Consequences of uses of computing
Moral and ethical issues
[edit | edit source]
An ethical issue is one that concerns our own individual behaviour and our own personal concept of right and wrong. We learn our moral values from other people such as our parents, teachers and peers, and we learn them for ourselves from experience. Ethics vary slightly from morals in that they are a way of trying to define a set of moral values or principles that people within society live by. Ethical issues are sometimes referred to therefore as social issues.
Extension Topics that aren't examined but you might be interested in: |
The use and misuse of personal data
[edit | edit source]Data misuse- the inappropriate use of data as defined when the data was initially collected.
Most organisations collect data on an ongoing basis and much of this data is personal. At a basic level this might be name and address information, but may also include data about individuals' finances, health, relationship status, family, employment history and even their personal views.
This presents a number of issues:
- personal privacy
- data security
- misuse of data
- 'big brother'
- online profile
- profiling.
prevent data and information misuse-
- Block Out-of-Policy User Activity- More often than not, your users have the keys to the kingdom. They can access vital files, data, and systems in order to perform their day-to-day tasks
- Improve Cybersecurity- 64% of all insider threat incidents are caused by negligent users*, not users with malicious intent
Other moral and social issues
[edit | edit source]Rather than being an expert in any one area, you should have a good broad understanding and the confidence to form your own thoughts. |
There are a number of other moral and ethical issues relating to Computer Science:
- unauthorised access
- unauthorised use of software
- inappropriate behaviour
- inappropriate content
- freedom of speech
- unemployment
- access to the Internet.
Extension Topics that aren't much examined but you might be interested in: |
As is clear from the topics discussed above, ethical and moral issues become a matter of debate. When you are using your own computer at home, you make your own moral decisions about these issues. When you are using a computer in a school, college or any other organisation, you normally have to agree to a code of conduct.
The main principles of the British Computer Society (BCS) code of conduct are that members should:
- always operate in the public interest
- have a duty to the organisation that they work for, or the college they attend
- have a duty to the profession
- maintain professional competence and integrity.
Legal issues
[edit | edit source]
Legal issues relate to those issues where a law has been passed by the Government. There are very few Acts of Parliament that are specific to the world of computing. The two main ones are the Data Protection Act and the Computer Misuse Act.
In addition, the Freedom of Information Act, the Regulation of Investigatory Powers Act and the Copyright, Designs and Patents Act are of particular relevance to computing.
Also, using a computer does not exempt you from all the other laws of the Kingdom. For example, someone who carries out an act of fraud on the Internet can be prosecuted under the Fraud Act. Someone who steals computer data can be prosecuted under the Theft Act. Someone who makes false allegations about someone else in an email can be prosecuted for libel under the Defamation Act.
The freedom of information act - The Freedom of Information Act (FOIA) generally provides that any person has the right to request access to federal agency records or information except to the extent the records are protected from disclosure by any of nine exemptions contained in the law or by one of three special law enforcement record exclusions.
Data Protection Act
[edit | edit source]Purpose
[edit | edit source]The Data Protection Act places controls on organisations and individuals that store personal data electronically. The Act's definition of "personal data" covers any data that can be used to identify a living individual.
The DPA determines what organisations can do with personal data that they have collected.
The DPA also defines the rights of the individual over the data that is stored about them.
In 2018, the DPA was strengthened by the introduction of a new act called General Data Protection Regulation (GDPR).
There are eight main principles behind the Data Protection Act. Anyone processing personal data must comply with the eight enforceable principles of good practice. They say that data must be:
- fairly and lawfully processed
- only used for the stated purpose
- adequate, relevant and not excessive for the specified use
- accurate and kept up-to-date
- not kept longer than necessary
- processed in accordance with the data subject's rights
- kept safe and secure
- not transferred to countries without adequate data protection
Another feature of the Act is that data subjects have the right to know what data are stored about them by any particular individual or organisation. These are known as subject access rights.
Freedom of Information Act
[edit | edit source]History
[edit | edit source]The Act implements what was a manifesto commitment of the Labour Party in the 1997 general election. Before its introduction, there had been no right of access to government by the general public, merely a limited voluntary framework for sharing information.
The Act went through Royal Assent in 2000 and came fully into force in 2001. It is important to note due to devolution, Scotland has its own version of the Act named the Freedom of Information (Scotland) Act, which was passed in 2002 and was full enforced at 2005.
Purpose
[edit | edit source]The Freedom of Information Act extends the subject access rights of the Data Protection Act and gives general rights of access to information held by public authorities such as hospitals, doctors, dentists, the police, schools and colleges.
The Act gives individuals access to both personal and non-personal data held by public authorities. The idea behind the Act was to provide more openness between the public and government agencies. Therefore, to respond to individual requests for information. Much of this is done through websites and email communications.
Computer Misuse Act
[edit | edit source]History
[edit | edit source]The Computer Misuse Act 1990 is an Act of the Parliament of the United Kingdom, introduced partly in response to the decision in R v Gold & Schifreen case of 1988. Critics of the bill complained that it was introduced hastily and was poorly thought out. Intention, they said, was often difficult to prove, and that the bill inadequately differentiated "joyriding" hackers like Gold and Schifreen from serious computer criminals.
The Act has nonetheless become a model from which several other countries, including Canada and the Republic of Ireland, have drawn inspiration when subsequently drafting their own information security laws, as it is seen "as a robust and flexible piece of legislation in terms of dealing with cyber crime”. Several amendments have been passed to keep the Act up to date.
Purpose
[edit | edit source]
The Computer Misuse Act was introduced primarily to prevent hacking (data misuse) and contains three specific offences relating to computer usage:
- unauthorised access to computer programs or data
- unauthorised access with further criminal intent - For example, this makes creating, obtaining or deploying malware a criminal offence.
- unauthorised modification of computer material.
The Act was introduced before the widespread use of the Internet, which has led to problems with enforcement. Prior to the Internet, hacking did take place, but not on the scale that it does today. There are now millions of computers and networks connected to the Internet and the opportunities for hackers have increased enormously.
Regulation of Investigatory Powers (RIP) Act
[edit | edit source]History
[edit | edit source]The Regulation of Investigatory Powers (RIP) Bill was introduced in the House of Commons on 9 February 2000 and completed its Parliamentary passage on 26 July. A number of offences have been prosecuted involving the abuse of investigatory powers. Widely reported cases include the Stanford/Liddell case, the Goodman/Mulcaire Royal voicemail interception, and Operation Barbatus.
The Act has numerous critics, many of whom regard the RIP as excessive and a threat to civil liberties in the UK. Campaign group Big Brother Watch published a report in 2010 investigating the improper use of RIP by local councils. Some even argue that the Act contravens the Human Rights Act, the European Charter on Fundamental Rights (which was introduced by the Lisbon Treaty) and the European Convention on Human Rights.
Purpose
[edit | edit source]The RIP Act was introduced to clarify the powers that government agencies have when investigating crime or suspected crime. It is not specific to the world of computing but was introduced partly to take account of changes in communication technology and the widespread use of the Internet.
There are five main parts of the Act. The most relevant to computing are Part 1 which related to the interception of communications, including electronic data, and Part 3 which covers the investigation of electronic data protected by encryption. In simple terms, it gives the police and other law enforcement agencies the right to intercept communications where there is suspicion of criminal activity. They also have the right to decipher these data if they are encrypted, even if this means that the user must tell the police how to decrypt the data.
It also allows employers to monitor the computer activity of their employees; for example, by monitoring their email traffic or tracking which websites they visit during the work time. This raises a number of issues relating to civil liberties.
Copyright, Designs and Patents Act
[edit | edit source]History
[edit | edit source]The Copyright, Designs and Patents Act 1988 (c 48), also known as the CDPA, is an Act of the Parliament of the United Kingdom that received Royal Assent on 15 November 1988. The Act was passed following a number of cases, such as:
The Copyright, Designs and Patents Act 1988 (c 48), also known as the CDPA, is an Act of the Parliament of the United Kingdom that received Royal Assent on 15 November 1988. The Act was passed following a number of cases, such as:
- A&M Records v Video Collection International [1995]
- Gramophone Company v Stephen Cawardine [1934]
- Godfrey v Lees [1995]
- Levy v Rutley [1871]
- Stuart v Barret [1994]
- University of London Press v University Tutorial Press [1916]
The Act creates a specific regime of moral rights for the first time in the United Kingdom: previously, an author's moral right had to be enforced through other torts, e.g. defamation, passing off, malicious falsehood.
The Act was also passed to implement European Union directives into UK law.
Purpose
[edit | edit source]The Act gives rights to the creators of certain kinds of material, allowing them control over the way in which the material is used. The law covers the copying, adapting and renting of materials.
The law covers all types of material but of particular relevance to computing are:
- original works including instruction manuals, computer programs and some types of databases
- web content
- original musical works
- sound recordings
- films and videos.
Copyright applies to all works regardless of format. Consequently, work produced on the Internet is covered by copyright. It is illegal to produce pirate copies of software or more versions on a network than have been paid for. It is an offence to adapt existing versions of software without permission. It is also an offence to download music or films without the permission of the copyright holder.
It is possible to request permission from the copyright owner to use their material, by writing to them and telling them what you intend to use their work for. However, the copyright owner does not have to grant permission. Furthermore, if they do grant permission, they may request a fee.
In computing, two techniques are used to protect copyright:
- Digital Rights Management (DRM)
- licensing.
Patents
[edit | edit source]- Patents are legal protections over inventions. They cover ideas and concepts rather than intellectual property.
- Patents can apply to both hardware and software and must be registered.
Issues related to the act
[edit | edit source]One of the ongoing criticisms of the CDPA 1988 in the recent years has been the need for modernisation. Since the act was introduced before popularisation of the internet it can be argued that it does not adequately cover online intellectual property.
The Internet makes file sharing very easy, especially using peer-to-peer services.
Digital representation of text, images, audio and video allow for perfect copies to be made.
There is uncertainty over whether or not website hosts are responsible for the illegal content uploaded by their users.
Creative commons licensing
[edit | edit source]Creative commons licensing (CC) is a common licensing framework. The six main CC licenses are comprised of various combinations of its four conditions:
- Attribution (BY): The work can be copied, modified, distributed, displayed, and performed, as long as the content creator/copyright owner is credited.
- Non-commercial (NC): The work can be copied, modified, distributed, displayed, and performed, but no profit can be made from it.
- No derivative works (ND): The work can be copied, distributed, displayed, and performed, but cannot be modified.
- Share-alike (SA): The work can be modified and distributed, but derivative works must be covered by an identical licence to the original.
Other acts
[edit | edit source]Other acts that are particularly relevant to computing are:
Act | Purpose |
---|---|
The Official Secrets Act | prevents the disclosure of government data relating to national security |
The Defamation Act | prevents people from making untrue statements about others which will lead to their reputation being damaged (also known as libel) |
The Obscene Publications Act and the Protection of Children Act | prevent people from disseminating pornographic or violent images |
The Health and Safety (Display Screen Equipment) Regulations | provides regulation on the correct use of screens and is a specific addition to the Health and Safety at Work Act, which contains more general regulations on keeping employees safe |
The Equality Act | makes it illegal to discriminate against anyone on the groups of sex, sexual orientation, ethnicity, religion, disability or age |
The Digital Economy Act | addresses media policy issues around digital media, especially copyright and use of domain names |
Cultural issues
[edit | edit source]Questions from this section are likely to be discursive and include an element of QWC (Quality of Written Communication). |
Cultural issues are all factors that influence the beliefs, attitudes and actions of people within society. Common cultural influences are family, the media, politics, economics and religion. These are cultural differences between different groups of people. For example, people from difference countries often have a different culture.
There are elements of computer use that have a cultural impact in that they can change our attitudes, beliefs and actions:
- over-use of data
- invasive technologies
- over-reliance on computers
- over-reliance on technology companies
- 'big brother' culture
- globalisation.
Summary
[edit | edit source]- We are living through a technological revolution and as computer scientists we must consider the consequences of computing on individuals and society as a whole
- Computing can bring about massive benefits but can also have a negative effect on individuals and society
- There are a number of laws relating specifically to computing and other common laws also apply to actions that are undertaken on a computer
- The Internet and World Wide Web have had a massive influence on our culture and will continue to do so
Exam Questions The clients under investigation are alleged to have downloaded music files from a file-sharing site. The ISP wishes the firm of solicitors to investigate whether any laws have been broken. State the full name of the law which might have been broken by the clients downloading music files. Answer: One of the following laws:
The firm of solicitors discovers during their investigation that the same clients have been downloading personal data relating to other clients of the ISP without authorisation. State the full name of the law that may have been broken by the ISP and state the full name of the law that may have been broken by the clients.. Answer: The Data Protection Act and the Computer Misuse Act You have been asked to design and set up a computer work area for the employees of a library. State the legislation that is concerned with how the work area should be physically set out and state two ways that this legislation will affect the design. Answer: Legislation:
Affect:
Application software has already been installed onto computers in another room. State the full name of the law that may be broken by installing the same software onto the new computers. Answer: Copyright, Designs and Patents (Act) What information should you find out before installing this software to ensure that you will comply with the law identified in the question above. Answer: Any of the following:
As soon as an employee logs onto one of the computers they have to agree to the Code of Conduct relating to their use of the computer system. What is a Code of Conduct? Answer: Definition:
A company that develops computer software has just taken on a new employee. The actions of the employee and company are covered by several laws. Name the law that would be most relevant in each of the following cases: a) The employee brings into work a copy of a computer game that he has purchased and already installed on his home computer. He installs it on his work computer. b) The employee gains access to company confidential data by correctly guessing a manager's username and password. c) The company issues the employee with a voucher once a year for a free eye test. Answer: a) Copyright, Designs and Patents (Act) b) Computer Misuse (Act) c) Health and Safety at Work (Act) The company makes the employee sign a Code of Conduct before he is allowed to start work. Why does the company have a Code of Conduct rather than just expecting employees to obey the law? Answer: Any of the following:
Imagine that you are a computer programmer in a company that stores personal data. The company must comply with the Data Protection Act. What is personal data? Answer: Data that relate to a living person//individual who can be identified from that data You are writing a new program to handle personal data. State one principle of the Data Protection Act that could be met by the careful design of your program. Name one feature that you could include in your program and describe how it would help the company comply with the principle stated. Answer:
One principle of the Data Protection Act refers to ‘internal data security’. It states that, ‘Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.’ Imagine you are working for an organisation that uses personal data. Describe three measures you would propose that will contribute to the organisation complying with the above principle of the Data Protection Act. Answer: Any of the following:
Government agencies sometimes require that they are given copies of encryption
keys. This allows these agencies to decrypt messages encrypted with these keys. State one reason for and one reason against a government having the ability to decrypt any encrypted messages. Answer:
A group of developers are creating a new social networking site for science students that will allow users worldwide to discuss current topics and post messages to each other. The site will be available over the Internet. Discuss the ethical, legal and cultural issues that the developers will face when setting up and running the service. Answer:
|