Ethical, Social and Legal Aspects

Beschreibung

GCSE Computing Karteikarten am Ethical, Social and Legal Aspects , erstellt von Samuel Allen am 20/03/2017.
Samuel Allen
Karteikarten von Samuel Allen, aktualisiert more than 1 year ago
Samuel Allen
Erstellt von Samuel Allen vor mehr als 7 Jahre
14
1

Zusammenfassung der Ressource

Frage Antworten
A code of ethics/code of conduct Defines acceptable behaviour within an organisation. It is useful as individuals working for the organisation have a benchmark upon which they can judge their own behaviour and that of others.
Informal Codes Most small organisations do not have a formal written code of ethics and instead rely on senior members of staff to lead by example, showing what acceptable behaviour is.
Formal Codes Written documents that outline expected behaviours within an organisation. Formal codes of ethics are usually enforced by the threat of disciplinary action should the code not be adhered to.
Personal Code An individual’s own personal code often supersedes the bare minimum requirements of an organisations ethics code. This will vary from person to person as they choose to act upon their own ethical standards in their everyday actions.
Data Protection Act 1998 Organisations that store and process personal data are required to register with the Information Commissioner, who is the person responsible for the DPA. This is type of data they wish to store and why it is being collected.
Eight principles of the DPA  Processed against loss, theft or corruption. Accurate and where relevant kept up to date. Adequate, relevant, not excessive. Prevented from being transferred outside EU to countries without adequate provision. Fairly and lawfully processed. Processed within the rights of subjects. Deleted when no longer needed. Used only for the purpose collected
Computer Misuse Act 1990 When the use of computer systems became widespread, the Computer Misuse Act 1990 (CMA) was put in place to help combat issues arising from their misuse.
The CMA makes it an offence to: Access data without permission, e.g. looking at someone else's files.  Access computer systems without permission, e.g. hacking.  Alter data stored on a computer system without permission, e.g. writing a virus that deliberately deletes data.
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

A level Computing Quiz
Zacchaeus Snape
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
Computing Hardware - CPU and Memory
ollietablet123
Computer Systems
lisawinkler10
Computer science quiz
Ryan Barton
Input, output and storage devices
Mr A Esch