Legal and Ethical Concerns
Help Questions
AP Computer Science Principles › Legal and Ethical Concerns
A passage (Arial) discusses Data Privacy and Social Media and targeted advertising to teenagers. The platform uses behavioral tracking pixels across partner sites and infers sensitive attributes (e.g., health interests) to segment ads. It defines a privacy law as legal limits on collecting and using personal data, and notes GDPR emphasizes purpose limitation, transparency, and special protections for minors (General Data Protection Regulation, 2016). Stakeholders include teen users, parents, advertisers, partner websites, and regulators. Scenarios include unclear privacy notices, opt-out mechanisms buried in settings, and a compliance review focusing on transparency. What ethical considerations are highlighted in the discussion of teen-targeted ads?
Respecting informed choice when minors may not fully understand tracking practices
Requiring teens to disclose passwords so parents can verify ad targeting
Treating all data as ownerless once it is collected by any website
Ensuring advertisers can access all user messages to improve ad relevance
Explanation
This question tests understanding of legal and ethical concerns in computing, focusing on ethical issues in targeted advertising to minors. Legal concerns in computing often involve compliance with laws like GDPR that provide special protections for children, while ethical concerns focus on moral implications such as informed consent and protecting vulnerable populations. In this passage, the text discusses behavioral tracking and sensitive attribute inference for teen users as a case of ethical challenges around minor consent. Choice A is correct because it accurately reflects the passage's emphasis on respecting informed choice when minors may not fully understand tracking practices, as shown by scenarios of unclear privacy notices and buried opt-out mechanisms. Choice B is incorrect because it suggests invasive practices that would violate both legal and ethical standards, a common error when students confuse targeted advertising mechanisms with direct message access. To help students, encourage critical thinking about power imbalances between platforms and young users and emphasize the heightened ethical obligations when dealing with minors. Practice identifying when consent mechanisms may be inadequate for younger users who may lack the maturity to understand data practices.
A passage in Arial describes AI and Surveillance in a city transit system. It explains an AI system that uses facial recognition and gait analysis to flag “anomalous” behavior, then alerts human security staff. It defines a privacy law as rules governing collection and processing of personally identifiable information, and notes some jurisdictions require notice, limits on retention, and proportional use for public safety. Stakeholders include commuters, transit authorities, AI vendors, civil liberties groups, and courts. The passage gives scenarios: (1) a false match leading to a brief detention; (2) data retained for years “just in case”; and (3) an audit request for bias testing results. How does the passage illustrate an ethical dilemma in AI surveillance?
It shows that surveillance is ethical if the vendor owns the training data
It concludes that longer data retention always improves civil liberties outcomes
It argues that commuters, not authorities, must fund independent audits
It balances public safety benefits against risks to privacy and unequal treatment
Explanation
This question tests understanding of legal and ethical concerns in computing, focusing on the ethical tensions in AI surveillance systems. Legal concerns in computing often involve compliance with laws like privacy regulations, while ethical concerns focus on moral implications such as balancing competing values of safety and privacy. In this passage, the text discusses an AI system that monitors transit passengers as a case of conflicting ethical priorities. Choice A is correct because it accurately reflects the passage's emphasis on weighing public safety benefits against privacy risks and potential unequal treatment, as shown by scenarios of false matches and prolonged data retention. Choice D is incorrect because it contradicts the ethical concern about excessive retention, a common error when students assume more data always equals better outcomes. To help students, encourage critical analysis of stakeholder perspectives and emphasize how ethical dilemmas often involve trade-offs between legitimate but competing values. Practice identifying when technological capabilities create tensions between security and civil liberties.
A passage in Arial examines Intellectual Property and Open Source in a robotics club using code from a public repository. It describes students modifying an open-source motor-control program and combining it with a proprietary sensor module donated by a company. It defines intellectual property as protected code and inventions, and notes open-source licenses can impose conditions on redistribution, while proprietary modules may be protected as trade secrets. Stakeholders include students, the donating company, maintainers, competition organizers, and judges. Scenarios include posting the combined code online, receiving a takedown request, and debating whether to publish only the open-source portion. According to the passage, what are the potential consequences of redistributing code while ignoring license conditions?
Mandatory government approval before any code can run on a robot
A guarantee that proprietary trade secrets become unenforceable worldwide
Automatic eligibility for scholarships due to public sharing
Takedown demands and loss of permission to use or share the licensed code
Explanation
This question tests understanding of legal and ethical concerns in computing, focusing on intellectual property violations in mixed open-source and proprietary code environments. Legal concerns in computing often involve compliance with both open-source licenses and proprietary restrictions, while ethical concerns focus on moral implications such as respecting creators' rights and maintaining trust in the developer community. In this passage, the text discusses combining open-source motor control with proprietary sensor code as a case of complex licensing obligations. Choice A is correct because it accurately reflects the passage's emphasis on potential takedown demands and loss of permission to use the code, as shown by the scenario of receiving a takedown request after posting combined code online. Choice C is incorrect because it confuses the consequences of sharing code with changes to trade secret law, a common error when students misunderstand how intellectual property protections work. To help students, encourage careful consideration of license compatibility and emphasize that mixing code with different licenses requires understanding each set of obligations. Practice identifying potential conflicts between open-source and proprietary licenses and understanding the legal remedies available to rights holders.
A passage (Arial) discusses Cybersecurity and Government Regulations. It describes a hospital network using cloud-based electronic health record software, multifactor authentication, and automated intrusion detection. It defines a privacy law as legal limits on handling sensitive personal data, and describes a government regulation requiring “reasonable security measures,” breach notification within a set timeframe, and documentation of risk assessments. Stakeholders include hospitals, patients, cloud vendors, insurers, and regulators. Scenarios include ransomware encrypting records, delayed notification to patients, and a regulator imposing fines for inadequate controls. According to the passage, what are the potential consequences of delayed breach notification?
Automatic transfer of hospital ownership to the cloud vendor
Regulatory penalties and increased harm from prolonged exposure of patient data
Mandatory release of all software source code to the public domain
Immediate immunity from lawsuits because the attack is criminal
Explanation
This question tests understanding of legal and ethical concerns in computing, focusing on breach notification requirements in healthcare cybersecurity. Legal concerns in computing often involve compliance with laws like HIPAA and data breach notification regulations, while ethical concerns focus on moral implications such as minimizing patient harm. In this passage, the text discusses delayed notification to patients after a ransomware attack as a case of regulatory non-compliance. Choice A is correct because it accurately reflects the passage's emphasis on both regulatory penalties and increased harm from prolonged exposure, as shown by the scenario describing fines for inadequate controls and delayed notification. Choice C is incorrect because it confuses criminal attacks with legal immunity, a common error when students overlook that organizations remain responsible for their security measures regardless of criminal activity. To help students, encourage critical analysis of regulatory requirements and emphasize the dual nature of consequences - both legal penalties and actual harm to affected individuals. Practice identifying how compliance failures can compound the damage from security incidents.
A passage discusses cybersecurity regulations requiring organizations to implement “reasonable security” controls for customer data. It defines a privacy law as governing personal data handling, and distinguishes it from security rules that mandate safeguards like access controls, logging, and incident response. The legal issue involves reporting timelines after breaches and penalties for negligent protection, referencing state breach-notification statutes as a general category. The ethical dilemma contrasts rapid disclosure to users with the need to verify facts and prevent panic. Stakeholders include companies, users, insurers, regulators, and incident responders. A scenario describes delayed notification after ransomware disrupts operations. Based on the passage, what ethical considerations are highlighted in breach notification decisions?
Prioritizing transparency while avoiding inaccurate, premature disclosures
Maximizing profits by concealing breaches indefinitely
Ensuring copyright ownership of all incident reports
Allowing only governments to access any security information
Explanation
This question tests understanding of legal and ethical concerns in computing, focusing on ethical considerations in cybersecurity breach notifications. Legal concerns involve compliance with breach notification statutes and timelines, while ethical concerns focus on balancing transparency with accuracy and preventing panic. In this passage, the text discusses the tension between rapid disclosure to users and the need to verify facts before notification. Choice A is correct because it accurately captures the ethical dilemma presented - prioritizing transparency while avoiding inaccurate or premature disclosures that could cause unnecessary panic. Choice C is incorrect because it represents an unethical approach of concealing breaches for profit, which contradicts both legal requirements and ethical principles discussed in the passage. To help students, emphasize the importance of balancing multiple stakeholder interests in security incidents. Practice analyzing real breach scenarios to understand the complexities of responsible disclosure.
A passage addresses government cybersecurity regulations that require critical infrastructure operators to meet baseline security standards and submit to periodic audits. It defines a privacy law as restricting personal data processing, and contrasts it with security mandates that may increase monitoring of network activity. The ethical dilemma is setting audit and logging requirements that improve defense while limiting unnecessary surveillance of employees. Stakeholders include operators, employees, regulators, customers, and security vendors. A scenario describes implementing extensive employee activity logs to satisfy auditors, prompting concerns about proportionality. How does the passage illustrate an ethical dilemma in compliance-focused security monitoring?
It treats stakeholders as only regulators, excluding employees entirely
It frames monitoring as a trade-off between protection and workplace privacy
It claims privacy laws mandate unlimited employee surveillance
It argues ethical compliance requires ignoring all audit requirements
Explanation
This question tests understanding of legal and ethical concerns in computing, focusing on the ethical dilemma of compliance-driven employee monitoring. Legal concerns involve meeting security audit requirements, while ethical concerns focus on balancing security needs against employee privacy rights. In this passage, the text discusses implementing extensive employee activity logs to satisfy auditors while raising proportionality concerns. Choice A is correct because it accurately captures how the passage frames the ethical dilemma - as a trade-off between protection (meeting security requirements) and workplace privacy (limiting unnecessary employee surveillance). Choice C is incorrect because it misrepresents the passage, claiming privacy laws mandate unlimited surveillance when the passage actually discusses the tension between security requirements and privacy limitations. To help students, emphasize that compliance requirements must be balanced with ethical considerations about proportionality. Practice analyzing how security measures can be implemented while respecting privacy rights.
A passage in Arial addresses Intellectual Property and Open Source in a startup’s mobile app. It describes the app using an open-source encryption library and a proprietary recommendation model. It defines intellectual property as legally protected creations of the mind (e.g., copyrighted code, patents, trade secrets) and notes open-source licenses may require attribution and, in some cases, sharing modifications under the same license. Stakeholders include the startup, open-source maintainers, users, investors, and app-store reviewers. Scenarios include failing to include license notices, copying code snippets from a forum without checking license terms, and receiving a compliance request from maintainers. Based on the passage, what is the primary legal concern associated with using the open-source library?
Preventing users from criticizing the app under defamation statutes
Ensuring police obtain warrants before downloading the app
Complying with license duties such as attribution and sharing required modifications
Avoiding sales tax liability for in-app purchases across all countries
Explanation
This question tests understanding of legal and ethical concerns in computing, focusing on open-source license compliance in software development. Legal concerns in computing often involve compliance with intellectual property laws and license terms, while ethical concerns focus on moral implications such as respecting creators' rights and contributing back to the community. In this passage, the text discusses using an open-source encryption library as a case of potential license violations. Choice A is correct because it accurately reflects the passage's emphasis on complying with license duties like attribution and sharing modifications, as shown by scenarios of failing to include license notices and receiving compliance requests. Choice B is incorrect because it confuses defamation law with intellectual property concerns, a common error when students mix different areas of technology law. To help students, encourage careful reading of license terms and emphasize that 'open source' doesn't mean 'no obligations.' Practice identifying specific requirements of different open-source licenses and understanding the legal consequences of non-compliance.
A passage in Arial discusses AI and Surveillance at a school campus using AI video analytics to detect fights and trespassing. The system creates risk scores and sends alerts to administrators. It defines a privacy law as legal constraints on collecting and storing personal data, and notes policies often require clear purpose limits, retention schedules, and access controls. Stakeholders include students, parents, school administrators, AI vendors, and local regulators. Scenarios include a student misidentified due to poor lighting, administrators expanding use to track tardiness, and a request to disclose how long footage is stored. What ethical considerations are highlighted in the discussion of this AI system?
Purpose creep and fairness concerns when risk scores affect students’ opportunities
A claim that ethical issues disappear if cameras are high resolution
A requirement that all students learn to code the model to graduate
A conclusion that vendors, not schools, must set all disciplinary policies
Explanation
This question tests understanding of legal and ethical concerns in computing, focusing on ethical issues in AI surveillance within educational settings. Legal concerns in computing often involve compliance with privacy laws and data protection regulations, while ethical concerns focus on moral implications such as fairness, purpose limitation, and the impact on student opportunities. In this passage, the text discusses AI video analytics creating risk scores as a case of potential purpose creep and fairness concerns. Choice A is correct because it accurately reflects the passage's emphasis on how the system might expand beyond its original purpose (from detecting fights to tracking tardiness) and create unfair impacts on students' opportunities, as shown by the misidentification scenario and expanded use cases. Choice C is incorrect because it confuses technical quality with ethical considerations, a common error when students assume better technology automatically resolves ethical issues. To help students, encourage critical thinking about how surveillance systems can evolve beyond their initial purpose and emphasize the importance of considering long-term impacts on affected populations. Practice identifying when technological capabilities enable mission creep and understanding the ethical implications for vulnerable groups like students.
A passage (Arial) covers Cybersecurity and Government Regulations for a small business using a managed email service. It describes phishing-resistant login keys, employee training, and centralized logging. It defines a privacy law as rules limiting use and disclosure of personal data, and describes a regulation requiring “reasonable” safeguards plus documentation showing due diligence. Stakeholders include the business, employees, customers, the email provider, and regulators. Scenarios include a phishing incident exposing customer invoices, an investigation asking for security logs, and a debate about monitoring employee email for threats. How does the passage illustrate an ethical dilemma in cybersecurity compliance?
It claims only customers, not regulators, may request breach documentation
It equates ethical conduct with maximizing profits from cybersecurity tools
It weighs threat monitoring for security against intrusions into employee privacy
It suggests compliance is unnecessary if a provider advertises strong security
Explanation
This question tests understanding of legal and ethical concerns in computing, focusing on the ethical balance between cybersecurity monitoring and employee privacy. Legal concerns in computing often involve compliance with privacy regulations and security requirements, while ethical concerns focus on moral implications such as balancing legitimate security needs against individual privacy rights. In this passage, the text discusses monitoring employee email for threats as a case of competing ethical priorities. Choice A is correct because it accurately reflects the passage's emphasis on weighing necessary threat monitoring against intrusions into employee privacy, as shown by the debate about monitoring employee communications. Choice D is incorrect because it confuses ethical conduct with profit maximization, a common error when students conflate business interests with ethical decision-making. To help students, encourage analysis of situations where security and privacy conflict and emphasize that ethical dilemmas often lack perfect solutions. Practice identifying stakeholder interests and understanding how to balance legitimate but competing concerns in cybersecurity contexts.
A passage in Arial analyzes AI and Surveillance in a retail store using computer vision to deter shoplifting. Cameras estimate age ranges, track movement paths, and flag “suspicious” loitering; employees receive alerts on handheld devices. It defines a privacy law as restrictions on collecting identifiable customer data and notes some rules require clear notice and limits on retention and sharing. Stakeholders include customers, store owners, employees, AI vendors, and regulators. Scenarios include a customer requesting deletion, an employee sharing clips in a group chat, and a vendor using footage to improve its model. Based on the passage, what is the primary legal concern associated with the store’s AI surveillance practice?
Whether employees’ wages increase when the AI system reduces theft
Whether notice, retention, and sharing limits for identifiable footage are followed
Whether customers must sign noncompete agreements before entering the store
Whether the vendor’s model qualifies for patent protection in every country
Explanation
This question tests understanding of legal and ethical concerns in computing, focusing on privacy law compliance in retail AI surveillance. Legal concerns in computing often involve compliance with laws requiring notice, limiting retention, and restricting data sharing, while ethical concerns focus on moral implications such as customer autonomy and transparency. In this passage, the text discusses computer vision systems tracking customer behavior as a case of potential privacy law violations. Choice A is correct because it accurately reflects the passage's emphasis on whether legal requirements for notice, retention limits, and sharing restrictions are followed, as shown by scenarios of customers requesting deletion and employees sharing clips inappropriately. Choice C is incorrect because it confuses patent protection with privacy compliance, a common error when students mix different areas of technology law. To help students, encourage analysis of how AI surveillance must comply with existing privacy frameworks and emphasize that advanced technology doesn't exempt organizations from legal obligations. Practice identifying the specific legal requirements that apply to collecting and processing identifiable customer data in commercial settings.