tax payer). For example, the government, schools, police and the NHS must all publish certain information on a regular basis. This is often in the interest of transparency. If you were paying thousands of pounds in tax each year, you would probably like to know what your money has been spent on. The general public can also request certain information, such as the contact details of all schools in England. Information which may cause harm to national security can of course be held back from public view.

Quick Learning Check Match the following: Computer Misuse Act (1990) Data Protection Act (1998) Creative Commons Licencing Freedom of Information Act (2000) Copyright, Design and Patent Act (1988) 1 - “A law which makes it illegal to gain unauthorised access to networks and to create / distribute malware.” 2 - “Allows people to enable their work to be shared, copied and edited without users breaking copyright law.” 3 - “Protects intellectual property, making it illegal for people to copy and share other people’s work.” 4 - “Ensuring that companies that obtain personal information do so appropriately and securely.” 5 - “Enabling the general public to have access to public sector information”

Show your understanding Complete the worksheets on each of the Laws – check the number of marks carefully. Be ready to mark it by the end of the lesson. In Word/PPT/Publisher, makes notes on each of the Laws covering: Name and date of the law What it covers & main details of the law What it makes illegal/legal Exemptions Penalties for breaking it 3 examples you could use in an exam linked to Computing

Unit 1.8 Ethical, legal, cultural and environmental concerns

Thought for the day – Computer Misuse in the news – October 2015 Teenager hacks TalkTalk The company said it did not know how much of their customer information had been encrypted. A 15-year-old boy was been arrested in Northern Ireland in connection with the TalkTalk hacking attack. TalkTalk's chief executive said the attack was "smaller" than originally thought. The boy was arrested on suspicion of Computer Misuse Act offences. Dido Harding said any credit card details taken would have been partial and the information may not have been enough to withdraw money "on its own". TalkTalk, the phone and broadband provider, which has over four million UK customers, said banking details and personal information could had been accessed. Card details accessed were incomplete - with many numbers appearing as an x - and "not usable" for financial transactions, it added.

The Big Picture: Computer Science and Technology Issues legislation relevant to Computer Science: o The Data Protection Act 1998 o Computer Misuse Act 1990 o Copyright Designs and Patents Act 1988 o Creative Commons Licensing o Freedom of Information Act 2000. open source vs proprietary software investigate and discuss Computer Science technologies and the impact and implications of technology, while considering: o ethical issues o cultural issues o environmental issues o privacy issues. how key stakeholders are affected by technologies

In today's lesson: What are we learning today? Why are we learning it? Legal issues in Computing - 5 laws relating to technology and Computer Science Why are we learning it? To understand and be able to describe the implications of these laws on our use of technology How will it help reach your OPT? You need to know the key features of the laws You need to be able to answer shorter answer questions, and probably longer ones too! How long? 2 lessons

Learning Objectives By the end of this week’s 2 theory lessons, you will : Be able to identify 5 laws relating to technology and Computer Science Be able to describe the implications of these laws on our use of technology

Starter Write down 2 points about each law Give an example of the law in use Freedom of Information Act (2000) Data Protection Act (1998) Computer Misuse Act (1990) Creative Commons Licencing Copyright, Design and Patent Act (1988)

Creative Commons Licencing Freedom of Information Act (2000) Computer Misuse Act (1990) Data Protection Act (1998) Creative Commons Licencing Freedom of Information Act (2000) Copyright, Design and Patent Act (1988) 1 - “A law which makes it illegal to gain unauthorised access to networks and to create / distribute malware.” 2 - “Allows people to enable their work to be shared, copied and edited without users breaking copyright law.” 3 - “Protects intellectual property, making it illegal for people to copy and share other people’s work.” 4 - “Ensuring that companies that obtain personal information do so appropriately and securely.” 5 - “Enabling the general public to have access to public sector information”

The Data Protection Act 1998 The Data Protection Act 1998 covers how personal data may be used by companies It covers: what can be collected how long it can be kept for steps to keep it up to date/accurate sending and using the data who can see that data People who collect personal data need to register with the Information Commissioner 8 principles

Fill the gaps

How to remember the 8 principles A – T – S – P –

How to remember the 8 principles R – relevant A – accurate T – time – kept for as long as needed, no longer S – secure T – transferred not outside EU and not without protection R – respect the law when using data A – access to our data if we want to see it P – purpose it was collected for only

Computer Misuse Act (1990) Makes is illegal to use computers to: Access computer systems without proper authorisation Access computer systems with intent to commit a criminal offence Alter data without permission (e.g. through the use of viruses, physical deletion etc.)

Computer Misuse Act (1990) Computer Misuse quiz – http://www.bbc.co.uk/bitesize/quiz/q92093722

Copyright Designs and Patents Act (1988) Protects people’s written, dramatic, musical, film, broadcasts property Makes it an offence to copy or distribute other people’s intellectual property without permission, including software

Copyright or not? Copyright quiz: http://www.bbc.co.uk/bitesize/quiz/q66634025

Which law do these relate to? What do they allow me to do with all the resources I make for school? What does it mean I can do with resources I find online?

Creative Commons Licence Allows people with protected work to allow free distribution of the work They may want to do this to allow say Remixing of their songs It may be an author wants other people to edit and improve their book. They may allow Commercial, or non-Commercial use of their work

Freedom of Information Act 2000 This allows members of the public to access information that is held by public services Public services may include: Fire Secondary Schools Police Town Planning Telecommunications Health Care Public Services are required to publish information under this Act Members of the public can request information under this Act

Freedom of Information Act Investigate the types of things you could request, and where from using the following link: https://www.gov.uk/make-a-freedom-of-information-request/the-freedom-of-information-act What information could you/would you ask for? Is it already published? What would you use that information for? Discuss what you find with the person next to you

Show your understanding Complete the worksheets on each of the Laws – check the number of marks carefully. Be ready to mark it by the end of the lesson. In Word/PPT/Publisher, makes notes on each of the Laws covering: Name and date of the law What it covers & main details of the law What it makes illegal/legal Exemptions Penalties for breaking it 3 examples you could use in an exam linked to Computing

Plenary BBC Online test: http://www.bbc.co.uk/education/guides/zp9jpv4/test

http://www.bbc.co.uk/education/guides/zkhykqt/revision Ethics and ICT/Computing