Week 3 - Key Cases and Legislation Flashcards

1
Q

Computer Misuse Act 1990​

A
  1. Unauthorised access to computer material.
    Max of 2 years imprisonment and/or fine.
  2. Unauthorised access with intent to commit or facilitate commission of further offences.
    Max of 5 years imprisonment and/or fine.
  3. Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of computer, etc.
    Max of 10 years imprisonment and/or fine.

3ZA.Unauthorised acts causing, or creating risk of, serious damage
Max of 14 years imprisonment (if threat to national security or human welfare, max penalty is life)

3A.Making, supplying or obtaining articles for use in offence under section 1, 3 or 3ZA
Max of 2 years imprisonment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Investigatory Powers Act 2016​

A

Brought together and updated existing powers that are available to law enforcement and the security and intelligence agencies. It created one new power allowing access to internet connection records, vital in confronting serious criminals, terrorists and hostile state activity in a digital age.​

It was intended to introduce transparency to and regulate state surveillance following Edward Snowden’s revelations of unlawful mass monitoring of the public’s communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data Protection Act 2018​

A

Everyone responsible for using personal data has to follow strict rules called ‘data protection principles’. They must make sure the information is: used fairly, lawfully and transparently.

  1. Used fairly, lawfully and transparently​
  2. Used for specified, explicit purposes – purpose limitation​
  3. Used in a way that is adequate, relevant and limited to only what is necessary – data minimisation​
  4. Accurate and, where necessary, kept up to date​
  5. Kept for no longer than is necessary – limitation principle​
  6. Handled in a way that ensures appropriate security, including protection against unlawful or unauthorised processing, access, loss, destruction or damage – integrity and confidentiality.​
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Protection Act Core Concepts

A

Personal Data : Information about a living individual.

Processing : Collecting, recording, storing, using, analyzing, combining, disclosing or deleting data.

Data Controller : The person/organisation that decides how and why to collect and use the data.

Processor : A separate person or organisation (not an employee) who processes data on behalf of the controller and in accordance with their instructions – a contractor.

Data Subject : Is the technical term for the individual whom particular personal data is about.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ICO – Information Commissioner’s Office​

A

The authority in charge of data protection in the UK – It provides advice, guidance, promotes good practice, monitors breach reports, conducts audits and advisory visits, considers complaints, monitors compliance and takes enforcement action where appropriate.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Sensitive data

A

Race​,
Ethnic background​,
Political opinions​,
Religious beliefs​,
Trade union membership​,
Genetics​,
Biometrics (where used for identification)​,
Health​,
Sex life or orientation​;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Rights

A

Be informed about how your data is being used​,
Access personal data​,
Have incorrect data updated​,
Have data erased​,
Stop or restrict the processing of your data​,
Data portability (allowing you to get and reuse your data for different services)​,
Object to how your data is processed in certain circumstances​;

You also have rights when an organisation is using your personal data for:​

Automated decision-making processes (a right to human involvement – reviewing, explaining),
Profiling, for example to predict your behavior or interests​;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security of processing

A
  1. Each controller and each processor must implement appropriate technical and organisational measures to ensure a level of security appropriate to the risks arising from the processing of personal data.​
  2. In the case of automated processing, each controller and each processor must, following an evaluation of the risks, implement measures designed to—​

a. prevent unauthorised processing or unauthorised interference with the systems used in connection with it,​

b. ensure that it is possible to establish the precise details of any processing that takes place,​

c. ensure that any systems used in connection with the processing function properly and may, in the case of interruption, be restored, and​

d. ensure that stored personal data cannot be corrupted if a system used in connection with the processing malfunctions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data Breach

A

The accidental or unlawful destruction, loss, alteration, unauthorised disclosure of, or access to, personal data. This includes breaches that are the result of both accidental and deliberate causes. It also means that a breach is more than just about losing personal data.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Breach possible consequences​

A

Fraud, identity theft and distress​,
Damage to relationships and research access​,
Reputational damage​,
A civil lawsuit for compensation​,
Investigation by the ICO​,
A fine of up to 20 million euros or 4% of the company turnover, whichever is higher;

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Digital Economy Act 2017​

A

A bill to make provision about electronic communications infrastructure and services;

  1. Provide a universal broadband service for the UK,
  2. Create an age-verification regulator,
  3. Copyright Infringement modifications,
  4. Data sharing – Digital Government,
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ofcom

A

They make sure:​

People are able to use communications services, including broadband;​

A range of companies provide quality television and radio programmes that appeal to diverse audiences;​

Viewers and listeners are protected from harmful or offensive material on TV, radio and on-demand;​

People are protected from unfair treatment in programmes, and don’t have their privacy invaded;​

The universal postal service covers all UK addresses six days a week, with standard pricing; and​

The radio spectrum is used in the most effective way​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Police, Crime, Sentencing and Courts Act 2022 (Extraction of information from electronic devices)​

A

Govern the extraction of information from electronic devices. These powers contain necessary safeguards that prioritise the individual’s privacy and ensure that any request to obtain information from a victim is necessary and proportionate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Online Safety Bill ​

A

A new set of laws to protect children and adults online. It will make social media companies more responsible for their users’ safety on their platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly