E-waste Discarded electronic equipment including computer technology mobile devices etc
Carbon footprint Carbon dioxide produced as a result of consuming energy
The Basel Convention A treaty designed to protect developing countries from e-waste from developed countries (USA Europe etc)
Personal data Information that is personal and unique to an individual
Identity theft Stealing someones personal details in order to commit fraud or another crime
GDPR (2018) Law that controls how organisations can use personal data they have gathered
Big data' A term for the huge amounts of personal data that is gathered and analysed from online activities
Computer Misuse Act (1990) Law that defines these crimes: 1 - unauthorised access to a computer system 2 - unauthorised access to commit further crimes (identity theft) 3 - intentional destruction of data (eg. installing a virus)
Copyright Designs and Patents Act (1988) Law that makes it illegal to copy or modify intellectual property without permission
Proprietary software Software that is paid for not open for modification
Open-source software Software that is free can be modified by users
Algorithmic bias occurs when a computing innovation systematically discriminates against certain individuals or groups and creates unfair outcomes for some and favorable outcomes for others.
Artificial intelligence A scientific field that focuses on creating machines capable of performing activities that require intelligence when they are done by people.
Machine Learning A type of artificial intelligence that leverages massive amounts of data so that computers can improve the accuracy of actions and predictions on their own without additional programming.
Ethics The principles of right and wrong that guide an individual in making decisions
Software Licensing Defines the permissions rights and restrictions assigned to the person who purchases a copy of software
cybersecurity Measures taken to protect a computer or computer system against unauthorized access or attack
Cyber attack An attempt by hackers to damage or destroy a computer network or system
Malware Software that is intended to damage or disable computers and computer systems.
Cloud computing A system in which all data is stored on a central server owned by a company (e.g. Google) and accessed virtually
Social engineering Techniques that trick a person into disclosing confidential information
Worm A software program capable of reproducing itself that can spread from one computer to the next over a network
Virus A piece of code that is capable of copying itself and typically has a detrimental effect such as corrupting the system or destroying data
Trojan a program disguised as a harmless application that actually produces harmful results.
Baiting A victim is enticed by the offer of something for free; a music download or a free game for example
Ransomware A type of malicious software designed to block access to a computer system until a sum of money is paid.
Quid pro quo Something given in exchange or return for something else
Replacement cycle The period of time between the purchase of a product and its replacement with an equivalent product.
Data breach The unintended release of sensitive data or the access of sensitive data by unauthorized individuals.
Data subject The individual about whom information is being processed such as the patient at a medical facility the employee of a company or the customer of a retail store.
Intellectual property A product of the intellect such as an expressed idea or concept that has commercial value.
Trademark A brand that has exclusive legal protection for both its brand name and its design
Spyware Software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
Encryption Process of converting readable data into unreadable characters to prevent unauthorized access.
Phishing An attack that sends an email that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information
Pretexting A form of social engineering in which one individual lies to obtain confidential data about another individual
Software patch A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program
Anti-malware A utility that searches for and removes any malware on a computer.
Backup and Recovery Plan Backup - An exact copy of a system's information Recovery - The ability to get a system up and running in the event of a system crash or failure
Acceptable Use Policy (AUP) Requires a user to agree to follow it to be provided access to corporate email information systems and the Internet