Legal and cultural issues (unit 9) (Not finished) Flashcards
(9.1) Why are there laws in computing?
to prevent actions such as hacking, stealing people’s data and intercepting messages
(9.1) What are the big 4 computing acts?
Data Protection Act 1998:
Computer Misuse Act 1990
Copyright, Designs and Patents Act 1988
Regulation of Investigatory Powers Act 2000
(9.1) What is the Data Protection Act 1998?
controls the way data about living people is stored and processed.
(9.1) What is the Copyright, Designs and Patents Act 1988
covers the copying or use of other peoples’ work
(9.1) What is the Regulation of Investigatory Powers Act 2000
regulates surveillance and investigation, and covers the interception of communications
(9.1) What is the Computer Misuse Act 1990
makes it an offence to access or modify computer material without permission.
(9.1) How must personal details in the Data Protection Act 1998 be stored?
Be fair and lawful Relevant and not excessive Accurate and up to date Only kept as long as needed Only be used for the stated purpose Be kept securely Handled in line with peoples’ rights Not be transferred to countries without protection laws
(9.1) What is subject access request?
When companies are forced to allow you to see their data about you under the Data Protection Act
(9.1) What is the main purpose of the Computer Misuse Act?
makes hacking a crime
also makes it illegal to:
access unauthorized computer material and edit them
supplying anything that can be used to commit computer misuse offences
(9.1) What is the main purpose of the Copyright, Designs and Patents Act?
This protects creators of books, music, video and software from having their work illegally copied
(9.1) How does code differ from books, films, games and music in terms of copyright?
Can’t own pieces of code/algorithms, but can own the others
(9.1) What is the main purpose of the Regulation of Investigatory Powers Act
requires (forces) ISPs to assist in surveillance of its customers if requested by police.
(9.1) How can laws such as these be viewed as a negative?
On one hand, intercepting messages and analysing bulk data can help identify criminals and terrorists
On the other, citizens value their privacy and may not trust their government if they
(9.1) What are the questions in exam papers usually focused on for this topic?
Usually, it is a scenario question in which you need to know the 4 main acts and which would be applicable to the situation
(9.2)
9.2 is mainly about ethical, moral and cultural issues, and has no specific information