Computing related legislation Flashcards
What are the four computer related legislation in this section?
The data protection act of 1998
The computer misuse act of 1990
The copyright design and patents act of 1988
The regulation of investigatory powers act 2000
What does the data protection act of 1998 state?
Anyone who stores personal details must keep them secure.
What principles does the data protection act of 1998 include?
- Data processed fairly and lawfully
- Data should only be collected for specific purposes
- Data should be relevant and not excessive
- Data should be accurate and up to date
- Data should not be kept longer than needed
- The user has a right to access and correct data
- The organisation must have suitable security
- Data can not be transferred outside the UK to any country with no data protection laws
How many principles does the Computer misuse act of 1990 contain?
Three.
What are the legal stipulations of downloading a piece of music, software or video?
It is illegal to give a copy to a friend.
It is illegal to make a copy and sell it.
It is illegal to use the software on a network unless the licence allows for it.
Who does the Copyright design and patents act apply to?
Any individual or organisation that produces media is protected by the Copyright, Design and Patents act.
What is the consequence of the Copyright, Design and patents act?
Other parties are not allowed to reproduce or redistribute it without permission.
What is the Data protection act of 1998 designed to do?
The Data Protection Act is designed to protect personal data and focuses on the data holder.
What sort of data is protected by the Data Protection act?
Sensitive data.
What are the three offences the Computer Misuse act of 1998 introduced?
Unauthorised access to computer material.
Unauthorised access with intent to commit or facilitate commission of further offences.
Unauthorised modification of computer material.
What steps could a company take to prevent illegal copying of their software?
DUC
ensuring the software will only run with the Dongle present in a USB port.
user must enter a Unique key before the software is installed.
ensuring the software will only run with the CD in the drive.
What is meant by personal data?
Any data which can be used to identify a living person or which can be used in combination with other data to identify a living person
Which act concerns the malicious use of computers?
The computer misuse act 1990
Which act protects people’s property online?
The copyright, designs and patents act 1988
Name two of the three primary offences under the computer misuse act 1990
Two from:
1) Unauthorised access to computer materials
2) Unauthorised access with intent to commit further offences
3) Unauthorised modification of computer material