1.5.1 Flashcards

Computing related legislation (7 cards)

1
Q

The Data Protection Act 1998

A
  • Applies to data stored electronically and on paper
  • Covers personal data, defined as data which either alone or in conjunction with other data can be used to identify a living person.
  • Any individual who can be identified by personal data is know as the data subject.
  • Superseded in 2018 by the European General Data Protection Regulations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Eight specific protections are provided for data subjects

A
  1. Personal data shall be processed fairly and lawfully.
  2. Personal data shall be obtained only for one or more specified and lawful purpose.
  3. Personal data shall be adequate, relevant and not excessive for its purpose.
  4. Personal data shall be accurate and up to date.
  5. Personal data shall not be kept for longer than is necessary.
  6. Personal data shall be processed in accordance with the rights of data subject.
  7. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental
    loss or destruction of, or damage to, personal data.
  8. Personal data shall not be transferred to a country or territory outside the European Economic Area, unless that country or territory ensures an adequate
    level of data protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The data protection act provides three rights to data subjects:

A
  1. The right to request a copy of the data held about them
  2. The right to correct inaccurate data held about them
  3. The right to prevent the use of their data for marketing purposes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The Computer Misuse Act 1990

A
  • Covers hacking and other malicious use of
    computers
  • Frequently updated as technology changes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Three primary misuses of the computer misuse act

A
  1. Unauthorised access to computer materials.
  2. Unauthorised access with intent to
    commit further offences.
  3. Unauthorised modification of
    computer material.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Copyright, Design and Patents Act 1988

A
  • Protects works such as logos,
    photos, software code and music.
  • Applied automatically to original works.
  • Expires between 25 and 70 years after the author’s death.
  • Extended in 1992 to include computer software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The Regulation of Investigatory Powers Act 2000

A
  • Covers the use of investigation and surveillance by public organisations

-Requires Internet Service Providers and mobile phone providers to provide certain information about their users to an authorised authority if requested

-Requires ISPs to install suitable monitoring hardware on their network

  • Controversial as smaller organisations such as local councils can make use of its powers
  • Some feel that is it is improperly used and an invasion of privacy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly