T5 - Legislation Flashcards
Data protection:
about looking after the personal data of people
The Data Protection Act (2018) is the law that covers this
Organisations that collect personal data must:
Only collect the data for a specific purpose
Make sure the data is accurate
Data that is not necessary for the specific purpose may not be collected
Data can come from user sign-up details
Data collection sources:
3rd parties – other companies can sell or share the data
Cookies track users as they browse websites
Paper registration forms
CCTV
Viewing habits with streaming services
Data processing:
Reasons for lawful processing:
Consent
Legal obligation
Public task
Contract
Vital interests
Legitimate interests
Consent meaning and eg
A person has agreed to their data being used
A tick box to consent to receive a newsletter
Contract meaning and eg
Processing is needed for a contract
A contract for buying a house
Legal obligation meaning and eg
Processing the data is needed to meet the law
Keeping tax records
Vital interests meaning and eg
Processing is needed to protect someone’s life
A teacher gives a collapsed student’s name to a paramedic
Public task meaning and eg
For performing an official task
A criminal court
Legitimate interests meaning and eg
There is a clear benefit to the user or company
Processing customer data
Data storage: conditions
The data is kept accurate and up to date
It is not kept any longer than necessary
It must not be transferred to other countries unless they can keep it protected
Customers must be told of a data breach within 72 hours of it happening
Methods of securing data:
Using passwords for any systems with access to the data
Encrypting the data
Only allowing access to those users that need it
CCTV
Security guards
Two-factor authentication
The Data Protection Act (2018) gives a number
of rights:
The right to view data stored about you by organisations for free
You must consent to having marketing sent to you – this consent must be ‘opt-in’
The right to withdraw consent
The right to make changes to your data if it is inaccurate
The right to be forgotten
Penalties from the Data Protection Act include:
Issuing warnings to the organisation
Order the organisation to comply
Privacy: Every time you log on to a web site
data about your visit may be collected and stored
Privacy: Every time you use your phone to make a call,
data about the number called, time and date called, and the duration of the call, is collected and stored
The Data Protection Act (2018): The right to withdraw consent
– mailing lists have an unsubscribe link for this
The Data Protection Act (2018): The right to be forgotten
– allows you to delete your personal data
Privacy online: Many online services such as search engines and social media are free to use
These services are paid for by targeted advertising
Cookies
- are sent to a user’s computer from
web sites. - Users must consent to receiving cookies
Cookies allow websites to:
Store data such as the contents of your shopping basket
Remember that you are logged into a website
Remember who you are
Track you
Target advertising to you
The Computer Misuse Act (1990) created the following offences:
Unauthorised access to computer material
Unauthorised access with intent to commit or facilitate a crime
Unauthorised modification of software or data
Making, supplying or obtaining anything which can be used in computer misuse offences
Penalties: for violating The Computer Misuse Act (1990)
Fine
10 yrs in prison
Unauthorised access
- is where a person gains access to a computer system without permission
Unauthorised access eg
Eg - hacker, employee who has permission to use some of a system, but gains access to another part
Hackers: try to
try to find weaknesses in a computer system
gain access with one user account
then try to alter the permissions to get root or admin access
Unauthorised modification includes:
Deleting another user’s files
Changing the content of documents
Altering the content of web pages
Rewriting computer programs to remove activation keys
Copyright, Designs and Patents Act (1988)
Inventions are covered by patents
A patent prevents anyone else using the invention for 20 years
Copyright, Designs and Patents Act (1988) -
Copyright protects books, video, music and software
Copyright typically lasts 70 years after publication or an author’s death
Copyright, Designs and Patents Act (1988) - music/ books
Copyright lets an author or musician decide how their work should be used
Copyright infringement penalties =
Fines + Up to 10 years in prison
How softwares prevent copyright:
Licence keys, activation keys and serial numbers
Holograms on physical products to show they are genuine
Online registration or activation
Online registration to prevent copyright
will prevent the software from working if a licence has not been purchased
Copyright and the cloud:
This is very hard to copy as the software is accessible only within the companies servers
The user views the output of the software through their web browser
Software licensing:
protected by copyright law
It may only be used if you created it yourself or you are licensed to use it
For proprietary software a licence must be
purchased before the software can be used
For open source software the licence normally permits
the software to be downloaded for free – the licence often has conditions such as requiring you not to sell it
Proprietary software:
most common
The source code is usually kept by the developer (closed-source) and the user receives the compiled programs
The software cannot be adapted or modified by the user
The software can only be used if the user has a licence (which is usually paid for)
This type of software is typically off-the-shelf and not custom made
Open source software
- provides access to the source code that was used to create it
By having the source code, users have
the freedom to develop or modify it
Open source software:
developed collaboratively by many programmers
Open source software: By having the source code,
users have
the freedom to develop or modify it
Open source software: developed by
developed collaboratively by many programmers