droit du numérique Flashcards

révision (57 cards)

1
Q

What is the main objective of digital law?

A

To regulate the use of digital technologies and protect the rights of individuals and entities in the digital environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Digital law only applies to companies operating online.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does ‘data protection’ refer to in digital law?

A

The legal framework that governs the collection, storage, and processing of personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blank: The __________ Directive is a key piece of legislation in the EU regarding data protection.

A

GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two main categories of digital law?

A

Cyber law and information technology law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which principle requires that personal data be processed lawfully, fairly, and transparently?

A

Lawfulness, fairness, and transparency principle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the role of the CNIL in France?

A

To protect personal data and ensure compliance with data protection laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Multiple Choice: Which of the following is NOT a right under the GDPR? A) Right to access B) Right to be forgotten C) Right to anonymity D) Right to data portability

A

C) Right to anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is meant by ‘digital footprint’?

A

The trail of data one leaves behind while using the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False: Cookies are used to track user behavior online.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the purpose of a privacy policy?

A

To inform users about how their personal data will be collected, used, and protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Fill in the blank: The __________ law governs the use of computer systems and networks.

A

Cyber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the significance of the ‘right to data portability’?

A

It allows individuals to transfer their personal data between service providers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What constitutes a breach of data security?

A

An incident that leads to the unauthorized access, destruction, or alteration of personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multiple Choice: Which of the following is a legal basis for processing personal data under the GDPR? A) Consent B) Social media usage C) Age D) Gender

A

A) Consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

True or False: Data minimization means collecting as much data as possible.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does the acronym DPIA stand for?

A

Data Protection Impact Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Fill in the blank: The __________ is the entity responsible for ensuring compliance with data protection regulations.

A

Data Controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is phishing?

A

A cyber attack that attempts to trick individuals into providing sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

True or False: Encryption is a method used to protect data from unauthorized access.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the purpose of the ePrivacy Directive?

A

To regulate privacy and electronic communications in the EU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What does ‘cybersecurity’ encompass?

A

The measures taken to protect computer systems and networks from cyber threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Multiple Choice: Which of the following is a common type of cyber attack? A) Malware B) Antivirus C) Firewall D) Encryption

24
Q

What is the ‘right to be forgotten’?

A

The right of individuals to have their personal data erased under certain conditions.

25
Fill in the blank: __________ is a term used to describe the illegal access to computer systems.
Hacking
26
What is the main function of a firewall?
To monitor and control incoming and outgoing network traffic based on predetermined security rules.
27
True or False: Individuals have no control over their personal data once it is online.
False
28
What are the penalties for non-compliance with the GDPR?
Fines of up to 4% of annual global turnover or €20 million, whichever is higher.
29
What does the term 'digital divide' refer to?
The gap between those who have easy access to digital technology and those who do not.
30
Multiple Choice: Which of the following is an example of personal data? A) A person's IP address B) A company's revenue C) A public building's address D) A product's price
A) A person's IP address
31
What is the significance of consent in data processing?
It is a fundamental requirement for lawful processing of personal data.
32
Fill in the blank: __________ refers to the ethical and legal obligations of organizations to protect personal data.
Data stewardship
33
What is the function of a VPN?
To create a secure connection over a less secure network, such as the internet.
34
True or False: The GDPR applies to organizations outside the EU if they process the data of EU citizens.
True
35
What does the term 'algorithmic bias' refer to?
The presence of systematic and unfair discrimination in algorithmic decision-making.
36
Multiple Choice: Which of the following is a characteristic of strong passwords? A) Short length B) Use of personal information C) Combination of letters, numbers, and symbols D) Easy to remember
C) Combination of letters, numbers, and symbols
37
What is the purpose of two-factor authentication?
To enhance security by requiring two forms of verification before granting access.
38
Fill in the blank: __________ is the practice of analyzing data to extract useful information.
Data mining
39
What does 'digital literacy' entail?
The ability to effectively and critically navigate, evaluate, and create information using digital technologies.
40
True or False: All data breaches must be reported to the affected individuals within 72 hours.
True
41
What does the term 'cyberbullying' mean?
Harassment or bullying conducted via electronic means, particularly through social media.
42
Multiple Choice: Which of the following is an example of sensitive personal data? A) Name B) Email address C) Racial or ethnic origin D) Phone number
C) Racial or ethnic origin
43
What is the role of a data protection officer (DPO)?
To oversee data protection strategy and implementation to ensure compliance with GDPR.
44
Fill in the blank: __________ refers to the unauthorized disclosure of confidential information.
Data breach
45
What is the significance of the Digital Millennium Copyright Act (DMCA)?
It provides a framework for copyright protection in the digital environment.
46
True or False: Copyright applies to both digital and physical works.
True
47
What does 'intellectual property' encompass?
Creations of the mind, including inventions, literary and artistic works, designs, symbols, and names.
48
Multiple Choice: Which of the following is NOT a type of intellectual property? A) Trademark B) Patent C) Copyright D) License
D) License
49
What is the purpose of a terms of service agreement?
To outline the rules and guidelines for using a service or product.
50
Fill in the blank: __________ is the act of making a copy of a digital work without permission.
Piracy
51
What is the main focus of the EU Digital Services Act?
To create a safer digital space in which the fundamental rights of users are protected.
52
True or False: Users have the right to challenge incorrect information about them online.
True
53
What is the difference between 'data processing' and 'data storage'?
Data processing refers to the manipulation of data, while data storage refers to the saving of data.
54
Multiple Choice: Which of the following is a common method of data encryption? A) Symmetric encryption B) Asymmetric encryption C) Both A and B D) None of the above
C) Both A and B
55
What does 'net neutrality' mean?
The principle that internet service providers must treat all data on the internet equally.
56
Fill in the blank: __________ is the practice of using technology to monitor and control user behavior.
Surveillance
57
What is the significance of digital consent?
It ensures that individuals understand and agree to how their data will be used.