WJEC A2 Computing Unit 3.9 Cheat Sheet by Horatio
a science computer 3 level cs unit wjec
Data is being collected regardless of whether we consented
It could be dangerous if the data that has been collected is used maliciously by unauthorized users.
Misuse of Data
Data is frequently sold to other organizations for other uses.
Privacy is a basic human right that excessive surveillance can violate.
Large organizations may build up data on an individual regardless of whether they consent to it or even use the service.
Data Protection Act
Any organization which stores personal data must register with the Information Commissioner.
Data must be:
1. Lawfully processed
2. Processed for limited purposes
3. Not excessive
5. Not kept longer than necessary
6. Not in violation of the user's rights
7. Held securely
8. Not transferred outside the EU unless the country has adequate data protection laws.
Freedom of Information Act
This gives individuals the right to request certain types of data from government entities such as hospitals, police or schools.
Copyright, Designs and Patents Act
This gives creators more control over how their creations are used in terms of copying or adapting them without permission.
BCS Code of Conduct
The BCS Code of Conduct is a code of ethics that individuals and organizations should follow. Breaches of this code may make it difficult for the person to find work or keep their job. Being a member of the British Computer Society involves following this code.
1. Act in the public interest.
2. Have a duty to the organization they work for.
3. Have a duty to the profession.
4. Maintain professional integrity.
1. Data Protection Act
2. Computer Misuse Act
3. Freedom of Information Act
4. Regulation of Investigatory Powers Act
5. Copyright, Designs and Patents Act
Regulation of Investigatory Powers
This act is not specific to computing, though it does involve itself heavily in technology and the Internet.
This act gives law enforcement the right to intercept communication if they suspect criminal activity.
Also, they are given the right to decipher data by forcing the user to tell them how to decrypt it, i.e divulging a key.
Moral and Social Issues
Hackers may obtain access to a computer system for either ethical or unethical reasons.
Some people believe that illegally downloading software is permissible due to its price or the exploitative nature of software companies.
The anonymous nature of the Internet may lead to people acting more maliciously than they would offline.
Pornography, Violence and Hatred
There is concern as to what impact these things may have on young people or society in general.
Freedom of Speech
This is the question as to whether people should be allowed to say whatever they want without fear of censorship.
Some people may be replaced by Internet or technological alternatives, such as online banking or automated cash registers.
Acess to the Internet
15% of the UK population do not have Internet access, which may put them at a great disadvantage in the modern world.
Computer Misuse Act
This aims to prevent hacking and contains three offences:
1. Any unauthorized access to computer systems
2. Unauthorized access with further criminal intent
3. Unauthorized modification of computer material
Excessive Use of Data
We may be too dependent on data. Most decisions made by any organization are based on data analysis.
A lot of personal data is collected without our consent.
Over-Reliance on Computers
If a computer system fails, consequences can be dire. People may even die in some circumstances, i.e in hospitals.
Over-Reliance on Corporations
Giving monolithic entities(Google, Wikipedia) a lot of control over what we view on the Internet can be damaging.
We may be more influenced by other parts of the world more than ever before.
Download the WJEC A2 Computing Unit 3.9 Cheat Sheet
Your Download Will Begin Automatically in 5 Seconds.