Download presentation
Presentation is loading. Please wait.
Published byNathaniel Lawson Modified over 6 years ago
1
Unit 1.8 Ethical, legal, cultural and environmental concerns
2
Thought for the day – Computer Misuse in the news – 8 September 2017
Massive Equifax data breach hits 143 million The firm's core consumer and commercial credit databases were not accessed. About 143 million US customers of credit report giant Equifax may have had information compromised in a cyber security breach, the company has disclosed. Security checks Equifax said hackers accessed the information between mid-May and the end of July, when the company discovered the breach. Equifax said cyber-criminals accessed data such as Social Security numbers, birth dates and addresses during the incident. Malicious hackers won access to its systems by exploiting a "website application vulnerability", it said but provided no further details. Some UK and Canadian customers were also affected. The hackers accessed credit card numbers for about 209,000 consumers, among other information
3
The Big Picture: Computer Science and Technology Issues
legislation relevant to Computer Science: o The Data Protection Act 1998 o Computer Misuse Act 1990 o Copyright Designs and Patents Act 1988 o Creative Commons Licensing o Freedom of Information Act 2000. open source vs proprietary software investigate and discuss Computer Science technologies and the impact and implications of technology, while considering: o ethical issues o cultural issues o environmental issues o privacy issues. how key stakeholders are affected by technologies
4
In today's lesson: What are we learning today? Why are we learning it?
Legal issues in Computing - 5 laws relating to technology and Computer Science Why are we learning it? To understand and be able to describe the implications of these laws on our use of technology How will it help reach your OPT? You need to know the key features of the laws You need to be able to answer shorter answer questions, and probably longer ones too! How long? 2 lessons
5
Starter: match the definitions
behaving in ways considered by most people to be correct and honest Morals and Ethics are slightly different but work along the same ideas It is something that may feel wrong, or be unacceptable – but doesn’t actually break a law in accordance with principles of conduct that are considered correct, especially those of a given profession Moral Ethical
6
Introduction to the issues
There are a number of different issues surrounding technology and these issues can be categorised as ethical, legal, privacy, environmental and cultural. Over the next few weeks, we will explore examples of a range of issues, but it is worth noting that most issues involving technology encompass a mixture of these categories. Discussing what is morally right and morally wrong. Discussing what is right and wrong in the eyes of the law. Discussing how ethic groups, counties, religions affect and are affected by technology Discussing how technology impacts the environment and how environmental issues affect technological progress. Discussing how technology affects the privacy of our data and of our identity.
7
Ethics / Morals Moral: Ethical:
behaving in ways considered by most people to be correct and honest Ethical: in accordance with principles of conduct that are considered correct, especially those of a given profession You will often find that professional bodies have “Code of Ethics” which members must follow.
8
Moral & Ethical Questions
Discuss whether each of these questions would be Ethical or Moral issues, or neither! A company decides to install a range of computer software and hardware that would make most of its workforce unemployed Digging for shale gas (Fracking) to release more energy supplies like they’re doing near Preston The advancement of Artificial Intelligence You notice I’ve got 3 files open on my computer with the newly released NEA tasks on. I’ve gone to make a cup of tea and chat to Mrs Rennie. I’m gone a while….. The use of live animals for testing cosmetics/medicine
9
Moral & Ethical Questions
Answers A company decides to install a range of computer software and hardware that would make most of its workforce unemployed (MORAL) Digging for shale gas (Fracking) to release more energy supplies (MORAL) The advancement of Artificial Intelligence (MORAL/ETHICAL) You notice I’ve got 3 files open on my computer with the newly released NEA tasks on. I’ve gone to make a cup of tea and chat to Mrs Rennie. I’m gone a while….. (MORAL) The use of live animals for testing (MORAL/ETHICAL) Answers As you can see, the cross over in Moral and Ethical is often very similar It can be difficult to decide Key Point: Ethical Issues – usually written down and are linked to organisations
10
The Law As computers develop and computer use increases people are finding more and more ways to use computers to their advantages but often to the disadvantage of others. More and more laws are being passed concerning computer use and this is due to the rapid way in which this technology develops. There are 5 major laws concerning computers which you must be aware of: Data Protection Act (1998) Computer Misuse Act (1990) Copyright, Design and Patents Act (1988) Creative Commons Licencing Freedom of Information Act (2000)
11
Data Protection Act (1998) With computers now holding so much personal information about people, companies have to look after this data properly. The law forces companies to have highly secure systems and to only hold onto personal information that a company really needs. DPA was introduced in 1984 and updated in 1998. In order to comply with this law, organisations must first contact the government to say that they will be storing people’s personal information. They must make it clear WHAT information they will be storing and how they will use it. There are in fact 8 principles of the data protection act that organisations must follow: Data must be used in a fair way and lawfully Data must only be used for the purpose it is intended for Data must be relevant – cannot gather more than you need Data must be up-to-date and accurate Data must not be kept for longer than it is needed for The person whom the data is about must able to access the data if they wish Data must be kept safely and secure Data must not be transferred without protection (i.e. encryption)
12
How to remember the 8 principles
R – relevant A – accurate T – time – kept for as long as needed, no longer S – secure T – transferred not outside EU and not without protection R – respect the law when using data A – access to our data if we want to see it P – purpose it was collected for only
13
Data Protection Act (1998) Rights of data subjects
Data subjects can normally see all of the data held about them, with some exceptions, for example if it would affect:- The way crime is detected or prevented Catching or prosecuting offenders Assessing or collecting taxes or duty Demand that data is corrected if incorrect Demand the data not be used in a way that could cause harm or distress Demand data is not used for direct marketing.
14
Data Protection Act (1998) Exemptions to the Act
Exemptions are possible for: Maintenance of a public register; Some not-for-profit organisations; Processing personal data for personal, family or household affairs (including recreational purposes) : If you only process personal data for staff administration advertising, marketing and public relations accounts and records
15
Data Protection Act (1998) The Data Protection Commissioner
An independent officer appointed by the queen. Reports directly to Parliament. Duties include: Maintaining a register of the names and addresses of all data controllers; Considering complaints from data subjects about data controllers who have not followed the principles of information handling and prosecuting or serving notices on offenders.
16
Computer Misuse Act (1990) With the internet connecting people, businesses and the world, people can access sensitive data for more easily. The Computer Misuse Act aims to prevent sensitive data getting into the wrong hands and being edited or destroyed. The act has three main laws. You must not: Gain unauthorised access to a network eg looking at someone else's files Modify data on a network without permission - accessing computer material without permission with intent to commit further criminal offences, eg hacking into the bank's computer and wanting to increase the amount in your account Altering computer data without permission - Create and / or supply Malware. , eg writing a virus to destroy someone else's data, or actually changing the money in an account
17
Copyright, Design and Patents Act (1988)
The World Wide Web contains vast quantities of ideas and information in a digital format. It is therefore very easy to copy and share other people’s work, ideas and files. Copyright gives the creators of some types of media rights to control how they're used and distributed. This law makes it illegal to copy and / or share other people’s work and ideas (intellectual property) without acknowledgement and permission. When you buy software, for example, copyright law forbids you from: giving a copy to a friend making a copy and then selling it using the software on a network (unless the licence allows it) renting the software without the permission of the copyright holder The law doesn’t just govern digital work – it also covers written work and people’s ideas too! Music, books, video and software can all be covered by copyright law.
18
Copyright, Design and Patents Act (1988)
When it comes to illegal downloading, it is becoming very difficult to enforce the law due to the number of people who download media without permission. Having said that, a number of torrent hosting sites have been prosecuted and shut down – but then they just host the site again in another country…!? The Federation Against Software Theft (FAST) FAST was founded in 1984 by the software industry and is now supported by over 1,200 companies. It is a not-for-profit organisation with an aim to prevent software piracy and has a policy of prosecuting anyone found to be breaching copyright law. FAST also works to educate the public about good software practice and legal requirements.
19
Creative Commons Licencing
There are times that the owner of some intellectual property would like other people to be able to use, share and edit their work. To enable this to occur without being in breach of copyright law, the owner of some intellectual property can make their work available under the Creative Commons Licence. When they do this they can choose exactly how people can use their work: Attribution – Work can be copied, modified and shared but the owner must be acknowledged Share-alike – If work is modified it can only be shared with the same licence that the original piece of work had Non-Commercial – Cannot re-use the work for own profit No Derivative Works – Can copy and share but cannot modify They can promote their work under one or a mixture of these licences.
20
Creative Commons Licencing
The Creative Commons Licensing give everyone from individual creators like you and me, to large companies and institutions a simple, standardised way to grant copyright permissions to their creative work. This means there is a vast and growing pool of content that can be copied, distributed, edited, remixed, and built upon, all within the boundaries of copyright law.
21
Freedom of Information Act (2000)
This act allows the public to gain access to ‘public’ information held by public sector organisations (organisations that are funded by the tax payer). For example, the government, schools, police and the NHS must all publish certain information on a regular basis. This is often in the interest of transparency. If you were paying thousands of pounds in tax each year, you would probably like to know what your money has been spent on. The general public can also request certain information, such as the contact details of all schools in England. Information which may cause harm to national security can of course be held back from public view.
22
Quick Learning Check Match the following: Computer Misuse Act (1990)
Data Protection Act (1998) Creative Commons Licencing Freedom of Information Act (2000) Copyright, Design and Patent Act (1988) 1 - “A law which makes it illegal to gain unauthorised access to networks and to create / distribute malware.” 2 - “Allows people to enable their work to be shared, copied and edited without users breaking copyright law.” 3 - “Protects intellectual property, making it illegal for people to copy and share other people’s work.” 4 - “Ensuring that companies that obtain personal information do so appropriately and securely.” 5 - “Enabling the general public to have access to public sector information”
23
Show your understanding
Complete the worksheets on each of the Laws – check the number of marks carefully. Be ready to mark it by the end of the lesson. In Word/PPT/Publisher, makes notes on each of the Laws covering: Name and date of the law What it covers & main details of the law What it makes illegal/legal Exemptions Penalties for breaking it 3 examples you could use in an exam linked to Computing
24
Unit 1.8 Ethical, legal, cultural and environmental concerns
25
Thought for the day – Computer Misuse in the news – October 2015
Teenager hacks TalkTalk The company said it did not know how much of their customer information had been encrypted. A 15-year-old boy was been arrested in Northern Ireland in connection with the TalkTalk hacking attack. TalkTalk's chief executive said the attack was "smaller" than originally thought. The boy was arrested on suspicion of Computer Misuse Act offences. Dido Harding said any credit card details taken would have been partial and the information may not have been enough to withdraw money "on its own". TalkTalk, the phone and broadband provider, which has over four million UK customers, said banking details and personal information could had been accessed. Card details accessed were incomplete - with many numbers appearing as an x - and "not usable" for financial transactions, it added.
26
The Big Picture: Computer Science and Technology Issues
legislation relevant to Computer Science: o The Data Protection Act 1998 o Computer Misuse Act 1990 o Copyright Designs and Patents Act 1988 o Creative Commons Licensing o Freedom of Information Act 2000. open source vs proprietary software investigate and discuss Computer Science technologies and the impact and implications of technology, while considering: o ethical issues o cultural issues o environmental issues o privacy issues. how key stakeholders are affected by technologies
27
In today's lesson: What are we learning today? Why are we learning it?
Legal issues in Computing - 5 laws relating to technology and Computer Science Why are we learning it? To understand and be able to describe the implications of these laws on our use of technology How will it help reach your OPT? You need to know the key features of the laws You need to be able to answer shorter answer questions, and probably longer ones too! How long? 2 lessons
28
Learning Objectives By the end of this week’s 2 theory lessons, you will : Be able to identify 5 laws relating to technology and Computer Science Be able to describe the implications of these laws on our use of technology
29
Starter Write down 2 points about each law Give an example of the law in use Freedom of Information Act (2000) Data Protection Act (1998) Computer Misuse Act (1990) Creative Commons Licencing Copyright, Design and Patent Act (1988)
30
Creative Commons Licencing Freedom of Information Act (2000)
Computer Misuse Act (1990) Data Protection Act (1998) Creative Commons Licencing Freedom of Information Act (2000) Copyright, Design and Patent Act (1988) 1 - “A law which makes it illegal to gain unauthorised access to networks and to create / distribute malware.” 2 - “Allows people to enable their work to be shared, copied and edited without users breaking copyright law.” 3 - “Protects intellectual property, making it illegal for people to copy and share other people’s work.” 4 - “Ensuring that companies that obtain personal information do so appropriately and securely.” 5 - “Enabling the general public to have access to public sector information”
31
The Data Protection Act 1998
The Data Protection Act 1998 covers how personal data may be used by companies It covers: what can be collected how long it can be kept for steps to keep it up to date/accurate sending and using the data who can see that data People who collect personal data need to register with the Information Commissioner 8 principles
32
Fill the gaps
33
How to remember the 8 principles
A – T – S – P –
34
How to remember the 8 principles
R – relevant A – accurate T – time – kept for as long as needed, no longer S – secure T – transferred not outside EU and not without protection R – respect the law when using data A – access to our data if we want to see it P – purpose it was collected for only
35
Computer Misuse Act (1990) Makes is illegal to use computers to:
Access computer systems without proper authorisation Access computer systems with intent to commit a criminal offence Alter data without permission (e.g. through the use of viruses, physical deletion etc.)
36
Computer Misuse Act (1990) Computer Misuse quiz –
37
Copyright Designs and Patents Act (1988)
Protects people’s written, dramatic, musical, film, broadcasts property Makes it an offence to copy or distribute other people’s intellectual property without permission, including software
38
Copyright or not? Copyright quiz:
39
Which law do these relate to?
What do they allow me to do with all the resources I make for school? What does it mean I can do with resources I find online?
40
Creative Commons Licence
Allows people with protected work to allow free distribution of the work They may want to do this to allow say Remixing of their songs It may be an author wants other people to edit and improve their book. They may allow Commercial, or non-Commercial use of their work
41
Freedom of Information Act 2000
This allows members of the public to access information that is held by public services Public services may include: Fire Secondary Schools Police Town Planning Telecommunications Health Care Public Services are required to publish information under this Act Members of the public can request information under this Act
42
Freedom of Information Act
Investigate the types of things you could request, and where from using the following link: What information could you/would you ask for? Is it already published? What would you use that information for? Discuss what you find with the person next to you
43
Show your understanding
Complete the worksheets on each of the Laws – check the number of marks carefully. Be ready to mark it by the end of the lesson. In Word/PPT/Publisher, makes notes on each of the Laws covering: Name and date of the law What it covers & main details of the law What it makes illegal/legal Exemptions Penalties for breaking it 3 examples you could use in an exam linked to Computing
44
Plenary BBC Online test:
45
Ethics and ICT/Computing
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.