You are on page 1of 1

The Computer Misuse Computers in the Workforce Analysing Personal Information Environmental Effects Layout, Colour Paradigms and

Environmental Effects Layout, Colour Paradigms and Character Sets


Act 1990 • Computers increase efficiency and productivity. • Large amounts of data from • Technology evolves quickly and is more • Web designers should consider who will be using
• Covers hacking and • This reduces labour costs giving lower prices to different sources can be pulled widely accessible than ever before. their sites when creating them.
other malicious use of consumers. together. This is known as big • Modern devices are not always • The Equality Act 2010 makes it illegal to
computers • Computers can easily conduct repetitive and data. designed to be repaired if they break. discriminate against a group of people.
• Frequently updated as tedious roles, reducing the need for humans to. • This can identify patterns or • This results in a huge number of • Those with visual impairments may need to
technology changes • This can contribute to rising unemployment. other connections. devices being thrown away. enlarge text or alter contrast.
• Contains three • Manufacturing roles have been badly hit by this • This data can reveal a lot about • Computer components are toxic and • Websites should provide alt text for images.
primary offenses: • There is a rise in services being offered online individuals and their behaviour. can cause environmental damage if not • Transcripts of audio should be provided for those
1. Unauthorised only. • It can also be used to target correctly disposed of. with hearing impairments.
access to computer • This reduces costs to the business. advertisements. • Electronic waste is sometimes shipped • Web designers should consider how colours are
materials. • This can exclude those without online access. • Many people argue large to countries with lower disposal interpreted in different countries.
2. Unauthorised companies should be more standards. • Some colours are regarded as unlucky in certain
access with intent to transparent about how they are • Computers and associated servers and cultures.
commit further doing this. equipment require huge amounts of • Web content may need to be translated into
offences. • People argue organisations have electricity to power and cool them. different languages.
3. Unauthorised a responsibility to share trends • This is often generated by burning • Unicode is the preferred character set due to its
modification of they find. greenhouse gasses. large number of characters.
computer material.

Unit 1.5 Legal, Moral, Cultural and Ethical Issues


The Regulation of Investigatory Powers Act 2000 The Data Protection Act 1998
• Covers the use of investigation and surveillance by public organisations • Applies to data stored electronically and on paper
• Requires Internet Service Providers and mobile phone providers to provide certain information • Covers personal data, defined as data which either
about their users to an authorised authority if requested alone or in conjunction with other data can be used to
• Requires ISPs to install suitable monitoring hardware on their network identify a living person.
• Controversial as smaller organisations such as local councils can make use of its powers • Any individual who can be identified by personal data
• Some feel that is it is improperly used and an invasion of privacy is know as the data subject.
• Superseded in 2018 by the European General Data
Monitoring Behaviour
Protection Regulations
• People’s computer usage may be monitored and tracked.
Eight specific protections are provided for data
Censorship Offensive Communications Automated Decision • Computers may be used to track people in other ways
subjects
• Restricting what • Unauthorised copying of software, Making such as via CCTV.
1. Personal data shall be processed fairly and lawfully.
content people can music or other content is theft. • Used to control what is • Employers may monitor the computer use of their
2. Personal data shall be obtained only for one or more
view, publish or • The Internet has made this easy shown first on social employees to ensure productivity.
specified and lawful purpose.
access. and widespread. networking feeds. • These technologies are used to track and prevent crime. 3. Personal data shall be adequate, relevant and not
• ISPs block illegal • The Internet increases anonymity. • May create an “echo • Some people believe this is unethical. excessive for its purpose.
content such as that • People are sharing more chamber” where people • Others argue this is essential to maintain safety and 4. Personal data shall be accurate and up to date.
associated with information than ever online. are not exposed to security. 5. Personal data shall not be kept for longer than is
extremism. • There has been an increase in views which challenge • What should and should not be monitored? necessary.
• Some people worry cyber bullying and stalking. their own. 6. Personal data shall be processed in accordance
that this can be • The Malicious Communications • Used in application Artificial Intelligence with the rights of data subject.
misused or used to Act 1998 makes it an offense to processes such as for 7. Appropriate technical and organisational measures
• The ability of a computer system to behave in a way which
push certain ideas or send indecent or offensive mortgages or credit shall be taken against unauthorised or unlawful
replicates human intelligence, analysis and decision
beliefs. messages online. cards. processing of personal data and against accidental
making.
• Some promote a Free • Relying entirely on loss or destruction of, or damage to, personal data.
• Backed by a large knowledge base.
Internet with no The Copyright, Design and automated decisions 8. Personal data shall not be transferred to a country
• Used in systems designed to replicate system experts.
filtering at all. Patents Act 1988 could mean people are or territory outside the European Economic Area,
• Used to analyse huge datasets.
• Censorship may also • Protects works such as logos, unfairly treated. unless that country or territory ensures an adequate
• Used in medicine to form diagnosis
exist at a smaller level photos, software code and music. • Used in driverless cars. level of data protection
• Used in neural networks for pattern and fraud
within a workplace. • Applied automatically to original • Raises many ethical The act provides three rights to data subjects:
identification.
• It may be used to works. concerns. 1. The right to request a copy of the data held about
• Used in voice recognition.
maintain employee • Expires between 25 and 70 years • Algorithms must be them
• Raises privacy concerns.
productivity or after the author’s death. written and tested to 2. The right to correct inaccurate data held about them
• What rights might a sentient AI have?
maintain the security • Extended in 1992 to include avoid bias. 3. The right to prevent the use of their data for
• Who is responsible when things go wrong?
of the network. computer software marketing purposes

You might also like