1.5.1 Computing Related Legislation Flashcards
What are the 4 main laws of computer technology?
- The Data Protection Act (1998 & 2018)
- The Computer Misuse Act 1990
- The Copyright Design and Patents Act 1998
- The Regulation of Investigatory Powers Act 2000
What is the Data Protection Act?
- Designed to protect personal data and focusses on the data holder.
- Controls how personal info is used by companies and government.
What are the different roles covered in the 1998 Data Protection Act?
- Data Subject - Data stored about them, out of their control.
- Data Controller - Determines what data an organisation collects and how it is collected, processed/stored.
- Data Commissioner - Has power to enforce DPA - independent public body and reports directly to parliament and appointed by the crown.
What are the 2 main categories of the Data Protection Act?
- Personal Data - Name, Address, DOB
- Sensitive Data - Nationality, Ethnicity, Political beliefs
What are the 8 main principles of the Data Protection Act?
- Data collected and used fairly and inside the law
- Only held for specific reasons
- Only used for registered purpose
- Adequate, relevant and not excessive
- Kept accurate and up to date
- Not kept longer than necessary
- Kept safe and secure
- No transfer outside EEA unless country has data protection
What are the 8 main principles of the Data Protection Act?
- Data collected and used fairly and inside the law
- Only held for specific reasons
- Only used for registered purpose
- Adequate, relevant and not excessive
- Kept accurate and up to date
- Not kept longer than necessary
- Kept safe and secure
- No transfer outside EEA unless country has data protection
What are the rights held by people regarding the Data Protection Act?
- Right of subject access
- Right of correction
- Right to prevent direct marketing
- Right to prevent automatic decision making
What is the purpose of the 2018 Data Protection Act?
- In 2015, the EU began working on the General Data Protection Act
- The aim was to strengthen and standardise data protection regulations across Europe
Would the hacker be in breach of the DPA, if the hacker was able to access personal data. Who would be breaching DPA?
- DPA focusses on personal data - Hacker not in breach
- However, if hacker accessed employee data, the company would be in trouble
What is the Computers Misuse Act 1990?
- Gaining unauthorised access to the system
- Unauthorised access with intent to commit a crime
What actions does the Computers Misuse Act make illegal?
- Unauthorised access to a computer system
- Unauthorised access to digital materials with the intent to commit further crime
- Unauthorised modification of data
- Making, supplying or obtaining tools to commit computer misuse offence
What are some of the consequences of breaking the Computer Misuse Act?
- Fine
- Imprisoned
How would the hacker be breaking the Computer Misuse Act?
- As the hacker is gaining unauthorised access, they are breaking the law
- As they are accessing it with the intent of committing a further crime - committing 2nd most serious offence
- If they amend data - committing even more serious offence
What is the Copyrights Designs and Patents Act 1998?
- Individual/ organisations that produce media has their ownership - other parties can’t redistribute without permission
What does the Copyright Designs and Patents Act prevent people stealing and copying?
- Brand names
- Inventions
- Product Designs
- Original works