3.8 Flashcards
what is the data protection act (DPA)
a law that protects data from being misused.
what are 5 examples of personal data
name, address, date of birth, race , religion
what do people who store data have to follow
data protection principles
what are exemptions to following the data protection principles
domestic purposes, law enforcement, intelligence services processing
what are the 6 data protection principles
personal data must be fairly and lawfully processed, personal data must be collected for specified and lawful purposes, personal data must be adequate, relevant and not excessive, personal data must be kept accurate and up to date, personal data will not be kept for longer than in necessary, personal data must be processed in line with the peoples rights.
how can organizations ensure that the data protection act is followed by employees
employees have training that is refreshed, have a policy that staff should follow, use passwords and usernames, use 2 factor authentication, reasons why data is collected are mentioned, report breeches, use back up and cloud storage, use systems with an automatic time out and restrict access.
what law is copyright covered under
copyright designs and patents act
what does copyright protect
the intellectual property of a person or company
what does copyright make illegal
copy, modify or distribute software or other intellectual property without the relevant permission
what happens to copy right when the owner dies
copyright will be automatically applied and will not expire until 25 - 70 years from the death of the creator depending on the type of work
what does an individual do if they think their work has been copied
If an individual believes that their work has been copied it is their responsibility to take action under the Copyright Designs and Patents Act
what are primary breeches of copy right and patents act
Copying an original work
Issuing a copy of the original work to the public
Renting/lending a copy of the original work to the public
Performing, showing or playing the original work in public
Making an adaptation of the original work
what are secondary breeches of copy right and patents act
Importing a copy of the original work
Possessing or dealing with a copy of the original work
Providing means to make copies of the original work
Permitting the use of premises for making copies of the original work
Provision of props/equipment for a performance of a copy of the original work
what is software piracy
the illegal copying and distribution of software
what do companies do to prevent software piracy
use a product key/license , use terms and conditions, use holograms,
what are the copyright exemptions
Uses for the benefit of people with a disability
Non-commercial research or private study
Recordings of broadcasts for archiving
Copies of books/documents made by a library, educational establishment, museums or archives
When used in a parody
how can individuals be monitored
Closed circuit television (CCTV)
Automatic number plate recognition (ANPR) - police cars, motorway,
Physical forms of identification (passports, bank cards, drivers licence etc.)
Network activity (IP/MAC addresses)
GPS data shared by apps
GPS trackers
how can individuals communication be monitored
Individuals communication can also be monitored
Parental control software to monitor children’s online activity
Social media
Web historie
what law allowed the police to access information about individuals
Investigatory Powers Act (2016)
what are the benefits of monitoring individuals
finding people who are lost, identify people on a network, locate friends for social activates, locate criminals, monitoring events at train stations/airports, verifying people for financial transactions
what are the drawbacks of monitoring individuals
compromises people’s privacy, expense of setting up, monitoring and maintaining, energy consumption, making the public not feel trusted
what are the 4 health and safety issues causes by prolonged use of IT
repetitive strain injury (RSI), back/neck problems, eye train, head aches
what are the causes of RSI and how do you prevent it
damage to fingers wrists and joints caused by a prolonged use of keyboard and mouse. Can be prevented by have correct posture, use wrist support, take breaks, use ergonomic keyboards
what are the causes of back/neck problems and how do you prevent them
caused by sitting Infront of a computer screen for too long, prevented by using adjustable chairs, take breaks , use a foot rest