Legal Issues Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What are the three acts?

A
  • Data Protection Act
  • Copyright Law
  • Computer Misuse Act
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the DATA PROTECTION ACT?

A
  • The Data Protection Act was introduced to ensure that the data held on clients conformed to certain principles, such as: being held securely, being up to date and not kept longer than necessary.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is Data kept securely? - PASSWORDS

A
  • Passwords entered in to software applications should only be accepted if they are strong and so more difficult to break; strong passwords are created by using mixtures of numbers, letters, and symbols, using lower case and upper case so that the final password does not look like a word.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is Data kept securely? - ENCRYPTION

A
  • Encryption is used to make stored data more secure, by making it unreadable to people who do not have the key to decode it. This method is commonly used to protect data transmitted over the Internet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How is Data kept securely? - SELECTIVE DROP-DOWN MENUS

A

Selective drop-down menus are sometimes used as a security method to add letters for a password, rather than just typing them; this prevents key-logging software from viewing the systems and gaining access to important passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PERSONAL DATA MORAL ISSUES - Misuse of personal data

A
  • MISUSES OF PERSONAL DATA – selling it to businesses that use the data
    for a different purpose to the original reason it was collected.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PERSONAL DATA MORAL ISSUES - Data security

A
  • DATA SECURITY – personal data is stored on networks that can be
    broken into and stolen by hackers. In some cases government
    employees have lost laptop computers with unencrypted personal details
    of taxpayers which have got into the wrong hands, causing privacy issues.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the COPYRIGHT DESIGN AND PATENTS ACT?

A
  • The Copyright Design and Patents Act introduced to protect the intellectual property of individuals and organisations that create and produce materials based on their own individual ideas.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why is copyright legislation useful? - PIRACY

A
  • PIRACY is the illegal copying of software for either personal use or business use; this
    can include illegal downloading of games and music as well as commercial software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is copyright legislation useful? - THEFT

A
  • THEFT of hardware and software ideas and innovations. In an industry that moves so fast there is seldom time to patent your invention before you release it on to the open market.
  • Many organisations purchase their rivals’ products with the express purpose of copying their ideas, which saves them considerable expense on research and development.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are example of copyright issues?

A
  • Unauthorised use of software – downloading or copying software illegally without purchasing the necessary software licence
  • Illegal copying of music and films
  • Illegal copying of web content
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the Computer Misuse Act?

A
  • The Computer Misuse Act was introduced with the express purpose of preventing attacks on ICT systems to commit crimes or to damage the system; this legislation made hacking and the introduction of a computer virus into criminal offences.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Hacking?

A
  • Hacking is the practice of breaking into computer systems and it is essential that preventative measures are taken.
  • The main techniques are to utilise a firewall and to set up some intrusion detection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Computer Virus?

A
  • A computer virus is a program designed to cause damage to a computer system.
  • The use of a virus scanner or antivirus software helps to minimise the risk from viruses; this software searches the computer system for viruses and deletes them once detected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can be done with spyware?

A
  • Spyware can be loaded into a computer system as a software virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Computer misuse issues

A
  • Unauthorised access by hackers for fraud purposes or to gain access just for the challenge of it.
17
Q

What is the Regulation of Investigatory Powers Act (2000)?

A
  • Regulation of Investigatory Powers Act was introduced to explain the powers that public authorities, such as the intelligence service, POLICE.
18
Q

What is the Regulation of Investigatory Powers Act (2000) -What are the main parts of this legislation?

A
  • ISPs providing access to customer communications
  • Telephone tapping
  • Monitoring individuals’ Internet activities
  • Accessing protected information, if encrypted the authorities have the right to demand the file be deciphered, even if that means the encryption key must be handed over.