151-computer-related-legislation Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

data protection act 1998

A

DPA – controls personal info usage by third parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

data protection act 1998 principles

A

Data must be collected and used fairly and inside the law
Data must only be held and used for the reasons given to the Information Commissioner
Data can only be used for those registered purposes and only be disclosed to those people mentioned in the register entry
Data held must be adequate, relevant and not excessive when compared with the purpose stated in the register
Data must be accurate and be kept up to date
Data must not be kept longer than is necessary for the registered purpose
Data must be kept safe and secure
The files may not be transferred outside of the European Economic Area unless the country that the data is being sent to has a suitable data protection law
The law applies to information stored both on computers and in organised paper filing systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

key differences between data protection act 2018 and 1998

A

The Data Protection Act 2018 is an updated version of the Data Protection Act 1998 that brought it in line with GDPR.
The Data Protection Act 2018 requires data controllers to prove that their data protection measures are sufficient, whereas the Data Protection Act 1998 does not have such a requirement.
The Data Protection Act 2018 gives data subjects the right not to be subject to a decision based on solely automated processing, including profiling, which produces legal effects concerning them or similarly significantly affects them, while the Data Protection Act 1998 does not explicitly include such a right.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

the computer misuse 1990

A

Computer Misuse Act 1990 aims to prevent hacking and unauthorized access to computer systems
Covers three primary offences: unauthorised access to computer material, unauthorised access with intent to commit or facilitate a crime, and unauthorised modification of computer material
Prohibits making, supplying, or obtaining tools or anything that can be used in computer misuse offences e.g Hardware tools such as key loggers, wireless receivers and transmitters, smartcard readers, and contactless readers can be used to gather data in storage or transit, Software tools like Trojans, port scanners, password crackers, and SQL injection can be used to gain unauthorized access to computer systems, indirect attacks like using skeleton keys or fake ID cards can be used to physically access servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Breaking the computer misuse act-

A

Unauthorised access: fine up to £5000, prison up to 6 months
Unauthorised access with the intent to commit further crime: fine unlimited, prison up to 5 years
Unauthorised modification of data: fine unlimited, prison up to 5 years
Making, supplying or obtaining tools used to commit computer misuse offences: fine unlimited, prison up to 10 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Intellectual property

A

Creations of the mind, such as inventions, literary and artistic works, designs; and symbols, names and images used in commerce. Protected by the law in the way of copyright, patents, licensing, trademarks.

Copyright: Rights a creator has over their own work
Patents: Exclusive right granted for an invention, provide the owner with the right to decide if or how their invention can be used by others
Licensing: Granting permission to use or access intellectual property
Trademark: Distinctive symbol, design, word, phrase, or combination of these, used to identify and distinguish the products or services of one person or company from those of others.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Copyright Design and Patents Act 1988

A

Copyright Design and Patents Act 1988 protects intellectual property rights
Illegal to copy someone else’s work without permission
Breaches of this law have negative effects on the music and film industries
Breaking this law can result in up to 10 years in prison and a £50,000 fine
Covers everything from logos to music recordings and computer programs
Copyright gives creators exclusive rights and ownership over their work
License allows copyright holder to grant permission for creation to be used
Covers copying/use of brand names, inventions, product designs, and original works
Illegal to copy any work without owner or copyright holder’s permission
Software piracy, downloading music/films without paying, and using software without a license are illegal
Copyright holder can take legal action against infringement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Regulation of Investigatory Powers Act 2000

A

The Regulation of Investigatory Powers Act 2000 gives certain public bodies the power to monitor communications and internet activities.
This Act is controversial as it allows for mass surveillance and interception of communication without the customer’s knowledge.
The Act covers investigation, surveillance and interception of communication by public bodies.
Public bodies with these powers include the police, security services, and local councils.
All ISPs and online businesses are subject to RIPA.
The Act allows for the monitoring of an individual’s internet activities and demands access to protected information.
Balancing national security against individual privacy in the context of digital communication is a complex issue.
Intercepting phone and email traffic can be a powerful tool against organised crime and terrorism.
However, citizens value privacy and may not trust the government to keep their data confidential.
The use of RIPA by some local authorities for minor offences led to new rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ISPs (internet service provider)

A

provide people with internet access and services at home and work via a range of different devices like PC’s, tablets or smartphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Under the terms of RIPA, ISPs must:

A

-provide access to digital communications, digital communication archives and internet activities when asked
-implement hardware and software systems that facilitate the surveillance of digital communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Under the terms of RIPA, businesses must:

A

-provide access to digital communications or data when asked
-implement a hardware and software solution that facilitates the storage of digital communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

RIPA concerns

A

-invasion of privacy
-freedom of speech
-unnecessary censorship
-improper use/misuse of RIPA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Freedom of Information Act 2000

A

The Act applies to public authorities in the UK, including government departments, local authorities, the NHS, schools and universities, and the police.
The Act gives the public the right to access information held by public authorities, subject to some exemptions.
Public authorities must respond to requests for information within 20 working days.
The Act allows public authorities to charge for providing information, but the fees must be reasonable and not prohibitively expensive.
The Act includes exemptions for information that would be harmful to national security, personal data, confidential commercial information, and information that is already publicly available.
If a request for information is refused, the requester can appeal to the Information Commissioner’s Office.
The Act also requires public authorities to proactively publish certain types of information, such as their policies and procedures, and information about their finances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how to make a subject access request to verify data about yourself - process for making a request for information

A

Contact the relevant authority directly
Make the request in writing, giving your real name and an address to which the authority can reply
Keep a copy and date any letters or emails you send
Be specific about the information you want
Stay focused on the line of enquiry you are pursuing
Include details such as dates and names whenever you can
Be polite and avoid basing your request or question on assumptions or opinions
Specify your preferences for how you would like to receive the information
Don’t use offensive or threatening language, make unfounded accusations, or bury your request among other correspondence
Don’t submit frivolous or trivial requests, disrupt a public authority with excessive requests, or make repeat requests without justifiable grounds
Why do you have to pay for a subject access request to verify data about yourself?

The charge is intended to cover the costs of retrieving and presenting the information
It also deters vexatious requests
A public authority can charge for disbursements, such as photocopying and postage
Subject access requests dos:

Find out who to send your request to
Include your name, address, and contact details
Clearly state that you are making your request under the relevant legislation
Be as specific as possible about the information you want
Re-read your request to check for clarity and avoid ambiguity
Use polite language and avoid making assumptions or personal attacks
Specify your preferences for how you would like to receive the information
Stay focused on the line of enquiry you are pursuing
Aim to be flexible if the authority advises you to narrow down your request
Subject access requests don’ts:

Use offensive or threatening language or make unfounded accusations
Bury your request among other correspondence or use it to reopen grievances
Make assumptions about how the authority organizes its information
Submit frivolous or trivial requests or fish for information
Disrupt a public authority with excessive requests or make repeat requests without justifiable grounds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Environmental Information Regulations 2004

A

The Environmental Information Regulations 2004 give the public the right to access environmental information held by public authorities.

Environmental information includes information on the state of the environment, factors affecting the environment, and measures and activities affecting or likely to affect the environment.

Public authorities must provide environmental information upon request, subject to certain exceptions such as national security or commercial confidentiality.

Requests for environmental information must be made in writing, and public authorities must respond within 20 working days.

Public authorities may charge a reasonable fee for providing environmental information, but must provide a fee estimate before proceeding with the request.

The Environmental Information Regulations 2004 are enforced by the Information Commissioner’s Office (ICO), which has the power to investigate complaints and take enforcement action against public authorities that fail to comply.

The regulations also include provisions for public authorities to proactively publish environmental information, such as on their websites or through public registers.

Public authorities must ensure that personal data is protected when disclosing environmental information, in accordance with the General Data Protection Regulation (GDPR) and the Data Protection Act 2018.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

bitcoin

A

Bitcoin is a decentralized digital currency - no one controls it.
Its legality depends on its use.
It can be used to buy goods from online stores like Microsoft and Dell, or pay for services at hotels and restaurants like Holiday Inn and One Shot Hotels.
Bitcoin is faster, cheaper, and more secure than traditional payment methods.
It has been used for illegal activities like gambling and buying drugs due to its untraceable transactions.
Bitcoin was created by Satoshi Nakamoto.
It has the potential to revolutionize the way people pay for goods and services..

17
Q

Worries and fears people may have over their stored data

A

Personal details are stored by various entities such as schools, banks, local authorities, social media sites, and online shopping sites.
Concerns over personal details being passed on to third parties.
Fear of identity theft if personal information is obtained from the system.
Personal details being obtained and used for nuisance calls.
Risk of theft or burglary at home if work patterns can be obtained from company computers.
Bank account compromise if pay details are obtained.
- employee issues or problems owing to dissemination of personal information.

18
Q

How can companies reduce the fear or worries people may have over their stored data

A

Strong password policies and password management tools
Encryption of personal data
Compartmentalisation or restricted access to data of named employees
Physical security measures to protect against theft or unauthorized access
Staff awareness campaigns to educate employees on data security best practices
Firewalls to prevent unauthorized access
Audit trails and using NFC in ID/access badges to sensitive information.