Legislation Flashcards

1
Q

What are some examples of illegal acts?

A
  • Store or process personal data without keeping it secure and other conditions
  • Make or trade in hacking tools, be it hardware or software
  • Make digital copies of work without creator’s permission
  • Intercept messages without legal authority to do so
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four computing related acts?

A
  • Data Protection Act, 1998
  • Computer Misuse Act 1990
  • Copyright, Designs and Patents Act 1988
  • Regulation of Investigatory Powers Act 2000
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of the data protection act?

A
  • Controls the way data about living people is stored and processed
  • Designed to ensure that personal data is kept accurate, up to date, safe and secure and not used in ways which could harm individuals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of the Computer Misuse Act 1990?

A

• Offence to access or modify computer material without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of the Regulation of Investigatory Powers Act 2000?

A

• Regulates surveillance and investigation and covers the interception of communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the principles of the data protection act?

A
  • Data must be processed fairly and lawfully
  • Data must be adequate, relevant and not excessive
  • Data must be accurate and up to date
  • Data must not be retained for longer than necessary
  • Data can only be used for the purpose for which it was collected
  • Data must be kept secure
  • Data must be handled in accordance with peoples rights
  • Data must not be transferred outside the EU without adequate protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a requirement of all data users?

A

They must register with the Data Commissioner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are personal details?

A

Refers to living, identifiable people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the exceptions to the act?

A
  • National Security
  • Crime and Taxation
  • Domestic Purpose
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the main principles of the computer misuse act?

A

The following are now recognized as offences:
• Access to computer material without permission/authorization
• Access to intent or to commit or facilitate a crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the acts which have been made illegal by the computer misuse act 1990?

A

The following are considered crimes:
• Unauthorised access to computer material
• Unauthorised access with intent to commit or facilitate a crime
• Unauthorised modification of computer materials
• Making, supplying or obtaining anything which can be use din computer misuse offences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of the computer misuse act?

A

Designed to prevent unauthorized access or hacking of programs or data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some examples of offences committed via the computer misuse act 1990?

A
  • Spreading a virus
  • Attempting to log in without authorization
  • Using someone else’s login
  • Reading, changing or deleting data.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the purpose of the copyright, designs and patents act 1988?

A

Designed to protect the creators of books, music, video and software from having their work illegally copied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the act make achieve?

A

• Makes it illegal to use, copy or distribute commercially available software without buying the appropriate license.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does the copyright, designs and patents act 1988, affect music, software or a video?

A

Makes it illegal to:
• Pass a copy to a friend
• Make a copy and then sell it
• Use the software on a network, unless the license allows it

17
Q

How has the software industry taken steps to prevent illegal copying of software?

A
  • User must enter a unique key before the software is installed
  • Some software will only run if the CD is present in the drive
  • Some applications will only run if a special piece of hardware called a ‘’ done ‘’ is plugged into a USB port on the computer
18
Q

How are algorithms protected under the copyright designs and patents act 1988?

A
  • Algorithms are not protected by this act, you cannot prevent others from distributing this algorithm
  • Algorithms cannot be copyrighted
19
Q

What is the purpose of the regulation of investigatory powers act 2000?

A
  • Regulates the powers of public bodies to carry out surveillance and investigation, and covers the interception of communications.
  • Introduced to take account of the growth of technology, the internet and strong encryption.
20
Q

What are the key features of the regulation of investigatory powers act 2000?

A
  • Enables certain public bodies to demand that an ISP provide access to a customer’s
  • Enables mass surveillance of communications in transit
  • Enables certain public bodies to demand ISPs fit equipment and facilitate surveillance
  • Enables certain public bodies to demand that someone hand over keys to protected information
  • Allows certain public bodies to monitor people’s internet activities
  • Prevents existence of interception warrants and any data collected with them from being revealed in court