← Back to CS Hub
Topic 5 — Paper 1

Issues & Impact

Ethical, legal, environmental & cultural issues — understand the wider impact of technology on society.

0
Activities
0
Correct
0
Streak

📖 Core Theory

Key definitions, concepts, and terminology for Topic 5

🔑
Key Definitions
Ethical Issues
Questions about what is morally right or wrong regarding the use of technology.
Legal Issues
Matters relating to laws and regulations governing the use of technology.
Environmental Impact
The effect of technology on the natural environment (e-waste, energy use, carbon footprint).
Cultural Issues
How technology affects the way people live, communicate and interact across different societies.
Data Protection Act (2018)
UK law controlling how personal data is collected, stored, used and shared. Incorporates GDPR.
Computer Misuse Act (1990)
Makes it illegal to gain unauthorised access to computer systems, modify data without permission, or create malware.
Copyright, Designs & Patents Act (1988)
Protects the intellectual property of creators — illegal to copy, distribute or modify without permission.
Creative Commons
A licensing system that allows creators to share their work with specific permissions.
Open Source Software
Source code is freely available to view, modify and distribute (e.g., Linux, Firefox).
Proprietary Software
Source code is owned by a company and cannot be viewed or modified (e.g., Windows, Photoshop).
Digital Divide
The gap between those who have access to technology and those who do not.
E-waste
Electronic waste — discarded devices that contain hazardous materials.
Carbon Footprint
The total amount of greenhouse gases produced by manufacturing and using technology.
Privacy
An individual’s right to control their personal information.
Surveillance
Monitoring of individuals’ activities, often using cameras, tracking or data collection.
Cookies
Small text files stored by websites on a user’s device to track preferences or activity.
GDPR
General Data Protection Regulation — EU/UK regulation giving individuals rights over their personal data.
🌍
Real-World Examples & Case Studies

The Three Laws — Real Cases

Data Protection Act 2018 (DPA) / GDPR — Real Cases

What it does: Protects personal data — organisations must keep data secure, accurate, and only use it for the stated purpose. Individuals have the right to see their data, have it corrected, or deleted.

Real Case

In 2023, TikTok was fined £12.7 million by the ICO for collecting data from children under 13 without parental consent. This breached the principle of “lawfulness, fairness and transparency.”

School Example: Your school holds your grades, address, and medical info. Under DPA, they can only share this with people who need it (teachers, exam boards), must keep it secure, and must delete it when you leave.

Computer Misuse Act 1990 (CMA) — Real Cases

What it does: Makes it illegal to (1) access a computer without authorisation, (2) access a computer to commit further crime, (3) modify data without authorisation (e.g., installing malware, deleting files).

Real Case

In 2017, Marcus Hutchins (MalwareTech) accidentally became famous for stopping the WannaCry ransomware attack. The attackers who created WannaCry committed offences under all three sections of the CMA.

School Example: Logging into a teacher’s computer without permission = Section 1. Looking at unreleased exam papers = Section 2. Changing your grades = Section 3.

Copyright, Designs & Patents Act 1988 — Real Cases

What it does: Protects the creators of original works (music, software, books, art) from having their work copied without permission.

Real Case

Napster (2001) was shut down for enabling illegal music sharing. Today, Creative Commons licences let creators choose how their work can be shared (some allow free use with attribution).

School Example: Copying code from GitHub without checking the licence, downloading pirated films/games, or submitting someone else’s coursework as your own.

Ethical Issues — Real Scenarios

AI Bias

Amazon’s AI recruitment tool (2018) was found to discriminate against women because it was trained on 10 years of CVs — mostly from men. This shows technology can amplify existing biases.

Exam Link

This is a good example of an ethical issue — the technology isn’t breaking a law, but it is causing unfair outcomes. Questions may ask you to discuss whether AI should be used in hiring decisions.

Surveillance

China’s social credit system monitors citizens’ behaviour and assigns scores that affect their access to services.

Ethical Question

Is mass surveillance acceptable if it reduces crime? There is no right or wrong answer — but in the exam you must give reasoned arguments for both sides.

Automation & Jobs

Self-checkout machines replace cashiers. Self-driving cars threaten taxi/lorry drivers. But new tech jobs are created (data scientists, AI engineers).

Ethical Question

Is this a net positive? Technology destroys some jobs but creates others. In the exam, discuss both sides and consider who benefits and who is disadvantaged.

Social Media & Mental Health

Algorithms show content designed to keep you scrolling (engagement-maximising). This can create filter bubbles and spread misinformation. Facebook’s own research showed Instagram harms teenage mental health.

Key Point

Filter bubbles mean you only see content that reinforces your existing views. This is both a cultural issue (changing how people communicate) and an ethical issue (companies prioritise profit over user wellbeing).

Environmental Impact — The Numbers

E-waste & Energy Use — Key Statistics
  • E-waste: Only 17% of electronic waste is properly recycled globally. The rest goes to landfill, leaking toxic metals (lead, mercury, cadmium) into soil and water.
  • Energy use: Data centres (where cloud services run) consume about 1–2% of global electricity. A single Google search uses about 0.3 Wh of energy. Training a large AI model can emit as much CO2 as five cars over their lifetimes.
  • Positive impacts: Video conferencing reduces travel (fewer flights/car journeys). Smart energy systems optimise electricity use. Digital documents reduce paper waste.
  • Planned obsolescence: Some argue manufacturers deliberately make devices that become slow or unsupported after a few years, forcing upgrades and creating more waste.

Digital Divide

What is the Digital Divide?

What it is: The gap between people who have access to technology and those who don’t.

Causes: Cost of devices/broadband, rural areas with poor connectivity, age (elderly less likely to use tech), disability (not all websites are accessible).

Real Case

During COVID lockdowns, students without laptops/internet at home fell behind in education. The UK government provided 1.3 million laptops to disadvantaged students.

Global Divide: In sub-Saharan Africa, only about 33% of people have internet access, compared to over 90% in the UK.

💡
Key Points
Key Point

The three main UK computing laws are: Data Protection Act (2018), Computer Misuse Act (1990), and Copyright, Designs & Patents Act (1988).

Key Point

Technology has both positive and negative impacts — exam questions often ask you to ‘discuss’ both sides.

⚖️
UK Computing Laws
Data Protection Act (2018) — 6 Principles

The DPA 2018 incorporates GDPR into UK law. Organisations that collect personal data must follow these 6 principles:

  1. Lawfulness, fairness and transparency — data must be processed legally and openly.
  2. Purpose limitation — data can only be collected for a specific, stated purpose.
  3. Data minimisation — only the data that is necessary should be collected.
  4. Accuracy — personal data must be kept accurate and up to date.
  5. Storage limitation — data should not be kept for longer than needed.
  6. Security — data must be protected against unauthorised access, loss or damage.
Key Point

Under GDPR, individuals have the right to access their data, request correction, and request deletion (‘right to be forgotten’).

Computer Misuse Act (1990) — 3 Offences

The CMA defines three levels of offence:

  1. Unauthorised access to computer material — e.g., accessing someone else’s account without permission. Even if no damage is done, this is still an offence.
  2. Unauthorised access with intent to commit a further offence — e.g., hacking into a bank’s system to steal money or commit fraud.
  3. Unauthorised modification of computer material — e.g., creating and distributing malware/viruses, deleting or altering files without permission.
Key Point

Just accessing a computer system without permission is illegal, even if you don’t change or damage anything.

Copyright, Designs & Patents Act (1988)

This law protects the intellectual property of creators. It covers:

  • Software code, music, films, images, text and other creative works
  • It is illegal to copy, distribute, or modify copyrighted work without the owner’s permission
  • Penalties include fines and imprisonment

Creative Commons is an alternative licensing system that allows creators to share work with specific permissions (e.g., allow non-commercial use, require attribution).

Key Point

Downloading pirated software, music or films is a breach of the Copyright Act, even if it is freely available online.

💻
Open Source vs Proprietary Software
Open Source vs Proprietary — Advantages & Disadvantages

Open Source

Advantages:

  • Free to download and use
  • Source code can be viewed, modified and improved
  • Community can find and fix bugs quickly
  • Can be customised to meet specific needs

Disadvantages:

  • May lack professional support/documentation
  • Can be less user-friendly
  • May have compatibility issues
  • Quality can vary

Proprietary

Advantages:

  • Professional technical support available
  • Thoroughly tested and reliable
  • Regular, managed updates
  • Usually more user-friendly

Disadvantages:

  • Costs money (licence/subscription)
  • Source code is hidden — can’t be modified
  • Users must wait for the company to fix bugs
  • Less customisable

Comparison Walkthrough

Open Source (e.g., Linux, LibreOffice, Firefox, Python)

  • ✓ Free to use, modify, and distribute
  • ✓ Source code is available — community can fix bugs and add features
  • ✓ No vendor lock-in — you’re not dependent on one company
  • ✗ No guaranteed support — rely on community forums
  • ✗ May have a steeper learning curve
  • ✗ Could contain security vulnerabilities visible in public code

Proprietary (e.g., Windows, Microsoft Office, Adobe Photoshop)

  • ✓ Dedicated customer support and regular updates
  • ✓ Often more user-friendly and polished
  • ✓ Tested thoroughly before release
  • ✗ Costs money (often subscription-based now)
  • ✗ Source code is secret — can’t customise it
  • ✗ Vendor lock-in — you depend on the company continuing to support it
Real Example

Schools often face this choice: Use Google Workspace (free) vs Microsoft 365 (paid but familiar). Use Linux on old computers (free, lighter) vs buying new Windows licences. These decisions involve cost, usability, and long-term support.

🌍
Environmental & Social Impact
Environmental Impacts of Technology

Positive

  • Smart energy systems reduce waste and optimise power usage
  • Remote working reduces commuting and transport emissions
  • Digital documents reduce paper usage
  • Sensors and IoT can monitor and protect environments

Negative

  • E-waste contains toxic materials (lead, mercury, cadmium) that pollute land and water
  • Data centres consume huge amounts of electricity for computing and cooling
  • Mining rare earth minerals destroys habitats and ecosystems
  • Manufacturing devices has a large carbon footprint
Privacy and Surveillance Debate

Arguments For Surveillance

  • Helps prevent and investigate crime
  • Can protect national security
  • CCTV can make public spaces safer
  • Can help find missing people

Arguments Against Surveillance

  • Violates individuals’ right to privacy
  • Data could be misused or hacked
  • Can create a ‘surveillance state’ culture of fear
  • Facial recognition can have bias and errors
Key Point

Exam questions on privacy and surveillance often ask you to ‘discuss’ — you must give arguments for AND against, then offer a balanced conclusion.

Privacy vs Security Debate — Walkthrough

FOR More Surveillance

  • Prevents terrorism and serious crime
  • “Nothing to hide, nothing to fear”
  • Can help find missing people quickly
  • Companies can provide better, personalised services

AGAINST More Surveillance

  • Fundamental right to privacy (Article 8, Human Rights Act)
  • Chilling effect — people self-censor if they know they’re watched
  • Data breaches mean personal info can be stolen
  • Slippery slope — where does monitoring end?
Real Example

The UK’s Investigatory Powers Act 2016 (“Snoopers’ Charter”) requires ISPs to store everyone’s browsing history for 12 months. Government agencies can access it with a warrant. Supporters say it helps catch criminals. Critics say it is mass surveillance of innocent people.

Cookies Explained

  • First-party cookies: Set by the website you’re visiting (e.g., keeping you logged in, saving your basket). Generally harmless.
  • Third-party cookies: Set by advertisers/trackers embedded in the website. They follow you across different sites to build a profile of your interests. This is why you see ads for things you recently searched for.
  • GDPR & cookies: GDPR requires websites to get your consent before using non-essential cookies — that’s why you see cookie banners everywhere.
🎯
Exam Tips for Topic 5
Key Exam Tips

Use these strategies to maximise your marks on Topic 5 questions:

  • “Discuss” questions require BOTH sides of the argument — always give advantages AND disadvantages.
  • Name the SPECIFIC law — don’t just say “it’s illegal.” Say “This breaches Section 1 of the Computer Misuse Act.”
  • Environmental questions: mention BOTH negative (e-waste, energy use) AND positive (less travel, digital docs) impacts.
  • For 6-mark questions, use the structure: Point → Example → Explain the impact.
  • Cultural/ethical questions don’t have right/wrong answers — but you must give REASONED arguments.
  • Open source vs proprietary: learn 3 advantages and 3 disadvantages of each.

🔍 Explore & Analyse

Apply your knowledge to real-world scenarios

🔎
Scenario Analyser

For each scenario, select all the issue types that apply, then click Check to see the explanation.

⚖️
Law Matcher

Click an offence, then click the correct law it falls under.

Offences / Scenarios

Laws

🧩 Guided Practice

Apply your knowledge with hints available

📂
Categorise: Ethical, Legal, Environmental, or Cultural

Drag each item into the correct category.

Items to sort:

💻
Categorise: Open Source vs Proprietary

Drag each item into the correct category.

Items to sort:

✏️
Fill in the Blanks: Key Concepts

Complete each sentence. Click the hint button if you get stuck.

🧠 Retrieval Practice

Test your memory by matching terms with definitions

🃏
Memory Match

Find all 8 matching pairs. Click two cards to flip them.

📝 Exam Practice

Build answers using sentence banks, then reveal the mark scheme

⚡ Challenge

No hints, no help — prove your mastery

Time Remaining:
5:00

📊 Performance Review

See how you performed across each sub-topic

Overall Performance

0%

Complete activities to see your results