Kramizo
Log inSign up free
HomeCIE IGCSE Computer ScienceEthics, privacy and intellectual property (impact of technology, computer-use policies, copyright, open-source vs proprietary software)
CIE · IGCSE · Computer Science · Revision Notes

Ethics, privacy and intellectual property (impact of technology, computer-use policies, copyright, open-source vs proprietary software)

2,451 words · Last updated May 2026

Ready to practise? Test yourself on Ethics, privacy and intellectual property (impact of technology, computer-use policies, copyright, open-source vs proprietary software) with instantly-marked questions.
Practice now →

What you'll learn

This revision guide covers the ethical, legal and societal impacts of technology as required for CIE IGCSE Computer Science. You'll learn about the responsibilities organisations and individuals have when using computers, how copyright protects digital content, and the key differences between proprietary and open-source software models. These topics frequently appear in Paper 1 and Paper 2, particularly in extended-response questions worth 4-6 marks.

Key terms and definitions

Copyright — legal protection automatically granted to original creative works (software, images, music, text) that prevents others from copying, distributing or modifying them without permission

Intellectual property — creations of the mind (inventions, designs, software, artistic works) that have commercial value and are protected by law through copyright, patents and trademarks

Open-source software — software where the source code is publicly available for anyone to view, modify and distribute, typically under licences like GPL or MIT

Proprietary software — software owned by an individual or company where the source code is kept secret and users must purchase licences to use it legally

Acceptable Use Policy (AUP) — a document that outlines the rules and responsibilities users must follow when accessing an organisation's computer systems and networks

Personal data — information relating to an identified or identifiable living individual, such as name, address, email, phone number or IP address

Data Protection Act — UK legislation (updated as Data Protection Act 2018, implementing GDPR) that governs how personal data must be collected, stored, processed and protected

Piracy — the illegal copying, distribution or use of copyrighted software, media or other digital content without permission from the rights holder

Core concepts

Impact of technology on society

Technology has transformed how we live, work and communicate, creating both benefits and challenges that affect individuals, businesses and society.

Positive impacts:

  • Communication — instant global communication through email, messaging apps and video calls enables collaboration across continents and maintains personal relationships
  • Access to information — search engines and online resources provide immediate access to vast knowledge, supporting education and research
  • Automation — repetitive tasks can be completed faster and more accurately by computers, increasing productivity in manufacturing, data processing and customer service
  • Healthcare advances — computer systems enable diagnostic imaging, patient record management, surgical robots and drug development simulations
  • Economic opportunities — online businesses, remote work and digital marketplaces create new employment and entrepreneurship possibilities

Negative impacts:

  • Job displacement — automation replaces workers in manufacturing, retail and administrative roles, particularly affecting those with routine-based jobs
  • Digital divide — inequality between those with access to technology and those without, creating disadvantages in education, employment and civic participation
  • Health concerns — prolonged computer use causes eye strain, repetitive strain injury (RSI), poor posture and reduced physical activity
  • Social isolation — excessive screen time reduces face-to-face interaction and can contribute to loneliness and mental health issues
  • Privacy erosion — widespread data collection by companies and governments enables surveillance and potential misuse of personal information
  • Cybercrime — hacking, identity theft, ransomware and online fraud create financial and emotional harm to victims

Ethics and responsible computer use

Ethical behaviour involves making morally correct decisions when using technology, considering the impact on others and society.

Key ethical principles:

  • Respect for privacy — not accessing others' files, emails or personal data without permission; not monitoring computer use without consent
  • Honesty — not misrepresenting yourself online through fake profiles or credentials; accurately citing sources in academic work
  • Responsibility — considering consequences before posting content online; taking ownership of actions performed using computer systems
  • Fairness — ensuring technology benefits all groups equally; avoiding algorithmic bias that discriminates against protected characteristics

Unethical behaviours to avoid:

  • Unauthorised access to systems or data (hacking)
  • Creating or distributing malware
  • Cyberbullying or harassment
  • Plagiarism or passing off others' work as your own
  • Using software without proper licensing
  • Sharing inappropriate or harmful content
  • Manipulating data or systems to gain unfair advantage

Computer-use policies

Organisations implement policies to ensure computers and networks are used appropriately, securely and legally.

Acceptable Use Policy (AUP):

An AUP defines what users may and may not do when using an organisation's IT systems. Schools, businesses and public institutions require users to read and agree to the AUP before granting access.

Typical AUP rules include:

  • Only access systems with authorised credentials (no password sharing)
  • Use systems solely for work/educational purposes (limited personal use may be permitted)
  • Do not download or install unauthorised software
  • Do not visit inappropriate websites (gambling, adult content, illegal material)
  • Do not attempt to bypass security measures or access restricted areas
  • Do not send offensive, defamatory or harassing messages
  • Report security incidents and suspected policy violations
  • Respect copyright and intellectual property rights

Consequences of policy violations:

  • Warnings or disciplinary action
  • Suspension or termination of account access
  • Dismissal from employment or exclusion from school
  • Legal action if criminal offences are involved

Privacy policies:

These explain how organisations collect, store, use and share personal data. Under data protection legislation, organisations must:

  • Obtain explicit consent before collecting personal data
  • Only collect data necessary for specified purposes
  • Keep data accurate and up to date
  • Store data securely with appropriate technical and organisational measures
  • Delete data when no longer needed
  • Allow individuals to view, correct or request deletion of their data

Copyright and intellectual property protection

Copyright protection:

Copyright automatically applies to original creative works from the moment of creation. No registration is required in the UK or most countries.

Works protected by copyright include:

  • Software and source code
  • Text (books, articles, website content)
  • Music and sound recordings
  • Images, photographs and graphics
  • Videos and films
  • Databases

Rights granted to copyright holders:

  • Control who can copy, distribute or sell the work
  • Control who can modify or create derivative works
  • Control public performance or display
  • Receive payment (royalties) for authorised use

Copyright duration:

  • Literature, music, art: life of creator plus 70 years
  • Sound recordings: 70 years from publication
  • Software: treated as literary work, same duration

Fair use / fair dealing:

Limited exceptions allow use of copyrighted material without permission for:

  • Education (classroom teaching, examination purposes)
  • Criticism or review (with acknowledgement)
  • News reporting
  • Private study and research (non-commercial)

Preventing copyright infringement:

  • Purchase legitimate software licences
  • Use royalty-free or Creative Commons licensed content
  • Obtain written permission before using copyrighted material
  • Properly cite and acknowledge sources
  • Use plagiarism detection software for academic work

Penalties for copyright infringement:

  • Civil lawsuits for damages and lost profits
  • Criminal prosecution for commercial-scale piracy
  • Fines up to unlimited amounts
  • Imprisonment up to 10 years for serious offences

Open-source vs proprietary software

Software is distributed under different licensing models that determine how it can be used, modified and shared.

Proprietary software characteristics:

  • Closed source code — users cannot view or modify the underlying code
  • Purchased licences — payment required (one-time purchase or subscription) for legal use
  • Restrictions — licence agreements limit installation to specific numbers of devices or users
  • Vendor support — company provides updates, bug fixes and technical support
  • Examples — Microsoft Windows, Microsoft Office, Adobe Photoshop, Apple macOS

Advantages of proprietary software:

  • Professional support and documentation available
  • Regular security updates and patches provided
  • User-friendly interfaces designed for mass market
  • Extensive testing ensures reliability
  • Legal accountability if software fails

Disadvantages of proprietary software:

  • Expensive, especially for multiple users or commercial use
  • No ability to customise or adapt for specific needs
  • Vendor lock-in (dependency on single supplier)
  • Cannot verify security or privacy of closed source code

Open-source software characteristics:

  • Public source code — anyone can view, study and audit the code
  • Free licences — typically free to download, use, modify and distribute
  • Community development — volunteers and companies collaborate on improvements
  • Multiple distributions — various versions may exist with different features
  • Examples — Linux, LibreOffice, GIMP, Firefox, Apache web server, Python

Advantages of open-source software:

  • Zero or very low cost
  • Can be customised and adapted for specific requirements
  • Transparent code allows security verification
  • Large communities provide forums, documentation and assistance
  • Not dependent on single vendor's business decisions

Disadvantages of open-source software:

  • No guaranteed professional support (though paid support often available)
  • May require technical expertise to install or configure
  • User interfaces sometimes less polished than commercial alternatives
  • No legal liability if software causes problems
  • Updates depend on community interest and contributions

Hybrid models:

Some software combines elements of both approaches:

  • Freemium — basic version free, premium features require payment (Spotify, Dropbox)
  • Open core — core software open-source, enterprise features proprietary (MySQL, GitLab)
  • Commercial open-source — source code available but company sells support and services (Red Hat Enterprise Linux)

Worked examples

Example 1: Acceptable Use Policy violation

Question: A student at your school uses the school computer network to access their personal email during a lesson and download music files from an unauthorised website. Explain two ways the student has violated the school's Acceptable Use Policy. [4 marks]

Answer:

The student has used the network for personal purposes (accessing personal email) during lesson time when computers should be used solely for educational activities [1]. This violates the rule that school systems must only be used for work/school-related purposes [1].

The student has downloaded files from an unauthorised website [1], which violates the policy against downloading content without permission and potentially introduces security risks or copyrighted material onto the school network [1].

Mark scheme notes: Award 1 mark for identifying each violation and 1 mark for explaining why it breaches the AUP. Accept other valid violations such as potential copyright infringement of music files.

Example 2: Open-source vs proprietary software

Question: A small business needs to choose between proprietary word processing software and open-source alternatives. Evaluate which option would be more suitable for the business. [6 marks]

Answer:

Proprietary software like Microsoft Word would provide professional technical support [1] which is valuable for a small business without IT expertise, ensuring problems are resolved quickly [1]. However, it requires purchasing licences for each user [1], which creates significant ongoing costs for the business [1].

Open-source software like LibreOffice would be free to use [1], reducing business expenses and allowing budget to be allocated elsewhere [1]. The software can be customised if the business has specific needs [1]. However, there is no guaranteed professional support [1], meaning the business might struggle to resolve technical issues [1].

For a small business with limited budget, the open-source option would likely be more suitable [1] as the cost savings are significant and basic word processing needs can be met, though they should consider whether they have someone with technical skills to manage the software [1].

Mark scheme notes: Award marks for valid advantages/disadvantages of each option (up to 4 marks) and evaluation considering business context (up to 2 marks). Accept other valid points such as file compatibility, training requirements, or specific business needs.

Example 3: Copyright and ethical behaviour

Question: A student finds an image online and uses it in their coursework presentation without permission. Explain why this is both illegal and unethical. [4 marks]

Answer:

This is illegal because images are automatically protected by copyright law [1], which means only the copyright holder has the right to copy, distribute or use the image [1]. Using it without permission infringes copyright law [1].

This is unethical because the student is claiming credit for work they did not create [1], which is dishonest [1] and does not respect the rights of the original creator [1].

Mark scheme notes: Award marks for explaining copyright law (up to 2 marks) and ethical dimensions (up to 2 marks). Accept reference to obtaining permission, using licensed images, or proper attribution.

Common mistakes and how to avoid them

  • Confusing copyright with patents — copyright protects creative works (software, music, writing); patents protect inventions and processes. In IGCSE questions, focus on copyright as it applies to digital content and software

  • Stating open-source means "no copyright" — open-source software is still copyrighted by its creators; the licence simply grants permissions to use, modify and distribute. Always explain that open-source refers to licensing terms, not absence of ownership

  • Listing only positive OR only negative impacts — when asked to discuss technology's impact, examiners expect balanced responses covering both benefits and drawbacks. Structure answers clearly with separate points for each

  • Writing vague policy violations — instead of "breaking the rules," specify which rule (e.g., "accessing social media for personal use during work hours violates the AUP requirement that systems be used only for business purposes")

  • Confusing ethical with legal issues — something can be legal but unethical (e.g., exploiting personal data within privacy policy terms), or illegal but considered ethical by some (e.g., whistleblowing). Address both dimensions separately when questions ask about ethics

  • Not justifying software choice recommendations — when evaluating proprietary vs open-source, always link advantages/disadvantages to the specific context given (business size, budget, technical expertise, support needs)

Exam technique for ethics, privacy and intellectual property

  • Command word awareness — "Describe" requires characteristics/features (2-3 marks); "Explain" requires reasons/consequences (typically 2 marks per point); "Evaluate" or "Discuss" requires weighing advantages/disadvantages with a justified conclusion (4-6 marks)

  • Structure extended answers using PEE — Point (state the issue), Evidence (give specific example or detail), Explain (why this matters or what the consequence is). This ensures you access explanation marks, not just identification marks

  • Use context from the question — if the scenario mentions a school, hospital or business, tailor your answer to that setting. Generic answers rarely score full marks on evaluation questions

  • Define technical terms before using them — if you mention "AUP," briefly state it's an Acceptable Use Policy that defines rules for system use. This demonstrates understanding and ensures marks even if the examiner's mark scheme uses different phrasing

Quick revision summary

Technology creates both opportunities (global communication, automation, access to information) and challenges (job displacement, privacy concerns, digital divide). Organisations implement computer-use policies like AUPs to ensure legal and appropriate system use. Copyright automatically protects creative works including software; using copyrighted material without permission is illegal. Proprietary software is closed-source and requires purchased licences with vendor support; open-source software provides free access to source code with community development but less formal support. Choose software based on cost, support needs, customisation requirements and technical expertise available.

Free for IGCSE students

Lock in Ethics, privacy and intellectual property (impact of technology, computer-use policies, copyright, open-source vs proprietary software) with real exam questions.

Free instantly-marked CIE IGCSE Computer Science practice — 45 questions a day, no card required.

Try a question →See practice bank