Ethical, Social and Legal Aspects

Description

GCSE Computing Flashcards on Ethical, Social and Legal Aspects , created by Samuel Allen on 20/03/2017.
Samuel Allen
Flashcards by Samuel Allen, updated more than 1 year ago
Samuel Allen
Created by Samuel Allen almost 8 years ago
16
1

Resource summary

Question Answer
A code of ethics/code of conduct Defines acceptable behaviour within an organisation. It is useful as individuals working for the organisation have a benchmark upon which they can judge their own behaviour and that of others.
Informal Codes Most small organisations do not have a formal written code of ethics and instead rely on senior members of staff to lead by example, showing what acceptable behaviour is.
Formal Codes Written documents that outline expected behaviours within an organisation. Formal codes of ethics are usually enforced by the threat of disciplinary action should the code not be adhered to.
Personal Code An individual’s own personal code often supersedes the bare minimum requirements of an organisations ethics code. This will vary from person to person as they choose to act upon their own ethical standards in their everyday actions.
Data Protection Act 1998 Organisations that store and process personal data are required to register with the Information Commissioner, who is the person responsible for the DPA. This is type of data they wish to store and why it is being collected.
Eight principles of the DPA  Processed against loss, theft or corruption. Accurate and where relevant kept up to date. Adequate, relevant, not excessive. Prevented from being transferred outside EU to countries without adequate provision. Fairly and lawfully processed. Processed within the rights of subjects. Deleted when no longer needed. Used only for the purpose collected
Computer Misuse Act 1990 When the use of computer systems became widespread, the Computer Misuse Act 1990 (CMA) was put in place to help combat issues arising from their misuse.
The CMA makes it an offence to: Access data without permission, e.g. looking at someone else's files.  Access computer systems without permission, e.g. hacking.  Alter data stored on a computer system without permission, e.g. writing a virus that deliberately deletes data.
Show full summary Hide full summary

Similar

Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Computing
Kwame Oteng-Adusei
Pack of playing cards answer
Karl Taylor
Code Challenge Flow Chart
Charlotte Hilton
Computing Hardware - CPU and Memory
ollietablet123
Computer Systems
lisawinkler10
Computer science quiz
Ryan Barton
Input, output and storage devices
Mr A Esch
PuKW - STEP 1 (mögliche Prüfungsfragen/Prüfungsvorbereitung)
Steven Lee