✅1.5.1 Computing related legislation Flashcards

(27 cards)

1
Q

What is meant by personal data?

A

Any data which can be used to identify a living person or which can be used in combination with other data to identify a living person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which act concerns the malicious use of computers?

A

The computer misuse Act 1990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which act protects people’s property online?

A

The copyright, designs and patents act 1988

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which act covers the use of personal data?

A

The data protection act 1998

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which act covers investigation and surveillance by public bodies?

A

The regulation of investigatory powers act 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which act prevents computer programs from being copied?

A

The copyright, designs and patent act 1988

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What name is given to an individual who can be identified by personal data?

A

Data subject

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name 5 data protection principles

A

They must make sure that information is:
1. Personal data must be used fairly, lawfully, and transparently
2. Personal data must be used for specified, explicit purposes
3. Personal data must be used in a way that is adequate, relevant, and not excessive
4. Personal data must be accurate and, where necessary, kept up to date
5. Personal data must be kept for no longer than is necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How does the data protection principle “Personal data must be used fairly, lawfully, and transparently” affect a company?

A

A company has to be clear about what personal data they wish to collect and what they want to use it for.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does the data protection principle “Personal data must be used for specified, explicit purposes” affect a company?

A

A company cannot use personal data for any purpose other than what they stated originally. They also cannot pass this data on without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does the data protection principle “Personal data must be used in a way that is adequate, relevant, and not excessive” affect a company?

A

A company cannot request personal data that they do not need right away.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does the data protection principle “Personal data must be kept for no longer than is necessary” affect a company?

A

A company must delete personal data once they no longer have a need for it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does the data protection principle “Personal data must be accurate and, where necessary, kept up to date” affect a company?

A

If a company holds personal data that is wrong or out of date then you have a right to have it corrected or deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are 4 actions companies must take under the data protection act 1998?

A
  1. Companies must appoint a member of staff as their Data Controller. They will then be responsible for making sure that the principles of the Data Protection Act are not breached and to keep in communication with the Information Commissioner
  2. The company must put in place physical or digital security measures to prevent the data from being accessed without consent
  3. The company should make sure that they train their staff to abide by the principles
  4. Companies must send a copy of the subject’s data if a Subject Access Request (SAR) is received. This copy must be sent securely after the company has verified the identity of the subject
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens to companies if they are found to be in breach of the Data Protection Act?

A

They can face extremely large fines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name 5 rights you have under the data protection act 2018

A

The right to:
1. Be informed about how your data is being used
2. Access personal data
3. Have incorrect data amended
4. Have data erased
5. Stop or restrict the processing of your data restrict the portability of data, or sharing with third parties

17
Q

What is the Data Protection Act 1998?

A

A law that protects personal data from being misused

18
Q

What is the Computer Misuse Act 1990?

A

A law that concerns the malicious use of computers. The act was originally created to make sure that computer hacking was covered within the law.

19
Q

Name two of the three primary offences under the computer misuse act 1990?

A
  1. Unauthorised access to computer materials.
  2. Unauthorised access with intent to commit further offences.
  3. Unauthorised modification of computer material.
20
Q

What is the General Data Protection Regulation (GDPR)?

A

A regulation in EU law that seeks to ensure data protection and privacy for citizens of the EU and EEA.

21
Q

What does the copyright, designs and patent act 1988 legislate?

A

A law that protects the intellectual property of an individual or a company
It makes it illegal to copy, modify or distribute software or other intellectual property without the relevant permission
If original work is original, copyright will be automatically applied and will not expire until 25 - 70 years from the death of the creator depending on the type of work
If an individual believes that their work has been copied it is their responsibility to take action under the Copyright Designs and Patents Act.

22
Q

What are 10 prohibited actions under the Copyright, Designs and Patents Act 1988?

A

Primary Breaches:
1. Copying an original work
2. Issuing the copy of the original work to the public
3. Renting/lending the copy of the original work to the public
4. Performing, showing or playing the original work in public
5. Making an adaptation of the original work

Secondary Breaches:
1. Importing a copy of original work
2. Possessing or dealing with a copy of the original work
3. Providing means to make copies of the original work
4. Permitting the use of premises for making copies of the original work
5. Provision of props/equipment for a performance of a copy of the original work

23
Q

What does copyright protect?

A

Original works.

24
Q

What does design rights protect?

A

The shape or configuration of a product or item.

25
What is the Regulation of Investigatory Powers Act 2000?
A law that legislates as to how organisations can monitor electronic communications The RIPA covers investigation, surveillance and interception of communication by public bodies
26
What does the Regulation of Investigatory Powers Act 2000 enforce internet service providers (ISPs) and mobile phone companies to do?
To give up information on request from an authorised authority and to ensure that their networks have sufficient hardware installed to facilitate surveillance about a person
27
Why is the Regulation of Investigatory Powers Act 2000 particularly controversial?
Because its powers also extend to small agencies like local councils. So some people feel that the Act is an invasion of privacy or that it is used improperly. For example, this act has been used for reasons other than monitoring criminal or terrorist activities including monitoring cockle fisherman, fly tippers, and even a family to work out whether they lived in the catchment area of a local school.