Internal policies and the law Flashcards

1
Q

What would the risk be of responding to an email?

A

The risk of opening a virus, spyware, phishing, scamming, hacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What would be the risk of opening a hyperlink?

A

The risk of opening a virus, spyware, phishing, scamming, hacker. or link to fake websites - stealing personal info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What would be the risk of opening a USB?

A

The risk of introducing a virus and employee stealing confidential data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What would be the risk of firing an employee?

A

Vandalism, theft of data, deliberate disruption of network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What would be the risk of taking selfies?

A

The risk of exposing private information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What would be the physical and logical protection methods for a server room?

A

Logical protection methods - Biometrics, RFID badges; physical protection methods - keypad on the door that only privileged staff have access to.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Computer Misuse Act 1990 state it is illegal to do?

A
  • Access someone else’s computer without permission.
  • Access someone else’s computer without permission with intention to cause further criminal offences e.g. hacking.
  • Altering computer data without permission e.g. creating a virus.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Data Protection Act 1998 (DPA)?

A

It is a series of rules about how a data controller (company) stores data about data subjects (people).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the DPA rules?

A
  • The data must be used within the law.
  • It must only be held for the reasons provided to the commissioner.
  • The data can only be disclosed to the parties agreed during the registration.
  • The data must be kept accurate and up to date - if changes are provided by the subject, the controller must make the appropriate changes.
  • The data cannot be stored for longer than agreed.
  • The information must be kept safe and secure.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the data covered by the DPA?

A

The data subject must be specifically asked if a data controller wants to store sensitive information about them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the rights of the data subject?

A
  • The data subject has the right to access their information.
  • The data subject has the right to correct any inaccuracies.
  • the right to prevent distress - the data subject may prevent the use of information if it is likely to cause distress.
  • The right to prevent direct marketing.

But these rights only apply if you know exactly who is storing the information about you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the exemptions to the DPA?

A
  • Any data stored by a national security reason is not covered by the DPA - for example, data stored by MI5 or MI6.
  • Personal data stored by an individual - for example, if you store a list of your friends addresses or birthdays.
  • The taxman does not have to disclose information used to process a crime or fraud detection.
  • The data subject does not have the right to see medical information.
  • A school pupil does not have the right to see personal files or exam results before publication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the Copyrights, Designs and Patents Act 1998?

A

it is illegal to:

  • Copy
  • Change
  • Distribute

Anyone else’s property. This includes songs, videos, images, text or software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the Acceptable Use Policy?

A

Covers the security and use of all the company’s information and IT equipment.

Applies to all employees, contractors and agents.

Covers:

  • Password policy.
  • Ensuring you leave your PC locked.
  • Ensuring you do not write your password down / give it to anyone else.
  • Clear desk policy.
  • Working off site policy.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Internet and Email usage policy (Not limited to…)?

A

Individuals must not:

  • Use the internet or email for the purposes of harassment or abuse.
  • Use profanity, obscenities, or derogatory remarks in communications.
  • Access, download, send or receive any data (including images), which could be considered offensive in any way.
  • use the internet or email to make personal gains or conduct a personal business.
  • Use the email systems in a way that could affect its members, clients, and stakeholders.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Code of Conduct?

A
  • Companies concerned about maintaining internet integrity to maintain security standards and respect for the benefit of all of its members, clients and stakeholders.
  • To comply with this, such organizations usually insist that their members abide by the Cyber Security Code of Conduct as outlined in their place of employment, and if they fail to do so, penalties - including hefty fines and/or imprisonment - will be applied.
  • The Code of Conduct often includes the company’s mission statement and values statement.
  • it will also include how to report misconduct and violations.
17
Q

What is Document and File Control?

A
  • In a large company, the quality of the data is vital.
  • A document management system (DMS) is a system used to track, manage and store documents.
  • When tracking documents, version control is very important.
  • Document control is a requirement of ISO9001 (an international organizational standard).