Data Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are the Validation Checks?

A
  1. Range Check - checks data is within a certain range
  2. Presence Check - checks that data has actually been entered and not left blank
  3. Type Check - checks data is a certain data type
  4. Lookup Table - A table of acceptable entries

5.Format Check - checks data is entered in a certain way

  1. Length Checks - checks the length of the input is within a certain amount

7.Double Entry - Typing in data twice to make sure there is no errors

  1. Proofreading - Checks two copies of data to ensure they are exactly the same
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What act is used to protect the data of individuals that is stored on computers and processed by organisations?

A

Data Proetction Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the six principles of the data protection act?

A
  1. Collected lawfully and processed fairly
  2. Only used for the reasons specified
  3. Data must be relevant and not excessive
  4. Data must be accurate and up to date
  5. Data must not be stored for longer than nessecary
  6. Data must be stored and processed securely
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does the Data protection act work?

A

Each person who has their data stored is known as a data subject. An employee within an organisation must be appointed as a data controller and it is they who are responsible for registering with the Information Commissioner (person who is responsible for managing the several laws)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Computer Misuse Act (1990)?

A

The act attempts to stop and punish those who use computers inappropriately. Breaking any of the three principles could result in fines and a jail sentence but only if it can be prove it was done on purpose.

Principles:
1. No unauthorised access to data
2. No unauthorised access to data that could be used for further illegal activities
3. No unauthorised modification of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the Freedom of Information Act (2000)?

A

This act allows people to request public authorities to release information. Public authorities include local councils, government departments, universities and hospitals. A freedom of information request must be formally submitted in a letter or email and a reply is required within 20 days. Certain request would not be accepted such as if the processing request would be too expensive or if it involves sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Regulation of Investigatory Powers Act?

A

It is used to monitor and access online communications of suspected criminals. If criminal activity is suspected by an individual then this act grants the following powers act:

  • ISP’s must provide access to the suspect’s online communication.
  • Locked or encrypted data may be accessed
  • ISP’s could install surveillance equipment or software to track the suspect’s online activity
  • Access must be granted to personal information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Copyright, Designs and Patents Act (1988)?

A

This act makes it a criminal offence to copy work that is not your own without permission of the creator. Owing the copyright of an image might not prevent other from copying and using it but the act means the owner can bring legal proceedings in court to those who have stolen their work. This act prohibits he following actions:

  • Making copies of copyrighted material to sell to others.
  • Importing and downloading illegally copied material
  • Distributing enough copyrighted material that it’s noticeable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly