TCPIP Flashcards
DPA - What is the DPA and the purpose of it?
The act that protects our data is called the Data Protection Act. The act came in 1998 to protect our personal data meaning it controls how our personal information is used by organisations, businesses or the government.
DPA - What is the 8 principles of the DPA?
Everyone responsible for using data has to follow strict rules called ‘data protection principles’. They must make sure the information is:
• used fairly and lawfully
• used for limited, specifically stated purposes
• used in a way that is adequate, relevant and not excessive
• accurate
• kept for no longer than is absolutely necessary
• handled according to people’s data protection rights
• kept safe and secure
• not transferred outside the European Economic Area without adequate protection
DPA - What is the GDPR?
General Data Protection Regulation. The legislation that will “replace” the DPA. (May 25th, 2018)
DPA - How many principles does the GDPR have compared to the DPA?
6 principles compared to DPAs 8. However, it has its own sections for individuals rights and overseas transfer
DPA - What is the biggest change with the GDPR?
It, compared to the DPA provides a new accountability requirement. This requires anyone it affects (everyone) to show how it complies with the principles.
DPA - Who is responisble for protecting data?
Everyone. And if the UK trades with for example china, the person in the company in the UK is in trouble if China has not got the DPA (which they don’t) In a breach the data controller is liable.
DPA - Will the GDPR be running alongside the DPA?
No it replaces it, but it will most likely have the same name as the DPA.
DPA - Personal data is protected by the DPA, but some things require stronger legal protection. List a few of them.
- Ethnic background
- Political opinions
- Religious beliefs
- Health
- Sexual health
- Criminal records
What are the rights of the data subject?
- Right of Subject Access
- Right of Correction
- Right to Prevent Distress
- Right to Prevent Direct Marketing
- Right to Prevent Automatic Decisions
- Right of Complaint to the ICO
- Right to Compensation
What is a subject access request?
A way of accessing data an organisation holds about you.
How do you perform a subject access request?
To receive a copy of this information you have to do a subject access request. Must apply in writing to the organisation (typically costs £20) Organisations must acknowledge the request and respond by 40 days. However, some types of personal data are exempt and cannot be obtained by a subject access request.
What are the different types of EU law?
Regulations, directives and decisions.
EU Law - Define: Regulations
Instantly binding from the date of issue and become national law regardless of whether the UK has enacted separate legislation. E.g General Data Protection Regulations 2018 Tachograph Regulations
EU Law - Define: Directives
Creates legislation that must be adopted and implemented by the UK within an agreed time period. The UK has created its own legislation to implement a number European Directives e.g an example is the Working Time Directive.
EU Law - Define: Decisions
Certain matters what is brought in front of the EU authorities. Does not affect individuals unlike the other two.
RIPA - What is RIPA and when was it implemented?
Regulation of Investigatory Powers Act - 2000
RIPA - How many parts does RIPA consist of, and what are they?
The RIPA consists of five parts:
- Interception of Communications and the Acquisition and Disclosure of Communications Data
- Surveillance and Covert Human Intelligence Sources
- Investigation of Electronic Data Protected by Encryption
- Scrutiny of Investigatory Powers and Codes of Practice
- Miscellaneous and Supplemental
RIPA - What is the main purpose of RIPA?
The main purpose of RIPA is to ensure that the relevant investigatory powers are used in accordance with human rights. Meaning it regulates in which certain public powers may conduct surveillance and access a person’s electronic communications.
CMA - What is CMA and when was it implemented?
Computer Misuse Act - 1990
CMA - Why was the Computer Misuse Act implemented?
Due to a case which had three offences for unauthorized access and modification. However, the act was felt inadequate by people outside of hacking.