Вы находитесь на странице: 1из 5

week 1:

social anxiety: increased use of tech to socialise has a negative impact on ability to person-
to-person interaction.

week 2: (Code of Conduct)

different set of rules: etiquette, morals, ethics & code of conduct
-etiquette: manners. social behaviours in a community.
-morals: standards of behaviour. lesson/value from a story.
-ethics: determining right/wrong behaviour. based on moral principles.

code of conduct: represents employee(professional) ethics

-not use computer to harm people
-not interfere with other peoples work
-not intrude into peoples computer files
-not use computer to steal

*Disciplinary procedures can be taken if code of conduct of professional bodies

not followed.

British Computer Society (BSC) is a professional body of computer & information systems in
the UK.
o functions they carry out?
-providing a method of communication between industry professionals across
the globe.
-creates a community of knowledge sharing (methods of best practice)

o "As a professional body the British Computer Society (known as BCS, the Chartered
Institute for IT), has a responsibility to set rules and professional standards to direct
the behaviour of its members in professional matters. It is expected that these rules
and professional standards will be higher than those established by the general law
and that they will be enforced through disciplinary action which can result in
expulsion from membership.

Coventry University Code of Conduct: states responsibilities of staff and students and
provides understanding of hierarchy, rights and entitlement


Week 3: (Ethics and Morals)

Ethics: concerned with explaining human morality and guidance on how to conduct life.
Considered to be constantly evolving, fluid, schematic for life.
Ethics and Morality:
o Ethics is the area of human knowledge and philosophy which addresses questions
about human morality
o Morality: subject of study of ethics
o Moral Dillema: When you have a choice btwn two options and both can be
unsatisfactory (does not resolve issue ethically, eg. Law & religious rules)
o Ethics: A moral code, can vary btwn every person or group. Basic provides guidance
of a positive human behaviour.

Week 4: (Laws and Legislations)

Law: The system of rules which a particular country or community recognises as regulating
the actions of its members and which it may enforce by the imposition of penalties
Computer Misuse Act 1990: UK law with regards to malicious use of computers.
o Eg. Hacking, Unauthorised access and distributing malicious software.
Consumer Protection Act 1987: Protect consumers when buying goods and services.
o Eg. Fraud, unfair business practice and product liability.
Data Protection Act 1998: Defines legal use of personal data and information technology.
Gives people rights to protect themselves against misuse of personal data
o Principles of DPA:
Fair and lawfully processed
Processed for limited purposes
Adequate, relevant and not excessive
Not kept for longer than necessary
Processed in line with your rights
Not transferred to other countries without adequate protection
Disability Discrimination Act 1995: Makes it illegal to discriminate against anyone with
Freedom of Information Act 2002: Places responsibility on public body to be open about
their work. Also responsibility on government to share information.
Health and Safety at Work Act 1974: Ensure health and safety of:
o Employees
o Employers
o Occupiers or premises
o Designers, manufacturers, importers and suppliers
Copyright, Designs and Patent Act 1988: Protect copyright of individuals and groups
o Protects ownership of computer software (just like printed materials)
o Protects software developers (lasts for 50 years after their death)
Regulation of Investigatory Powers Act 2000: Regulates the manner in which investigatory
bodies can access information that is protected (ie. Passwords or encryption)

Week 5: (Freedom of Information Act (FOI) 2000)

Gives a general right to access all types of recorded information held by the public
o Covers entire public sector. It means we can find out what the government are doing
with our tax money (to an extent. ie. we cant access official secrets)
This act is only by the public authorities (NHS, schools, police, post office, etc)
o Individuals (us) have a right to access and receive all types of information (also to
know the information exists).
Responsibilities of public authorities:
o Must provide publication. Must respond within 20 working days. May charge a fee
Information Commissioner:
o An independent public official reporting to parliament. The Boss of FOI
Information Rights:
A request for information is covered by one or more of these:
o Data Protection Enquiries: When the enquirer asks to see personal information an
organisation holds about the themselves (mostly just personal enquires)
o Environmental Information Regulations: Enquirers ask about any decision or
activities affecting the environment (air, water, health). Example of enquiries could
be; recycling, car parking etc
o FOI enquiries: Concerned with all other information including the reasoning behind
decision and policies.
Requests for information:
o Must be in writing
o Must include name and address of applicant
o Must include information requested
o Applications do not need to state why they are making the request
o No restrictions on age, nationality, where they live
24 Exemptions to right of access:
o Absolute exemptions: Officer secrets, court case disclosures.
o Qualified exemptions: Even if an exemption applies, bodies must disclose if its in
the public interest.
It is a criminal offence to alter, conceal, block or destroy information to prevent disclosure!

Week 7:
(Copyright, Patents and Design Act 1988 and Computer Misuse Act 1990)

Copyright Law - A type of intellectual property consisting of the rights of authors,

composers, artists, photographers, publishers, and others who create or publish original
works to reproduce or authorize others to reproduce their works.
In the UK, protection is given by:
o Copyright Act (1956)
o European Single Market Act (1992)
o Copyright, Designs and Patents Act (1988)

Copyright, Designs and Patents Act (1988):

o Owner can copy the work (therefore illegal to copy without owners permission)
o Infringement (violation) of copyright is known as piracy
o Copyright is not the same as patent. Copyright can be on publications while patent
can be on ideas and methods too.
o Length of copyright after death: EU = 70 years. USA = 95 years.

The copyright (Computer Programs) Regulations (1992):

o The Copyright, Designs and Patents Act (1988) is edited to allow to refer to
computer programs.
o The software licensee doesnt take ownership of the software, he just purchases a
license to use it under the terms and conditions set by the copyright owner
o Exemptions:
Back-up copies: you bought a software (windows os), you can copy it as a
Decompilation: To recreate the original source code from the software
o You can decompile, provided the decompiled version is used
in agreement with the act.
o Copyleft:
Offers the right to distribute copies of a work for free. Also allows
modification of the work as long as that is also freely distributed

Computer Misuse Act 1990

o This act makes facility for securing computer material against unauthorised access or
o Examples: distributing viruses to other computers. Use of Trojans to gain access to a
computer. Accessing password protected drives without owners permission.


Association of Chief Police Officers Guidance (ACPO)

Digital Forensics (cyberforensics)

o Computer investigation and analysis techniques to gather evidence suitable for
presentation in a court of law.
o Goal is to perform a structured investigation while maintaining a chain to find out
what exactly happened and who was responsible for it.
o This isnt just about getting evidence, its about getting the evidence in particular
ways (ACPO guidlines)
o Examples of when computer forensics are used: Murder, internet abuse,
unauthorised data duplication, Private investigation of personal computer/cellphone
The Regulation of Investigatory Act (RIPA)
o Legislates for using methods of surveillance and information gathering to help the
prevention of crime.
o The act ensures the law clearly cover:
Purposes of use
Authorities who can use the powers
What will be the use of the material gained
Means of compensation for the individual
Data Retention and Investigatory Powers Act (DRIPA) 2014
o By Mrs. Teresa May
o Purpose of this is to allow security service to continue to have access to phone and
internet records of individuals following a previous retract of the rights by court.
o Investigation process:
Identification, Acquisition, Preservation, Search, Analysis, Reconstruction, Presentation

o The law permits interception of communications by intelligence agencies in tightly
controlled circumstances in the interests of national security, preventing or detecting
serious crime or safeguarding the economic well-being of the UK.
o Scrambling electronic information into a secret code of letters, numbers and
symbols. Encrypted information can't be unscrambled without a decoding key.
ACPO guidelines:
o No action taken by law enforcement agencies, persons employed within those
agencies or their agents should change data which may subsequently be relied upon
in court.
o In circumstances where a person finds it necessary to access original data, that
person must be competent to do so and be able to give evidence explaining the
relevance and the implications of their actions.
o An audit trail or other record of all processes applied to digital evidence should be
created and preserved. An independent third party should be able to examine those
processes and achieve the same result.
o The person in charge of the investigation has overall responsibility for ensuring that
the law and these principles are adhered to.
Other Acts:
o The Police & Criminal Evidence Act 1984
o Criminal Justice & Police Act 2001