Legal moral ethical Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Other than hacking, what is illegal?

A

storing and processing data without keeping it secure
make or trade hacking tools
make digital copies of work without permission
intercept electronic messages without legal authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the big 4 acts?

A

Data protection act 1998
Computer misuse act 1990
copyright, designs and patents act 1988
Regulatory of investigatory powers act 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data protection act principles (8)

A

Be fair and lawful
Relevant and not excessive
Accurate and up to date
Only kept as long as needed
Only to be used for stated purpose
Be kept securely
Handled in line with rights
Not to be transferred to countries without protection laws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Exceptions to data protection act

A

National security
Crime and taxation
Domestic purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does the computer misuse act cover?

A

Unauthorised access to material
Unauthorised access with intent to facilitate a crime
Unauthorised modification of material
Making, supplying or obtaining anything to be used in computer misuse offenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Computer misuse act 1990 offense examples

A

Spreading a virus
Attempt to log in without authorisation
Using someone else’s login
Reading, changing or deleting data
Obtaining or creating a ‘packet sniffer’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the copyright designs and patents act for?

A

to protect creators of books, music, video, and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the regulation of investigatory powers act 2000 do?

A

Requires ISPs to assist in surveillance secretly
Enables mass surveillance of communications in transit and monitoring of internet activities
Enables public bodies to demand private info keys be handed over
Prevents the existence of interception warrants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly