Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computing, Ethics and The Law

Similar presentations


Presentation on theme: "Computing, Ethics and The Law"— Presentation transcript:

1 Computing, Ethics and The Law
Ben Riley

2 The Law Copyright, Designs and Patents Act (1988)
Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles) Regulation of Investigatory Powers Act (2000)

3 Copyright, Designs and Patents Act (1988)
This gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used. The rights cover: Broadcast and public performance, copying, adapting, issuing, renting and lending copies to the public. E.g. it is illegal to download music without paying for he music (paying to the artist).

4 Computer Misuse Act (1990) Computer Misuse Act (1990)
This law was introduced to try and fight the growing threat of hackers and hacking .In the U.K., it is now a crime to Access a computer without permission from the owner. It also stops the Unauthorised modification of computer material. E.g. it is illegal to hack into a companies network and steel information, as this is a misuse of a computer system.

5 Data Protection Act (1998) Data Protection Act (1998)
This law defines the ways in which information about living people may be legally used and handled. The main intent is to protect individuals against misuse or abuse of secret information about themselves.

6 Data Protection Act (8 main principles)
used fairly and lawfully - data used legally used for limited, specifically stated purposes – used for purposes to help people used in a way that is adequate, relevant and not excessive – used for relevant purposes Accurate – data that is stored is accurate kept for no longer than is absolutely necessary – it must be discarded when it’s purpose has run it’s Corse handled according to people’s data protection rights – data mustn't be shared further than the person has agreed kept safe and secure – data mustn't under any circumstance be stolen not transferred outside the European Economic Area without adequate protection – data must stay within the EU

7 Regulation of Investigatory Powers Act (2000)
RIPA is an Act of the Parliament of the United Kingdom, regulating the powers of public bodies to carry out surveillance and investigation, and covering the interception of communications. This is a very important act for organisations like M.I.5 AND m.i.6 to track and follow people like criminals. E.g M.I.6 could track calls and social media coming from Syria.

8 What are ethics in terms of Computer Use?
Ethics is a set of moral principles that govern the behaviour of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. Some common issues of computer ethics include intellectual property rights. E.g. a website that is legal but what it's doing is ethically incorrect (Ashley Madison).

9 What are the ethical standards of the BCS?
British computer Society code of conduct: sets out the professional standards required by BCS as a condition of membership; applies to all members, irrespective of their membership grade, the role they fulfil, or the jurisdiction where they are employed or discharge their contractual obligations – everyone must abide by the rules governs the conduct of the individual, not the nature of the business or ethics of any Relevant Authority – judged purely on the conduct and not judged prejudicially


Download ppt "Computing, Ethics and The Law"

Similar presentations


Ads by Google