Legislation Flashcards
What are some examples of illegal acts?
- Store or process personal data without keeping it secure and other conditions
- Make or trade in hacking tools, be it hardware or software
- Make digital copies of work without creator’s permission
- Intercept messages without legal authority to do so
What are the four computing related acts?
- Data Protection Act, 1998
- Computer Misuse Act 1990
- Copyright, Designs and Patents Act 1988
- Regulation of Investigatory Powers Act 2000
What is the purpose of the data protection act?
- Controls the way data about living people is stored and processed
- Designed to ensure that personal data is kept accurate, up to date, safe and secure and not used in ways which could harm individuals
What is the purpose of the Computer Misuse Act 1990?
• Offence to access or modify computer material without permission
What is the purpose of the Regulation of Investigatory Powers Act 2000?
• Regulates surveillance and investigation and covers the interception of communications
What are the principles of the data protection act?
- Data must be processed fairly and lawfully
- Data must be adequate, relevant and not excessive
- Data must be accurate and up to date
- Data must not be retained for longer than necessary
- Data can only be used for the purpose for which it was collected
- Data must be kept secure
- Data must be handled in accordance with peoples rights
- Data must not be transferred outside the EU without adequate protection
What is a requirement of all data users?
They must register with the Data Commissioner
What are personal details?
Refers to living, identifiable people
What are the exceptions to the act?
- National Security
- Crime and Taxation
- Domestic Purpose
What are the main principles of the computer misuse act?
The following are now recognized as offences:
• Access to computer material without permission/authorization
• Access to intent or to commit or facilitate a crime
What are the acts which have been made illegal by the computer misuse act 1990?
The following are considered crimes:
• Unauthorised access to computer material
• Unauthorised access with intent to commit or facilitate a crime
• Unauthorised modification of computer materials
• Making, supplying or obtaining anything which can be use din computer misuse offences
What is the purpose of the computer misuse act?
Designed to prevent unauthorized access or hacking of programs or data
What are some examples of offences committed via the computer misuse act 1990?
- Spreading a virus
- Attempting to log in without authorization
- Using someone else’s login
- Reading, changing or deleting data.
What is the purpose of the copyright, designs and patents act 1988?
Designed to protect the creators of books, music, video and software from having their work illegally copied.
What does the act make achieve?
• Makes it illegal to use, copy or distribute commercially available software without buying the appropriate license.
How does the copyright, designs and patents act 1988, affect music, software or a video?
Makes it illegal to:
• Pass a copy to a friend
• Make a copy and then sell it
• Use the software on a network, unless the license allows it
How has the software industry taken steps to prevent illegal copying of software?
- User must enter a unique key before the software is installed
- Some software will only run if the CD is present in the drive
- Some applications will only run if a special piece of hardware called a ‘’ done ‘’ is plugged into a USB port on the computer
How are algorithms protected under the copyright designs and patents act 1988?
- Algorithms are not protected by this act, you cannot prevent others from distributing this algorithm
- Algorithms cannot be copyrighted
What is the purpose of the regulation of investigatory powers act 2000?
- Regulates the powers of public bodies to carry out surveillance and investigation, and covers the interception of communications.
- Introduced to take account of the growth of technology, the internet and strong encryption.
What are the key features of the regulation of investigatory powers act 2000?
- Enables certain public bodies to demand that an ISP provide access to a customer’s
- Enables mass surveillance of communications in transit
- Enables certain public bodies to demand ISPs fit equipment and facilitate surveillance
- Enables certain public bodies to demand that someone hand over keys to protected information
- Allows certain public bodies to monitor people’s internet activities
- Prevents existence of interception warrants and any data collected with them from being revealed in court