1.5.1 Computer Legisation Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

The Data Protection Act 1998

A

The Data Protection Act 1998 : Applies to data on paper and in computers, applies to personal data.

  1. Personal data shall be processed fairly and lawfully.
  2. Personal data shall be obtained only for one or more specified and lawful purpose.
  3. Personal data shall be adequate, relevant and not excessive for its purpose.
  4. Personal data shall be accurate and where necessary kept up to date.
  5. Personal data shall not be kept for longer than is necessary for its purpose.
  6. Appropriate technical and organizational measures shall be taken against unauthorized or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Computer Misuse Act 1990

A

The computer misuse act 1990 : Concerns malicious use of computers (hacking etc.)

Outlines 3 primary offences:
1. Unauthorized access to computer materials.
2. Unauthorized access with intent to commit further offences.
3. Unauthorized modification of computer material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The copyright designs and patents act 1988

A

The copyright designs and patents act 1988 :
- Gives the author ownership/copyright of personal intellectual property
- Automatically applies to original work
- Others cannot use or distribute without permission
- Permission can be granted / bought / licensed

Creative commons licence is where you give permission for everyone to use as they please (Copyright free)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The regulation of investigatory powers act 1990

A

The regulation of investigatory powers act 1990 : Regulates and limits how public bodies can conduct technological surveillance…
- This can include monitoring internet activity
- And Electronic communications

  • bodies can force companies/users to hand over encryption keys if they have them

Advantages :
- Can help detect terrorism - public safer
- In technological world security services need power to stop crime before it happens.

Disadvantages:
- Enforces ISP’s and Companies to give up customer communications when requested - have to have back-doors to allow.
- Powers extend to small agencies like local council - may be used improperly for minor offences .
- Hard to enforce e.g. End to End encryption
- privacy infringement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly