We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 2
Data protection protocols:protocoles that help keep user data safe.
Companies must make sure Info is:used In a Way that Is adequate relevant¬ excessive
accurate/kept for no longer than is absolutely necessary/handled according to people's data
protection rights/kept safe and secure/not transferred outside the EEA without adequate
Protection.
Under the DPA individuals whose data is stored by organisations have the right to:
object to decisions that are taken by automated means/have inaccurate personal data
rectified, blocked, erased or destroyediciaim compensation for damages caused by a breach
of the Aciaccess a copy of the information comprised of their personal data
|Copyright legislation/distrepution rights:Copyright is a legal power that provides the
lcreator of an original work with the sole authority to use and distribute it.
{Copyright owners can choose to distribute their works under licences that
lusers must pay for, such as when buying a music track or an app Copyright owners can also
{choose to cistribute their works undertree licences such as open source or Creative
[Commons licences, which allow the owner to distribute their work without payment
lExemption from copyright applies in some situations. an example of this is fair use.
[some examples of fair use are: coples of books made by libraries/educational
lestablishments, museums recordings of broadcasts non-commercial research or when used
lin parody.
Monitering individuals:Digital technologies can be used to monitor individuals. This has
benefits but it can also have significant drawbacks and Is considered controversial.
Individuals movements can be monitored using many methods: closed circuit televisior
(CCTVjwhich sometimes uses facial recognition software/automatic number plate
recognition(ANPR)cameras used by law enforcement agencies such as the police/
monitoring the use of identification cards, travel cards, passports at borders and bank card
transactions.Benefits:find people who are lost, especially young children/iocate nearby
friends in order to arrange to meet socially identify people on networks/keep travellers safe,
such by checking for potential crime at airports/verify individuals for financial transactions in
order to reduce financial crime. Drawbacks:compromising people's privacy the expense of
setting up,monitoring and maintaining systems/ energy consumption of the systems and the
effect on the environment/making people feel as though they are not trusted.
SUSTAINABILITY ISSUE ed
Power ‘The power is produced using non- Using renewable energies
requirements of renewable energies, which reduce * Using more energy-efficient
digital devices _the planet's natural resources. devices
‘* Building data centres next to
rivers to make use of natural
hydro-electric power
Use of poisonous When devices are thrown away, * Education
substances such these chemicals leak out and can» ‘Recycling schemes
as bromine, cause health risks to people's ‘+ Laws, such as the EU's Waste
mercury and cardiovascular and central nervous Electrical and Electronic
chlorine in digital systems and to wildlife; they may Equipment Directive
devices also cause cancer and lung disease» Using harmless alternative
materials for components
Uo /SBniyoIe
‘SISWIES| J9UJO PUB S9YdeS) Woy Loddns at
-ssa00e 0} S!ausea| Moje Sasunoo Bi
sal|s ma|nai Uo ajdoad Jauj0 40 yeIs doys ‘s1aworsno Aq sBuyes
oud sjonpoid auyjuonduosap ronpoid enonpoid ety Jo aBew! ue:210)s Ud anBo[ee9 sy,
0uas8)a1 pue sjeuinol auyjuo yo saue
‘anBoje}e9 jonpoid e asn Kay) ‘auljuc sdoys sasn e uayM “sionpoud
poueUy Jeyjo pue sueO| J0) BurA|dde/siajsueN pue sjueWuAed Bupjewys}ole eoueleq Sunes
seoueled Sunoaus :Bulnnioul ‘seoinlas eulluo AUEW SJaWOIsNd JIBUl Jeo SHURE,{transactional data data that is sent between digital devices track collect and analyse data
cookies information that a website leaves on a user's computer so that the website will
recognise that userwhen they use it again. enerypt protect information by putting it into a
lspecial code that only some people can read. An online transaction ocours whenever data Is
sent between devices on the intemet. Some of this transactional data can be tracked online
by network devices. This data is stored in cookies. It is possible to encrypt cookies when
they are transferred between devices online Examples of data that can be stored as
cookies include:the time and date of the transaction/IP addressesithe referring
lwebsite/items added to the user's online shopping basket/buttons pressed by the user
Cookies serve various functions in web browsing. They help websites remember user
preferences, track activity for analytics and advertising, and facilitate authentication to keep
users logged in. However, their use raises privacy and security concerns regarding tracking
and profiling without user consent, sparking debates about their regulation.
Online entertainment and leisure encompass a wide range of activities. Examples include
streaming services like Netflix and Spotify, social media platforms such as Facebook and
Instagram, online gaming platforms like Steam and Xbox Live, and content-sharing sites lke]
YouTube and Twitch. These platforms offer various forms of entertainment and relaxation,
catering to different interests and preferences.
Laws regarding cookies govern their usage and protection of user data on the internet.
Examples Include the GDPR (General Data Protection Regulation) In the European Union,
which mandates explicit user consent for cookie usage and requires websites to provide
clear information about their use of cookies. Similarly, the CCPA (California Consumer
Privacy Act) in the United States gives users the right to opt out of the sale of their personal
information, including data collected through cookies. These laws aim to enhance user
v nsure transparency in onl
User-generated sites are platforms where users create and share content. Examples Include
social media sites like Facebook, Twitter, and Instagram, where users post updates, photos,
and videos; content-sharing platforms like YouTube and TikTok, where users upload and
share thelr own videos; and community-driven forums like Reddit and Quora, where users
engage in discussions and share knowledge on various topics. These sites empower users
to contribute their own content, fostering communities and enabling diverse forms of
expression and interaction online.
Cookies can be utilized to display relevant information to users by storing their preferences
land browsing history. Websites can use cookies to remember user settings, such as
language preferences or customized layouts, ensuring a personalized experience upon
return visits. Additionally, cookies can track user activity and interests, enabling websites to
display targeted content or recommendations based on their browsing behavior. For
lexample, an e-commerce site can use cookies to suggest products similar to those
previously viewed by the user. By leveraging this data, cookies help tallor the user
lexperience, providing content that is more likely to be of interest and relevance to individual
users.
[Encryption is a method used to secure sensitive data by converting it into an unreadable
|format that can only be decrypted with the appropriate key or password, It ensures
lconfidentiality and protects information from unauthorized access or interception during
Iransmission or storage. Examples of encryption techniques include symmetric encryption,
|where the same key is used for both encryption and decryption, and asymmetric encryption,
|which involves using a pair of keys: a public key for encryption and a private key for
ldecryption. Encryption is crucial for safeguarding data privacy and security in various.
lapplications such as online transactions, communication, and data storage.
a
a FSO GETS DAI RT ORRATEG>
LomadjosauNnyA spoyoUANONLOU RAMA, DSPAN =
slonequruauno pur staan RascHNOUe) SPAN =
‘uaurte ap pen,
eniduouoena oj uoneanent
‘snap ay +
sumjanns +
weywoyvomaog +
Jeyew g
swopaaiy 0s»
ano aane00