Computing related legislation Flashcards

1
Q

What are the four computer related legislation in this section?

A

The data protection act of 1998

The computer misuse act of 1990

The copyright design and patents act of 1988

The regulation of investigatory powers act 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the data protection act of 1998 state?

A

Anyone who stores personal details must keep them secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What principles does the data protection act of 1998 include?

A
  • Data processed fairly and lawfully
  • Data should only be collected for specific purposes
  • Data should be relevant and not excessive
  • Data should be accurate and up to date
  • Data should not be kept longer than needed
  • The user has a right to access and correct data
  • The organisation must have suitable security
  • Data can not be transferred outside the UK to any country with no data protection laws
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many principles does the Computer misuse act of 1990 contain?

A

Three.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the legal stipulations of downloading a piece of music, software or video?

A

It is illegal to give a copy to a friend.
It is illegal to make a copy and sell it.
It is illegal to use the software on a network unless the licence allows for it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who does the Copyright design and patents act apply to?

A

Any individual or organisation that produces media is protected by the Copyright, Design and Patents act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the consequence of the Copyright, Design and patents act?

A

Other parties are not allowed to reproduce or redistribute it without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Data protection act of 1998 designed to do?

A

The Data Protection Act is designed to protect personal data and focuses on the data holder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What sort of data is protected by the Data Protection act?

A

Sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the three offences the Computer Misuse act of 1998 introduced?

A

Unauthorised access to computer material.
Unauthorised access with intent to commit or facilitate commission of further offences.
Unauthorised modification of computer material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What steps could a company take to prevent illegal copying of their software?

A

DUC
ensuring the software will only run with the Dongle present in a USB port.
user must enter a Unique key before the software is installed.
ensuring the software will only run with the CD in the drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is meant by personal data?

A

Any data which can be used to identify a living person or which can be used in combination with other data to identify a living person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which act concerns the malicious use of computers?

A

The computer misuse act 1990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which act protects people’s property online?

A

The copyright, designs and patents act 1988

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name two of the three primary offences under the computer misuse act 1990

A

Two from:

1) Unauthorised access to computer materials
2) Unauthorised access with intent to commit further offences
3) Unauthorised modification of computer material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which act covers investigation and surveillance by public bodies?

A

The regulation of investigatory powers act 2000

16
Q

Which act prevents computer programs from being copied?

A

The copyright, designs and patents act 1988

17
Q

What name is given to an individual who can be identified by personal data?

A

Data Subject

18
Q

What is the problem with RIPA?

A

Critics claim terrorism, Internet crime and paedophillia were used to push act through and there was little debate in Commons.

Examples of act being used for reasons other than monitoring crimes/terrorist activities including, monitoring cockle fisherman, fly tippers and a family to determine weather they were in the catchment area of a school

19
Q

1) What did the Computer Misuse Act state?

2) Define hacking

A

1) makes unauthorized access to computer systems illegal:

The intent to commit or facilitate commission of further offences with intent to impair the operating of a computer

2) Those who exploit weakness in a system or who customise systems or who edit open source work

20
Q

What features are used to minimise the threat of hackers and virus distribution?

A

Digital signatures or certificates that use encrypted messages to confirm the ID of sender

SSL (Secure socket layer) is a protocol that enables encrypted links between computers to ensure the security of transaction

User ID’s, passwords and access rights are used for basic ID of users and their rights to access specific data

Anti malware software used to ID and remove suspicious software

Firewalls are apps that sit between the system and external access to prevent certain unauthorised data and users accessing the system. Defence against DDoS)

21
Q

What is the data controller?

A

The person responsible for implementing the provisions of the DPA within an organisation

22
Q

What exemptions are there to the DPA?

A

National security = data processed in relation to NS is exempt from the act

Crime and taxation = any data used to detect/prevent crime or assist in collection of taxes is exempt

Domestic purpose = any data used solely for individual family or household use is exempt

23
Q

What is the Copyright designs and patents act (1988)?

A

protects the intellectual property rights of individuals and organisations. This law makes it illegal to Copy, Modify or Distribute any software or any other intellectual property without permission of the original creator.

24
Q

What features do companies/organisations/individuals use to make services un-discriminatory?

A

Screen readers for the blind

options for larger text or magnifier may be appropriate for people with poor sight

choice of font as some fonts may be hard for disabled to read

Tagging images with audio description for those of poor sight

choosing contrasting colours for text and background to make them stand out for those who are partially or colour blind

Deaf users should have access to subtitles or a transcript of a video

25
Q

What is the regulatory investigative powers act? (RIPA 2000)

A

Intended to allow suitable authorities access to communications to prevent criminal or terrorist activities

powers include:
- Interception of communications (Wire taps and reading post)

  • Use of communications data (info about comes but not the content)
  • directed surveillance (following people)
  • covert human intelligence sources (informers, undercover officers)
  • intrusive surveillance (bugging)
  • mass surveillance
  • demand Access to protected info from ISP
  • allowing monitoring of individual’s Internet activities
  • Prevent existence of such interception activities being revealed in court
  • All of above powers only available to specific authorities. Eg; interception of communications is only permitted to authorities such as GCHQ
26
Q

RIPA Grants rights to:

A

Demand ISPs provide access to a customer’s surveillance

Demand ISPs fit equipment to facilitate surveillance

Demand access be granted to protected information

Prevent existence of such interception activities being revealed in court