Ethics & Laws


Ethics


The Digital Divide 
(remember EESC - Economic, Educational, Social & Cultural)

The term digital divide is used to describe the fact that not everybody has the same access to technology and this will have impacts on them.  Generally this can be divided into economic, educational, social and cultural implications.

Economic.  This is to do with money.  If we mention the word economy when talking about a country, we are usually referring to how well that country is doing in terms of wealth/jobs/production/consumption (of goods and services).  So if people do not have the same access to technology it could affect them economically by:
  • Generally people who have a good knowledge of technology and the skills to use the technology get better paid jobs.
  • The internet gives people access to a wider range of goods and services, this is because you are dealing with a global market  this is known as e-commerce (rather than just the 'market' that you can reach in your car)
  • The internet also means that people can often get cheaper goods and services (often you are able to buy things cheaper on the Internet because companies are able to supply them at a reduced cost because they have lower overheads than traditional high street shops)
This could mean that less well off people may not be able to access the same level of services as other people, because they are not able to afford the technology.  Or it might be the case that they feel under pressure to have the technology and end up in debt in order to 'keep up' with technological advancements.

Often there are countries that have less ICT infrastructure and they might not be able to take advantages of globalisation, this could mean that they get left behind even further.


Watch this clip to find out about ICT has impacted on Cambodia's growing economy

Educational - This is to do with learning.  If you have access to a computer at school or at home, you are more likely to become an independent learner (and are more likely to achieve).  Many schools now use VLEs to help the students and their learning.  If you do not have access to the Internet, you would not be able to access these resources.  All the online educational content/resources allows students to do better work.

There are also now more and more online courses available.  So you can gain qualifications and skills more easily, from the comfort of your own home and at a time to suit you.  Not having ICT skills might mean that the person concerned is not able to do a particular job.

Social - This is about Society and who lives in it.  People may feel left out if they do not have the same level of technology as the people around them.  If you were the only child in class who did not have access to email/IM/BBM/mobile phones then you might feel left out of conversations etc.

Cultural - This refers to the behaviour, attitudes and lifestyles of certain social groups.  Technology is generally everywhere you go in the developed world, from Internet Cafes to people carrying around IPODs/IPADs/Mobile phones etc.  People can watch videos and catch-up TV on demand (and on the go).  Children are more likely to play on a games console these days, than play with traditional toys or play outside.  BUT some countries/cultures/religions try to prevent their people from using/accessing technology (for example in Burma, the Internet was aggressively restricted by the military prior to 2011).

The Environment and ICT

We all know we have to be concerned about the environment and the impact we are having on it.  ICT technology is having on the environment and it has got to be considered.

Technology changes and updates so quickly, think of your house, how often do you change:
  • Mobile phones / smart phones 
  • Tablet computers / personal computers 
  • Televisions / computer screens 
  • Games stations and consoles 
  • MP3 players and storage devices 
I know what teenagers are like with mobile phones; you are desperate for the new IPhone or Blackberry, then 1 year later there is a new model that does something else and suddenly you want that (can't live without it!).  So what was popular last year all of a suddenly is no longer needed even though it might be still be working!

E-waste is a huge problem around the world. A large amount of e-waste used to end up in landfill and parts can be toxic!  Chemicals such as lead, arsenic and cadmium can get into the soil and contaminate drinking water.

Most countries in the developed world have introduced regulations to prevent e-waste being dumped in landfill. Instead they are recycled; although some countries still send their e-waste to places such as Asia, where the regulations are not as strict.

Every part of your phone/laptop etc has been made from something that originally came out of the ground.
›The raw materials were processed, refined, transported and shaped into each component. It would be irresponsible to just throw it away.

It is estimated that over a million tonnes of ICT equipment is thrown away each year, and this is growing each year.  The equipment could be recycled by allowing someone else to use it, there are schemes that will
redistribute the items you donate.

A large amount of recycling is done by breaking up the components to extract as much valuable material as possible (for example lead, copper, gold). Even the plastic may be reused to make other things.

Another effect is the amount of energy that is used to power all the equipment and servers around the world (and also to keep them cool).

Electricity produces greenhouse gases, so the less used the better!  How can you help?  ›At home you can help by using the ‘sleep mode’ – or just switch it off.

The largest companies have huge data centers to house their servers. These companies need a massive amount of cooling to keep the systems working (if they overheat they might crash or stop working!)

Many companies use '›Building Management' systems to help control the environment in which people work.  These systems are computer controlled.  Examples are:
  • Air conditioning to keep the temperature at a reasonable level.
  • Automatic window openers to cool down offices (before the air con kicks in).
  • Solar panels to reduce the amount of electricity being used from the national grid.
  • Energy monitoring displays to help staff know what is using up the power.
  • Low energy LED lighting controls
  • Smart meters to help you monitor the use of energy in the home.

ICT is it our Friend or Foe?

Some things for you to consider:

DNA Profiling:  Since 1995 the UK police have been building up a database of people's DNA.  This DNA is often used to solve crimes and catch criminals (which is good).  Some people would argue that we should have everyone's DNA on the database; but is this an invasion of privacy?

National Identity Cards:  For a number of years there have been calls for everyone in the UK to have a National Identity Card.  This would store your fingerprint details and a Photo; and you would have to carry it on you at all times.  Some people have protested against this saying it is an invasion of privacy.

CCTV (Closed Circuit Television):  CCTV is very common today, in shops; in streets; even around our school.  Obviously they are used to help prevent crime and catch criminals (when they are caught on camera). But should someone be able to record images of us without our knowledge; could it be used to snoop on people.

Electronic Tracking:  Tracking our every move.  Whether its you credit/debit card recording your every transaction; or your mobile phone being tracked by your network provider and data being stored on your different locations do we really want people storing and having access to this data?


Privacy

Today we have more privacy issues than ever before, due to our use of technology.  Whether that is when disposing of 'old' technology which might have our data on it; or whether it is when we are filling in online forms to sign up to websites.

Disposal of Computer Equipment:    Before disposing of any old computer equipment, you must ensure that you delete any files stored on the hard drive (memory) that might contain private or personal information about you. Such as name or passwords.

Our data can also be collected with, or without our knowledge:

Data Collection (Covert - without our knowledge):
  • Such as online companies gathering statistics about users’ searches and browsing habits/actions for marketing purposes. 
  • Cookie installation and spyware 
  • ISPs are able to view data that pass through them. 
  • Government/Police looking at individuals’ computers without a warrant (Big Brother). 
  • Identity theft 
Data Collection (Overt):
  • Filling out forms/buying goods. Users provide personal data knowingly without realising implications 
  • Requirements for users to ‘opt in’ to gain access to services 
  • Complicated ‘opt out’ methods 
  • Privacy policies. 


Privacy Policy's

If you are buying from a company online then the company should have a privacy policy.  This document explains how they will store and use your data.  Have a look at Asda's Privacy Policy by following this link:

http://groceries.asda.com/asda-estore/common/static/privacy-policycontainer.jsp

The Data Protection Act (DPA)

The DPA was introduced in 1998 and is all about protection peoples personal data.

Useful Terminology:
  • Personal Data covers both facts and opinions about a living person 
  • Data Subject is the person whose data has been collected (or is being collected from) 
  • Data Processor/ Data User is the person who uses/accesses/processes the data as part of their job. 
  • Data Controller this person has overall responsibility for the data and applies for permission to collect and store data. They must ensure that they abide by the DPA. 
  • Information Commissioner this is the person in Government who has overall responsibility for data in the UK. They advise companies and the Government on matter relating to DPA issues.
The 8 Principles:
  1. Personal data must be obtained and processed fairly and lawfully 
  2. Personal data can be held only for specified and lawful purposes 
  3. Personal data should be adequate relevant and not excessive for the required purpose 
  4. Personal data should be accurate and kept up to date 
  5. Personal data should not be kept for longer than is necessary 
  6. Data must be processed in accordance with the rights of the data subject 
  7. Appropriate security measures must be taken to protect against unauthorised access 
  8. Personal data cannot be transferred to countries outside the EU unless the country has similar legislation to the DPA 
Sensitive Data:
There are certain items of data that are deemed to be sensitive and covered by the law, these include: racial or ethnic origin; membership of a trade union; criminal convictions or offences; political views; religious beliefs

Your Rights:
As a data subject you have rights, these include: the right to access your data (there may be an admin charge); the right to rectify, remove or block inaccurate data; these are the most important ones, but there are others

Exemptions:
There are certain times when the data controllers have to make the data available, these are when the data is needed for matters of: National Security; Crime; Taxation; Health, Education and Social Work; Schools and Examinations.



Copyright Design & Patents Act Law

The Copyright, Design and Patents Act makes it a criminal offence to copy or steal media or other people's work or ideas.  For example, it is illegal to copy or distribute media (eg Music/Films/Software/Books etc) without a proper licence or the copyright owner's permission.  Also use purchased software on more computers than you have a licence for.



Computer Misuse Act

Prior to 1990 there were no laws to prevent people hacking; but in 1990 the Computer Misuse Act was passed.

The Computer Misuse Act (1990)

  1. Unauthorised access to computer material 
  2. Unauthorised access with intent to commit or facilitate a crime 
  3. Unauthorised modification of computer material
  4. (3a). Making, supplying or obtaining anything which can be used in computer misuse offences
For offences under point 1 carries the risk of being sentenced to six months in prison and/or a hefty fine. So next time you decide to log onto your mate’s area – THINK AGAIN! – you are actually breaking the law!

For offences under point 2 and 3 anyone risks up to a five year prison sentence and/or a hefty fine.

No comments:

Post a Comment