SLR 16/ Computer Legislation Flashcards

1
Q

What are the 8 principles of the Data Protection Act?

A

1.be fairly and lawfully processed.​
2.be processed for limited purposes.​
3.be adequate, relevant and not excessive.​
4.be accurate and up to
date.​
5.not be kept for longer than is necessary.​
6.be processed in line with your rights.​
7.be kept secure.​
8.not be transferred to other countries outside of the European Economic Area that do not have adequate data protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 7 acts illegal under the Computer Misuse Act

A

Unauthorized Work
Planting of viruses
Hacking
Deliberate data destruction
Data theft
Fraud
Program Theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the 3 main parts of the Computer Misuse Act.

A

Part 1 - Unauthorized access to computer material
Part 2 - Unauthorized access with intent to commit or facilitate the commission of further offences
Part 3 - Unauthorized acts with intent to ​impair or with recklessness as to ​impairing operation of a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the purpose of the Copyright Design and Patents Act?

A

This act makes it illegal to copy any work without the owner or copyright holder’s permission. In terms of IT, this relates to work such as digital files, images or software.​

Owning the copyright does not stop others from copying it, but it does allow the owner to take legal action through the courts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the main problem with the Copyright Design and Patents Act?

A

The main problem with IT copyright is that the person copying the work can be hard to trace. ​

Copies of software, images, audio and video files, etc. are easily made and shared.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the Regulation of Investigatory Powers Act (RIPA) give the right to?

A

-Demand ISPs provide access to customer communications​
-Prevent the existence of interception activities being revealed in court​
-Allow mass surveillance of communications​
-Allow monitoring of an individual’s internet activities​
-Demand access be granted to protected information​
-Demand ISPs fit equipment to facilitate surveillance​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly