Legal, Moral, Ethical Flashcards

1
Q

Data protection act

A

1998
Used fairly and transparently and only what is necessary
Accurate and kept up to date
Kept for no longer than necessary
Protection against unauthorised processing
Stronger legal protection for sensitive info eg biometrics, health, race, religion, politics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data protection act rights

A

Be informed about how the data is used
Access personal data
Have correct data amended
Have data erased
Restrict or stop the processing
Restrict the portability
Object to how data is processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data protection act: accessing data

A

If given a written request, the organisation must give you a copy of the data as soon as possible within 1 month
If complex, can take 2 further months but must give reason for delay
Can withhold info with no explanation if about: crime, national security, tax, judicial appointments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Computer misuse act

A

1990
Unauthorised access to a computer (harsher punishment if used to facilitate another offense)
Acts that could impair the operation of a computer
Making or supplying tools that can be used in offenses
Acts causing or risking serious damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Copyright design and patents act

A

1988
Covers: literary, dramatic, musical, artistic, typographical, sound recordings, films
Most work protected for 70 years after the death of the creator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Copyright

A

Protects original works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Patents

A

Protect ideas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Trademarks

A

Protect indications of a commercial source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Licenses

A

Software users don’t own the software but are permitted to use it if they agree to the license terms.
The license may or may not place restrictions on the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Free software

A

Gives users the freedom to run, study, distribute and modify the software.
Most open-source software is free software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Proprietary software

A

Restrictions are loaded on the user.
Limited number of computers can use it
Specifying types of usage eg educational or non-profit use
Not providing users with the ability to study or modify code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Creative Commons license

A

Allows the owner to be attributed or choose how others can share, use or build on the material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attribution

A

Restriction using creative commons license
Credit must be given to the author for the original creation. All CC licenses must include this restriction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Share-alike

A

Restriction using creative commons license
New work based on the original must carry the same license.
This is used by Wikipedia.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

No derivatives

A

Restriction using creative commons license
Work cannot be shared with others in adapted form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Non-commercial

A

Restriction using creative commons license
The work may not be used for commercial advantage or monetary compensation for its use.

17
Q

Piracy

A

The illegal copying of software or data without regard to copyright.

18
Q

Digital rights management

A

A set of access control tools that can limit the time period in which the material can be used, the number of devices that can use it, prevent copying.

19
Q

Regulation of investigatory powers act

A

2000
Lays out the limits of police and government agencies’ powers.
Amended in 2016
Police and specified bodies can:
Demand access to digital communications with out informing the affected
Carry out mass surveillance of digital communications
Demand for equipment to be fitted to allow digital surveillance
Intercept ongoing digital communication
Keep interception warrants and data collected secret