legal, ethical, environmental, economic and social implications
TRANSCRIPT
Legal,Ethical,Environmental, Economic and Social
Implications
Intellectual Property Rights
Copyright, Patent, Design and Trademarks and Design Rights and Registered Designs all fall under the Intellectual Property Rights
Used to help individuals stop the theft or copying of the following: The name or products or brands The design or look of products Inventions Written, made or produced
Protecting Intellectual Property Rights For an organsation or individual to be protected under the IPR they
must have created or purchased the item in question.
Once these terms have been fulfilled, the product is yours to work, change, market as you please.
Any disputes can be settled with license agreement, mediation or legal action.
Type of Protection Example of IPR Time allowed Trademarks Product Names 4 monthsRegistered Designs Appearance of a
product, including packaging
1 month
Patents Inventions and products
Approx. 5 years
Storage of User Data
The following 8 principals of the Data Protection Act need to be fulfilled when storing user data: Be processed fairly and lawfully Be processed for specified lawful purposes Be adequate, relevant and not excessive Be accurate and up to date Not be kept longer than is necessary Be processed in accordance with the rights of individuals Be kept secure Not be transferred outside the European Economic Area with adequate
protection.
Energy (Data Centres, Low Carbon Equipment) Increased usage of digital systems, these data centres are generating
a large amount of heat and require specialised cooling systems. These data centres are using technology to reduce their energy usage
and to reduce carbon emissions. The European Union has established a Code of Conduct for Energy Efficiency in Data Centres.
Low Carbon Equipment required clear labeling under the European Regulations:
Online Marketing – Web, E-mail and Text Online marketing is an umbrella term for marketing of products and
services using digital technology to create sales. This is done by interacting with advertisements or signing up for free
trials on web sites. This then provides marketers with contact information for direct marketing via e-mail/instant message or SMS.
Cookie Tracking is when the user’s activity is tracked over time and used to show or send the user advisements based on their interests and web use.
Cookie Tracking
Analytics
Companies use this tool to understand the behaviour of users of their websites.
Data on websites, the number of visits, the time a user spent on each page.
This data can then be displayed in a visual manner, using analytics, to identify useful business insights.
Cyber Security risks and precautions
Cyber Security can be broken down into the following three areas: Cyber Crime – Intention of taking money, data or to cause disruption. Cyber War –Sabotage or espionage to cause disruption or to extract data. Cyber Terror – to conduct terrorist activities through cyberspace.
Cyber Crime is used to attack software and computers: Software – Viruses, Malware/Spyware, Worms and Trojans. Computers (used to gather/steal data) – Phishing, Pharming, Drive by,
MITM and Social Engineering.
Cyber Prevention
Cyber crime can be prevented using the following tools/approaches: Anti-virus/anti-malware software to prevent, detect and remove infections. Secure passwords for all sites and services. Encryption to prevent access from malware. Use biometrics (such as fingerprint or face recognition) to prevent access
to devices. SSL (Secure Socket Layer) is enabled when carrying out transactions
online. Firewall to protect network from unauthorised incoming and outgoing data
traffic. Recognising dangers and help protect against attack.
Tracking, Privacy, Online Safety and the ‘Right to be Forgotten’ Having our online activity tracks is a potential threat to our privacy
and online safety. Advertisers, internet service providers and social media companies
use our online behaviours to profile us as individual users and then target their marketing materials such as adverts and offers at us.
The "Right to be forgotten” forces Internet search providers to remove search results which point to articles/information which relate to personal data about a certain individual.
Read the ‘Right to be Forgotten’ fact sheet for more information.
Social Media
Social Media is a range of online communications tools, common platforms such as Facebook, Twitter, Youtube, Instagram, Tumblr encourage users to share images, videos and text based content.
These businesses connect millions of people together and make profits from advertising and selling data about their users.
There are a number of legal issues surround this: Libel – if an allegation about someone is made you can be sued for libel. Malicious Communications – if "grossly offensive" remarks are made on
social media you can be charged under the Communications Act 1988. Breach of Copyright - posting images that you don't own the copyright to.
Cyber Bullying and Internet Trolling
Cyber Bullying involves abuse of another person using threats, insults and hurtful remarks and messages over the internet.
Internet trolls post messages and comments that try to evoke an emotional response from other people.
Big Data
Big Data refers to collecting and analysing large amounts of data, for example: Supermarkets are using data from social media for their loyalty card to
detect changes buying patterns. Google's self-driving car analyses data from sensor and cameras in real
time. Hospital unit that looks after premature and sick babies is generating a live
stream of every heartbeat. Security services are combining data from social media, CCTV cameras,
phone calls and texts to track down criminals and predict the next terrorist attack.
What you need to know…
You should know be able to describe and consider the implications of: Intellectual property rights relating to the development of technologies Social control via data and media; Issues relating to the storage of large amounts of user data Intelligent systems Energy consumption Online marketing including (web, email and text/SMS/IM) Data analytics Tracking, privacy and online safety Social media/networking Big data