Legal and cultural issues (unit 9) (Not finished) Flashcards

1
Q

(9.1) Why are there laws in computing?

A

to prevent actions such as hacking, stealing people’s data and intercepting messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(9.1) What are the big 4 computing acts?

A

Data Protection Act 1998:
Computer Misuse Act 1990
Copyright, Designs and Patents Act 1988
Regulation of Investigatory Powers Act 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(9.1) What is the Data Protection Act 1998?

A

controls the way data about living people is stored and processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(9.1) What is the Copyright, Designs and Patents Act 1988

A

covers the copying or use of other peoples’ work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(9.1) What is the Regulation of Investigatory Powers Act 2000

A

regulates surveillance and investigation, and covers the interception of communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(9.1) What is the Computer Misuse Act 1990

A

makes it an offence to access or modify computer material without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(9.1) How must personal details in the Data Protection Act 1998 be stored?

A
Be fair and lawful
Relevant and not excessive
Accurate and up to date
Only kept as long as needed
Only be used for the stated purpose
Be kept securely
Handled in line with peoples’ rights
Not be transferred to countries without protection laws
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(9.1) What is subject access request?

A

When companies are forced to allow you to see their data about you under the Data Protection Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(9.1) What is the main purpose of the Computer Misuse Act?

A

makes hacking a crime

also makes it illegal to:
access unauthorized computer material and edit them
supplying anything that can be used to commit computer misuse offences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(9.1) What is the main purpose of the Copyright, Designs and Patents Act?

A

This protects creators of books, music, video and software from having their work illegally copied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(9.1) How does code differ from books, films, games and music in terms of copyright?

A

Can’t own pieces of code/algorithms, but can own the others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(9.1) What is the main purpose of the Regulation of Investigatory Powers Act

A

requires (forces) ISPs to assist in surveillance of its customers if requested by police.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(9.1) How can laws such as these be viewed as a negative?

A

On one hand, intercepting messages and analysing bulk data can help identify criminals and terrorists

On the other, citizens value their privacy and may not trust their government if they

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(9.1) What are the questions in exam papers usually focused on for this topic?

A

Usually, it is a scenario question in which you need to know the 4 main acts and which would be applicable to the situation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(9.2)

A

9.2 is mainly about ethical, moral and cultural issues, and has no specific information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(9.3) How is freedom of speech restricted?

A

By people saying religious or racial bias sentences
encouragement of terrorism
spreading official secrets

17
Q

Which country has drastically different regulation on what its citizens can access on the internet?

A

China

18
Q

What is a troll?

A

Someone who sends threatening, offensive or indecent messages or commits other threatening acts towards others