Comprehensive Analysis: Computers, Society and Law Legal Issues Report
VerifiedAdded on  2022/12/29
|10
|2649
|84
Report
AI Summary
This report delves into the legal issues arising from the intersection of computers, society, and law. It begins by addressing legal considerations for network and server quality, emphasizing data privacy and security within organizations, and potential contractual issues. The report then examines legal aspects of data protection, including privacy, security, and the proper handling of personal data, and the role of expert witnesses in court cases involving digital evidence, including potential liabilities. Finally, it discusses the legal protection of inventions, particularly software, covering issues of long-term protection, discussions with investors, and the challenges posed by competitors in the market. The report provides a comprehensive overview of the legal landscape surrounding technology and its societal impact, offering insights into key challenges and potential solutions.

Computers, Society and Law
1
1
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Contents
INTRODUCTION...........................................................................................................................3
TASK...............................................................................................................................................3
1) Situations.....................................................................................................................................3
2). Crime & Court............................................................................................................................6
3) The Invention..............................................................................................................................8
CONCLUSION................................................................................................................................9
REFERENCES..............................................................................................................................10
2
INTRODUCTION...........................................................................................................................3
TASK...............................................................................................................................................3
1) Situations.....................................................................................................................................3
2). Crime & Court............................................................................................................................6
3) The Invention..............................................................................................................................8
CONCLUSION................................................................................................................................9
REFERENCES..............................................................................................................................10
2

INTRODUCTION
The society for computers and Law exits to be encourage and develop both IT for layers and
related to the information technology. It is all about the information related the society which
include membership information in order to deal with different areas such as knowledge
management, IT dispute and property. This report will discuss about the legal issues or problem
which relates to the quality of network, server protecting the overall organizational. It will
identify the certain kind of legal issues that can help to protect data on the system. Furthermore,
this documentation will summarise about the legal issues which are relevant to the current
situation, identifying the significant role of expert witness in preparation for court and liability
that might arise from evidence based. However, it will describe about the legislation that can
help to protect or secure invention.
TASK
1) Situations
a) Discuss about the legal issues that are relevant to quality of network and servers for protecting
the organization in case, if arise the problem during installation.
There are several legal issues that needs to be considered before moving towards the
installation of multiple servers, networks. Some of them include whether sensitive data or
information would be safe and maintain protection at the time of installation. Because it is major
chances to increase the problem or issue during setups.
Generally, it should consider the most commonly legal issues that can use by Housing enterprise
during IT services.
Privacy and security- A council housing service provided company is allocating short-term and
longer term, maintaining or refurbishing building, manage the online payment etc. These are
different kind of facilities or services handle in proper manner (Benkler, 2017). As per given
scenario, housing service business has maintained the confidential information and ranging from
client list to trade secrets. It depend upon the quality of housing enterprise. It will be including
extensive security mechanism to ensure that every network, service protected.
3
The society for computers and Law exits to be encourage and develop both IT for layers and
related to the information technology. It is all about the information related the society which
include membership information in order to deal with different areas such as knowledge
management, IT dispute and property. This report will discuss about the legal issues or problem
which relates to the quality of network, server protecting the overall organizational. It will
identify the certain kind of legal issues that can help to protect data on the system. Furthermore,
this documentation will summarise about the legal issues which are relevant to the current
situation, identifying the significant role of expert witness in preparation for court and liability
that might arise from evidence based. However, it will describe about the legislation that can
help to protect or secure invention.
TASK
1) Situations
a) Discuss about the legal issues that are relevant to quality of network and servers for protecting
the organization in case, if arise the problem during installation.
There are several legal issues that needs to be considered before moving towards the
installation of multiple servers, networks. Some of them include whether sensitive data or
information would be safe and maintain protection at the time of installation. Because it is major
chances to increase the problem or issue during setups.
Generally, it should consider the most commonly legal issues that can use by Housing enterprise
during IT services.
Privacy and security- A council housing service provided company is allocating short-term and
longer term, maintaining or refurbishing building, manage the online payment etc. These are
different kind of facilities or services handle in proper manner (Benkler, 2017). As per given
scenario, housing service business has maintained the confidential information and ranging from
client list to trade secrets. It depend upon the quality of housing enterprise. It will be including
extensive security mechanism to ensure that every network, service protected.
3
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

Service and Reliability- if all different files, email and data are run through server or network.
Therefore, it would require to maintain smooth operations of enterprise which become reliant on
the IT system. For Example- network engineer have identified the technical problem during
installation so that entire business could be slow down for particular period of time
(Brownsword, 2019). In this way, it is very important to manage or control multiple server,
backups of data, recommend that still have access to the sensitive information or data.
Additionally, Housing Service Company will consider contractual issues including
timeliness of delivery, quality, meeting requirements. In case, the particular choice of supplier is
directly affecting on the legal position of enterprise.
According to the contract, the primary responsibility of procurement officers, requisitioner that
will support for monitors performance, collects information and measure actual contract
achievement. In this way, each and every resources are devoted to different task, technique used
to performance them. Therefore, it should maintain the network equipment’s while delivering the
specific requirement of client within specific time intervals.
b) Describe about the legal issues relevant to protect data on the systems.
There are different kind of legal issues applicable in term of data protection within IT
system.
Data Privacy- It is one of the important aspect for potential consumer in context of data breach
that can directly damage an individual’s fundamental rights, freedoms. Sometimes, it including a
major risk of determine theft and other kind of fraud. But privacy concern is an essential part for
organization to reduce the unauthorised collection, processing and inadequate protection of
personal information or data (De Wolf, 2017). That’s why, data privacy is consider as legal
issues that need to applicable as suitable approach in order to provide better protection. For
Example- A housing IT team can provide the grants the right of action, if a data breach occurs
and not encrypted or anonymised.
4
Therefore, it would require to maintain smooth operations of enterprise which become reliant on
the IT system. For Example- network engineer have identified the technical problem during
installation so that entire business could be slow down for particular period of time
(Brownsword, 2019). In this way, it is very important to manage or control multiple server,
backups of data, recommend that still have access to the sensitive information or data.
Additionally, Housing Service Company will consider contractual issues including
timeliness of delivery, quality, meeting requirements. In case, the particular choice of supplier is
directly affecting on the legal position of enterprise.
According to the contract, the primary responsibility of procurement officers, requisitioner that
will support for monitors performance, collects information and measure actual contract
achievement. In this way, each and every resources are devoted to different task, technique used
to performance them. Therefore, it should maintain the network equipment’s while delivering the
specific requirement of client within specific time intervals.
b) Describe about the legal issues relevant to protect data on the systems.
There are different kind of legal issues applicable in term of data protection within IT
system.
Data Privacy- It is one of the important aspect for potential consumer in context of data breach
that can directly damage an individual’s fundamental rights, freedoms. Sometimes, it including a
major risk of determine theft and other kind of fraud. But privacy concern is an essential part for
organization to reduce the unauthorised collection, processing and inadequate protection of
personal information or data (De Wolf, 2017). That’s why, data privacy is consider as legal
issues that need to applicable as suitable approach in order to provide better protection. For
Example- A housing IT team can provide the grants the right of action, if a data breach occurs
and not encrypted or anonymised.
4
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

Security- According to the given scenario, the first duty of housing enterprise is to protect the
personal information for potential consumers. In order to fulfil all protection against the servers,
network because there are various unauthorised illegal activities performed by hackers, attackers.
These are directly affecting on the entire network system of organization (Ejlali, 2020).
Therefore, it should require to enforce legal rights, policies and obligation to reduce the any kind
of problem. IT system manager as participating important role to control the security issues
while managing or controlling overlapping within centralised network system.
Handing personal data correctly- According to case study, housing enterprise has been
implemented to the section in which provide insight into personal data handling issues.
Afterwards, it also enforcement on the basis of public right while handling the sensitive
information for consumer within network system. it continuously transferred the information
from one network to another device. In this way, it provide the direction in development of
policy and training on legal aspects regardless security. IT team can give advice of manager to
allocate as qualified legal counsel at the time of problem arise.
The possibility of using cloud service- Housing service based enterprise can use cloud
computing for purpose to gain more advantages, benefits for organization. But at certain level, it
brings come legal issue that must be taken as serious consideration. It could be a risk of third
party involvement (Gervassis, 2020). Whenever, it can use as multi-tenant shared cloud through
IT administration interface. So make sure that multi factor authentication which are enhancing
the presence of security. Within cloud network, there are large amount of data or information
stored. It might be compromised with data breach. Therefore, it should include as security breach
disclosure legalisation or laws. It can help to provide the accurate information for potential
consumers and also protecting the data in proper manner.
5
personal information for potential consumers. In order to fulfil all protection against the servers,
network because there are various unauthorised illegal activities performed by hackers, attackers.
These are directly affecting on the entire network system of organization (Ejlali, 2020).
Therefore, it should require to enforce legal rights, policies and obligation to reduce the any kind
of problem. IT system manager as participating important role to control the security issues
while managing or controlling overlapping within centralised network system.
Handing personal data correctly- According to case study, housing enterprise has been
implemented to the section in which provide insight into personal data handling issues.
Afterwards, it also enforcement on the basis of public right while handling the sensitive
information for consumer within network system. it continuously transferred the information
from one network to another device. In this way, it provide the direction in development of
policy and training on legal aspects regardless security. IT team can give advice of manager to
allocate as qualified legal counsel at the time of problem arise.
The possibility of using cloud service- Housing service based enterprise can use cloud
computing for purpose to gain more advantages, benefits for organization. But at certain level, it
brings come legal issue that must be taken as serious consideration. It could be a risk of third
party involvement (Gervassis, 2020). Whenever, it can use as multi-tenant shared cloud through
IT administration interface. So make sure that multi factor authentication which are enhancing
the presence of security. Within cloud network, there are large amount of data or information
stored. It might be compromised with data breach. Therefore, it should include as security breach
disclosure legalisation or laws. It can help to provide the accurate information for potential
consumers and also protecting the data in proper manner.
5

2). Crime & Court
a. Summarise the legal issues relevant to the situation
As per given scenario, it has been identified that appear to incident images of children in
the internet cache on the disk. Another way, it has found many other photographs from fantasy
films by technicians. Computer system are not fully protected by passwords so that they can
easily share the photographs from another staff members. In this way, it may arise any kind of
illegal activities such as misuse of photographs.
Being cloud computing technician, he was approached to expert witness in implement as
data security laws, policies. Furthermore, technicians have been asked for expert to give advice
so that it can control the personal information from one person to another.
According to the legal rights, internet browser has been consider as subjective to legal
debate where arguments are offered in term of offence and possession. In given scenario, staff
members have been shared the photographs for particular children (Kurisu, Miura and
Moriguchi, 2020). at that time, it should include as data theft, misuse, data privacy and security
legal issues arise. Therefore, technicians needs to be coordinate with IT team to protect or secure
information while securing the machine. Thus, no one can see personal information and
protected with encrypted password.
b. Role of Expert witness
The primary role of expert witness in which identifying the details of event and critical
way to gather or collect evidence. Sometimes, legal expert can assume as witness testimony as
verbal account of event or knowledge regardless real facts relevant to the criminal activities.
Afterwards, it assists the investigator in the forming as reasonable action and applicable charges
to reach in the court.
6
a. Summarise the legal issues relevant to the situation
As per given scenario, it has been identified that appear to incident images of children in
the internet cache on the disk. Another way, it has found many other photographs from fantasy
films by technicians. Computer system are not fully protected by passwords so that they can
easily share the photographs from another staff members. In this way, it may arise any kind of
illegal activities such as misuse of photographs.
Being cloud computing technician, he was approached to expert witness in implement as
data security laws, policies. Furthermore, technicians have been asked for expert to give advice
so that it can control the personal information from one person to another.
According to the legal rights, internet browser has been consider as subjective to legal
debate where arguments are offered in term of offence and possession. In given scenario, staff
members have been shared the photographs for particular children (Kurisu, Miura and
Moriguchi, 2020). at that time, it should include as data theft, misuse, data privacy and security
legal issues arise. Therefore, technicians needs to be coordinate with IT team to protect or secure
information while securing the machine. Thus, no one can see personal information and
protected with encrypted password.
b. Role of Expert witness
The primary role of expert witness in which identifying the details of event and critical
way to gather or collect evidence. Sometimes, legal expert can assume as witness testimony as
verbal account of event or knowledge regardless real facts relevant to the criminal activities.
Afterwards, it assists the investigator in the forming as reasonable action and applicable charges
to reach in the court.
6
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

a) In preparation for court
Basically, legal advisor has been evolved regarding the witnesses, definitions, multiple
rules of evidence and protocols have developed. Usually, it can prepare for court so that
investigator to understand the certain situation or condition. Afterwards, it allows them to
evaluate witness and all collected evidence that will be acceptable to the courts
b) In court and any potential liability that might arise from expert’s evidence.
According to the case study, court should consider all evidence on the basis of witness as
technicians, who have found that different staff member can share information from one person
to another. The court will give more weight to evidence that comes from a person. Sometimes, it
is referred as third party eye witness but he was not associated with victim, suspect and any kind
or criminal events.
On the basis of expert advice, it will increase the liability regarding the witness for
negligent preparation of testimony. Court is also identifying that there are certain limits of
particular ruling against the criminal activities (Raychowdhury and Stryker, 2020). An expert
witness may have not be held as liable due to the opinion or view point of witness person. In
those circumstances, it will be enhancing the judicial process in which representation of different
views. Sometimes, differences within opinion will bot establish as liability in expert witness.
Additionally, there are several potential liability that might arise from expert’s evidence.
ï‚· Expert witnesses are become more reluctant in which provide different services. Court
will not reached at any conclusion and difficult to find out the justification.
ï‚· Expert witness provide the full evidence accordance with his own duty to the court but it
may arise with conflict with client (Kurisu, Miura and Moriguchi, 2020).
ï‚· Immunity of expert witness can go out of conjecture so that they will reluctant to perform
their duties towards court. It is not suitable according to the breach of duty or
responsibility.
7
Basically, legal advisor has been evolved regarding the witnesses, definitions, multiple
rules of evidence and protocols have developed. Usually, it can prepare for court so that
investigator to understand the certain situation or condition. Afterwards, it allows them to
evaluate witness and all collected evidence that will be acceptable to the courts
b) In court and any potential liability that might arise from expert’s evidence.
According to the case study, court should consider all evidence on the basis of witness as
technicians, who have found that different staff member can share information from one person
to another. The court will give more weight to evidence that comes from a person. Sometimes, it
is referred as third party eye witness but he was not associated with victim, suspect and any kind
or criminal events.
On the basis of expert advice, it will increase the liability regarding the witness for
negligent preparation of testimony. Court is also identifying that there are certain limits of
particular ruling against the criminal activities (Raychowdhury and Stryker, 2020). An expert
witness may have not be held as liable due to the opinion or view point of witness person. In
those circumstances, it will be enhancing the judicial process in which representation of different
views. Sometimes, differences within opinion will bot establish as liability in expert witness.
Additionally, there are several potential liability that might arise from expert’s evidence.
ï‚· Expert witnesses are become more reluctant in which provide different services. Court
will not reached at any conclusion and difficult to find out the justification.
ï‚· Expert witness provide the full evidence accordance with his own duty to the court but it
may arise with conflict with client (Kurisu, Miura and Moriguchi, 2020).
ï‚· Immunity of expert witness can go out of conjecture so that they will reluctant to perform
their duties towards court. It is not suitable according to the breach of duty or
responsibility.
7
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

3) The Invention
Discuss about how law can help protect invention
As per given study, being specialist to develop a prototype and now provide the brief
information about the best housing rental along with potential problem at properties such as
flood-risk, application planning and noise, traffic-levels etc.
a). Issues about long term protection of software
US patent system is largely treats all kind of innovation equally but it often work quietly
different within industries. If an individual person can design an application to find best housing
rental information. This type of application is supports for establishing an interaction with client,
who want a house rental services.
But in context of long term application protection, software patent have been created as
biggest or expensive problem. Start-up venture is getting approached by multiple patent trolls
with offers, they cannot refuse (Kurisu, Miura and Moriguchi, 2020). Software innovation is
consider as develop an effective commercial life of only few years. Patents related issues are
directly affecting the commercial lifespan. It is important to applicable as adequate copyrights
pattern in order to provide better protection for software.
b). Discussion with bank or private investor
As per discussion, it has been analysed that data mining specialist has now focused on
both bank and private investor regarding funds. Therefore, they can use their housing rental
application and commercialise their software in marketplace (Raychowdhury and Stryker, 2020).
An individual person want to establish their start-up enterprise, which require to take legal
permission. In this way, it can be used the housing rental application for commercial purpose.
Afterwards, it will target the large number of population. For taking funds from bank or private
investor, it including legal aspects regardless of contract based whereas follows all kind of rules
and regulation.
8
Discuss about how law can help protect invention
As per given study, being specialist to develop a prototype and now provide the brief
information about the best housing rental along with potential problem at properties such as
flood-risk, application planning and noise, traffic-levels etc.
a). Issues about long term protection of software
US patent system is largely treats all kind of innovation equally but it often work quietly
different within industries. If an individual person can design an application to find best housing
rental information. This type of application is supports for establishing an interaction with client,
who want a house rental services.
But in context of long term application protection, software patent have been created as
biggest or expensive problem. Start-up venture is getting approached by multiple patent trolls
with offers, they cannot refuse (Kurisu, Miura and Moriguchi, 2020). Software innovation is
consider as develop an effective commercial life of only few years. Patents related issues are
directly affecting the commercial lifespan. It is important to applicable as adequate copyrights
pattern in order to provide better protection for software.
b). Discussion with bank or private investor
As per discussion, it has been analysed that data mining specialist has now focused on
both bank and private investor regarding funds. Therefore, they can use their housing rental
application and commercialise their software in marketplace (Raychowdhury and Stryker, 2020).
An individual person want to establish their start-up enterprise, which require to take legal
permission. In this way, it can be used the housing rental application for commercial purpose.
Afterwards, it will target the large number of population. For taking funds from bank or private
investor, it including legal aspects regardless of contract based whereas follows all kind of rules
and regulation.
8

c). Issues about relates data mining specialist who are becoming working as competitors
There are certain kind of issues arise when data mining specialist, who are becoming
working as competitors in marketplace.
Lower self-esteem:- the most recognition as well as incentive program which including highly
competition. But at certain point, it should only give rewards those are high performer. In this
way, it is very critical situation for data mining specialist to promote their housing rental
application in marketplace. Due to high competition, specialist can feel nervous and become
lower its self-esteem.
Focus on the wrong things:- A high competition is create an environment where specialist and
their staff members focused more on their competitors than their own work (Raychowdhury and
Stryker, 2020). In this way, it will increase the problem in order to imbalance coordination.
CONCLUSION
From above discussion, it has concluded that computer, society and law correlated with each
other, which can perform the legal aspects to protect or secure sensitive information for potential
consumers within system. In this report, it has summarised about legal issues or problem which
relates to the quality of network, server protecting the overall organizational. It can be identified
the legal issues such as data privacy, security, handling personal information, uses cloud
network. Explaining these legal issue that needs to be applicable within organization to protect
the entire system. Furthermore, in this documentation, it has been included the different legal
issues according to the current business situation or condition. Moreover, expert witness has
been performed the different duties to examine any kind of criminal activities. in order interact
with other legal authority to give more information or detailed.
9
There are certain kind of issues arise when data mining specialist, who are becoming
working as competitors in marketplace.
Lower self-esteem:- the most recognition as well as incentive program which including highly
competition. But at certain point, it should only give rewards those are high performer. In this
way, it is very critical situation for data mining specialist to promote their housing rental
application in marketplace. Due to high competition, specialist can feel nervous and become
lower its self-esteem.
Focus on the wrong things:- A high competition is create an environment where specialist and
their staff members focused more on their competitors than their own work (Raychowdhury and
Stryker, 2020). In this way, it will increase the problem in order to imbalance coordination.
CONCLUSION
From above discussion, it has concluded that computer, society and law correlated with each
other, which can perform the legal aspects to protect or secure sensitive information for potential
consumers within system. In this report, it has summarised about legal issues or problem which
relates to the quality of network, server protecting the overall organizational. It can be identified
the legal issues such as data privacy, security, handling personal information, uses cloud
network. Explaining these legal issue that needs to be applicable within organization to protect
the entire system. Furthermore, in this documentation, it has been included the different legal
issues according to the current business situation or condition. Moreover, expert witness has
been performed the different duties to examine any kind of criminal activities. in order interact
with other legal authority to give more information or detailed.
9
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

REFERENCES
Book and Journals
Benkler, Y., 2017. Law, innovation, and collaboration in networked economy and
society. Annual Review of Law and Social Science. 13. pp.231-250.
Brownsword, R., 2019. Law, Technology and Society: Reimagining the Regulatory Environment.
Routledge.
De Wolf, R., 2017. The potential impact of quantum computers on society. Ethics and
Information Technology. 19(4). pp.271-276.
Ejlali, A., 2020. Daemon computers versus clairvoyant computers: A pure theoretical viewpoint
towards energy consumption of computing. arXiv preprint arXiv:2011.09856.
Gervassis, N., 2020. Information biopolitics: copyright law and the regulation of life in the
network society. International Review of Law, Computers & Technology. pp.1-24.
Kurisu, K., Miura, J. and Moriguchi, Y., 2020. Hibernating behavior for household personal
computers. Resources, Conservation and Recycling. 162. p.105015.
Raychowdhury, I. and Stryker, J.R., 2020. Solving Gauss's law on digital quantum computers
with loop-string-hadron digitization. Physical Review Research. 2(3). p.033039.
10
Book and Journals
Benkler, Y., 2017. Law, innovation, and collaboration in networked economy and
society. Annual Review of Law and Social Science. 13. pp.231-250.
Brownsword, R., 2019. Law, Technology and Society: Reimagining the Regulatory Environment.
Routledge.
De Wolf, R., 2017. The potential impact of quantum computers on society. Ethics and
Information Technology. 19(4). pp.271-276.
Ejlali, A., 2020. Daemon computers versus clairvoyant computers: A pure theoretical viewpoint
towards energy consumption of computing. arXiv preprint arXiv:2011.09856.
Gervassis, N., 2020. Information biopolitics: copyright law and the regulation of life in the
network society. International Review of Law, Computers & Technology. pp.1-24.
Kurisu, K., Miura, J. and Moriguchi, Y., 2020. Hibernating behavior for household personal
computers. Resources, Conservation and Recycling. 162. p.105015.
Raychowdhury, I. and Stryker, J.R., 2020. Solving Gauss's law on digital quantum computers
with loop-string-hadron digitization. Physical Review Research. 2(3). p.033039.
10
1 out of 10
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.