1.5.1 Computer Related Legislation Flashcards
Computer Misuse Act 1990 3 rules
Rule #1: Unauthorised access to computer material
Rule #2: Unauthorised access with intent to commit or facilitate commission of future offences
Rule #3: Unauthorised modification of computer material
Computer Misuse Act how to be guilty of rule #1
Guilty if they cause a computer to perform any function to access any data or program, the access is unauthorised and they knowingly did it
Computer Misuse Act how to be guilty of rule #2
Needs to be proven that the suspect was going to use the data under rule 1 to cause further offence or facilitate further offence by another
Computer Misuse Act how to be guilty of rule #3
Guilty if the suspect commits any act to cause the unauthorized modification of the contents of a computer and has the requisite intent and knowledge
Computer Misuse Act rule 3, what acts are punishable
Impairing the operation of the computer
Preventing or hindering access to program/data
Impairing the operation of a program/ access to data
Personal Data
Data that allows you to identify living people
Information Commissioner
Ensures the upholding of the data protection act
Data User
The person who processes the data - restricted use
Data Subject
The person the data is about
Data Protection Act 8 principles
- Data must be fair and lawful
- The data must be relevant and not excessive
- The data must be accurate and up to date
- Data must be held for no longer than necessary
- Data must only be used for the stated purpose
- Data must be held securely
- Data must be held within the rights of the subject
- Data must not be used in countries with weaker data protection laws
RIPA
Regulation of Investigatory Powers Act 2000
RIPA uses
Allows certain organisations to monitor the online activity and communication of individuals
Used to foil and avert criminal activities
RIPA 6 parts
- Demands ISPs allow access to a customer surveillance
- Allows mass surveillance of communication
- Demands ISPs fit equipment to facilitate surveillance
- Demands access be granted to protected information
- To allow monitoring of any individuals internet activity
- Prevents existence of such interception being revealed in court
CDPA
Copyright, Design and Patents Act 1988
CDPA uses
Prevents creators of books, music, video, software etc from having their work illegally copied