Computing, Society, and the Law

1. Data Protection Act (DPA) 2018 / UK GDPR

Benefits (Pro-Law)

  • Increased Rights and Control: Grants data subjects rights such as access and erasure, empowering individuals.
  • Increased Accountability: Organisations face legal responsibility and significant fines for misuse or breaches.
  • Consumer Trust: Establishes confidence in the ethical handling of sensitive personal data.

Limitations / Risks (Critical View)

  • Compliance Burden: High administrative and financial costs for SMEs may stifle innovation.
  • Global Enforcement Issues: Difficult to enforce against multinational corporations operating across jurisdictions.
  • Right to Be Forgotten Challenges: Technically difficult to implement across distributed systems (e.g. blockchain).

Essay Talking Points

  • Is consent genuinely “freely given” when services are essential or policies unreadable?
  • Does strong security create safer systems, or just more valuable targets for attackers?
  • Can data collected for one purpose be ethically repurposed later?

2. Computer Misuse Act (CMA) 1990

Benefits (Pro-Law)

  • Deterrence of Cybercrime: Provides a clear framework to prosecute unauthorised access and modification.
  • Protection of Digital Infrastructure: Supports investment in software and systems by protecting integrity.

Limitations / Risks (Critical View)

  • Hinders Security Research: Ethical hacking may be criminalised under strict interpretations.
  • Botnet and Scale Issues: Struggles to address distributed, international, automated attacks.
  • Outdated Foundations: Written before widespread internet use, raising questions about modern relevance.

Essay Talking Points

  • How should intent (mens rea) be assessed in hacking cases?
  • Does the Act adequately cover DDoS attacks and deepfakes?

Benefits (Pro-Law)

  • Incentivises Innovation: Exclusive rights encourage R&D and creative output.
  • Protects Livelihoods: Guards against piracy, supporting creators and developers.

Limitations / Risks (Critical View)

  • Stifles Creativity (“Culture Tax”): Restricts remixing, sampling, and educational reuse.
  • Digital Rights Management (DRM): Can limit legitimate consumer fair use.

Essay Talking Points

  • Should software and algorithms be patentable?
  • Does open-source development undermine the need for strict copyright?

4. Regulation of Investigatory Powers Act (RIPA) 2000

Benefits (Pro-Law)

  • National Security: Enables lawful interception under judicial oversight for serious threats.
  • Cybercrime Investigation: Compels assistance from ISPs and individuals during investigations.

Limitations / Risks (Critical View)

  • Erosion of Privacy: Enables mass surveillance and potential abuse of power.
  • Chilling Effect: Awareness of monitoring may discourage free expression.

Essay Talking Points

  • Do encryption backdoors weaken national cybersecurity?
  • Should citizens have the right to know if they were surveilled?