TCPIP Flashcards

1
Q

DPA - What is the DPA and the purpose of it?

A

The act that protects our data is called the Data Protection Act. The act came in 1998 to protect our personal data meaning it controls how our personal information is used by organisations, businesses or the government.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DPA - What is the 8 principles of the DPA?

A

Everyone responsible for using data has to follow strict rules called ‘data protection principles’. They must make sure the information is:
• used fairly and lawfully
• used for limited, specifically stated purposes
• used in a way that is adequate, relevant and not excessive
• accurate
• kept for no longer than is absolutely necessary
• handled according to people’s data protection rights
• kept safe and secure
• not transferred outside the European Economic Area without adequate protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DPA - What is the GDPR?

A

General Data Protection Regulation. The legislation that will “replace” the DPA. (May 25th, 2018)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DPA - How many principles does the GDPR have compared to the DPA?

A

6 principles compared to DPAs 8. However, it has its own sections for individuals rights and overseas transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DPA - What is the biggest change with the GDPR?

A

It, compared to the DPA provides a new accountability requirement. This requires anyone it affects (everyone) to show how it complies with the principles.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DPA - Who is responisble for protecting data?

A

Everyone. And if the UK trades with for example china, the person in the company in the UK is in trouble if China has not got the DPA (which they don’t) In a breach the data controller is liable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DPA - Will the GDPR be running alongside the DPA?

A

No it replaces it, but it will most likely have the same name as the DPA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DPA - Personal data is protected by the DPA, but some things require stronger legal protection. List a few of them.

A
  • Ethnic background
  • Political opinions
  • Religious beliefs
  • Health
  • Sexual health
  • Criminal records
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the rights of the data subject?

A
  • Right of Subject Access
  • Right of Correction
  • Right to Prevent Distress
  • Right to Prevent Direct Marketing
  • Right to Prevent Automatic Decisions
  • Right of Complaint to the ICO
  • Right to Compensation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a subject access request?

A

A way of accessing data an organisation holds about you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How do you perform a subject access request?

A

To receive a copy of this information you have to do a subject access request. Must apply in writing to the organisation (typically costs £20) Organisations must acknowledge the request and respond by 40 days. However, some types of personal data are exempt and cannot be obtained by a subject access request.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the different types of EU law?

A

Regulations, directives and decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

EU Law - Define: Regulations

A

Instantly binding from the date of issue and become national law regardless of whether the UK has enacted separate legislation. E.g General Data Protection Regulations 2018 Tachograph Regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

EU Law - Define: Directives

A

Creates legislation that must be adopted and implemented by the UK within an agreed time period. The UK has created its own legislation to implement a number European Directives e.g an example is the Working Time Directive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

EU Law - Define: Decisions

A

Certain matters what is brought in front of the EU authorities. Does not affect individuals unlike the other two.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RIPA - What is RIPA and when was it implemented?

A

Regulation of Investigatory Powers Act - 2000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RIPA - How many parts does RIPA consist of, and what are they?

A

The RIPA consists of five parts:

  • Interception of Communications and the Acquisition and Disclosure of Communications Data
  • Surveillance and Covert Human Intelligence Sources
  • Investigation of Electronic Data Protected by Encryption
  • Scrutiny of Investigatory Powers and Codes of Practice
  • Miscellaneous and Supplemental
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

RIPA - What is the main purpose of RIPA?

A

The main purpose of RIPA is to ensure that the relevant investigatory powers are used in accordance with human rights. Meaning it regulates in which certain public powers may conduct surveillance and access a person’s electronic communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CMA - What is CMA and when was it implemented?

A

Computer Misuse Act - 1990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

CMA - Why was the Computer Misuse Act implemented?

A

Due to a case which had three offences for unauthorized access and modification. However, the act was felt inadequate by people outside of hacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

CMA - Amendments

A

2006, 2011 and 2015. The change in 2015 created some controversy. The reason being it permitted certain police officer ranks to ethically hack without criminal liability.

22
Q

SCA - When did the Serious Crime Act come into function?

A

Serious Crime Act - 2015

23
Q

SCA - What 4 changes do the Serious Crime Act do to the Computer Misuse Act?

A
  • Creates a new offence for serious cyber-attacks, so that the penalties equals the harm caused by the attacks.
  • Extends the 3A section of the SCA offence to cover articles or tools for personal use
  • Extends the extra-territorial reach of the CMA offences
  • Clarify the savings provision for law enforcement agencies.
24
Q

What is the Electronic Communications Act 2000?

A

The Electronic Communications Act 2000 is an Act of the Parliament of the United Kingdom that:

  • Regulates the provision of cryptographic services in the UK (this was repealed) and
  • Confirms the legal status of electronic signatures.
25
Q

FOIA - What is the Freedom of Information Act?

A

The Freedom of Information Act 2000 is an act of the United Kingdom (UK) Parliament defining the ways in which the public may obtain access to government-held information.

26
Q

FOIA - When did the Freedom of Information Act come into function?

A

2000

27
Q

FOIA - What is the purpose of the Freedom of Information Act?

A

The Freedom of Information Act (FOIA) is a law that gives you the right to access information from the federal government. It is often described as the law that keeps citizens in the know about their government.

28
Q

FOIA - Who can request information in writing?

A

Any person or corporation can request information in writing under the act. A request need not be prepared in any particular format, nor does the applicant have to justify the request.

29
Q

FOIA - What are reasons a request may be denied, in the context of the Freedom of Information Act 2000?

A

A request may be denied for various reasons – for example if granting it would break a law, compromise the safety or health of any individual or endanger national security. A request may also be denied if it is deemed “vexatious.” If a request is denied, the applicant may appeal.

30
Q

What is a data controller?

A

Data controller is a person or company that collects and keeps data about people (Organisation public or private)

31
Q

What is a data processor?

A

Data processor any person (other than an employee of the data controller) who processes the data on behalf of the data controller

32
Q

What is the difference between a data controller and a data processor?

A

The difference is that the controller collects data unlike the processor who processes it on behalf of the data controller

33
Q

Cyber-crimes

A

Malicious communications, cyber bullying, revenge porn, defamation, trolling, harassment and cyber stalking

34
Q

Role of social media in offences such as revenge porn and cyber bullying

A

The role of social media providers is that other user may report posted content and the uploaded media is also run through photo-matching technology.

35
Q

What can we do to reduce the cyber bullying?

A
  • Social media may work with organisations to decrease cyber bullying
  • Take report serious and follow up
  • Campaigns
36
Q

What are some legislation that governs crimes such as cyber bullying and revenge porn?

A

• Criminal Justice & Courts Act 2015
• Protection of Freedom Act
• Computer Misuse Act 2015 (assuming so at least)
• Freedom of Information Act 2000
o public authorities are obliged to publish certain information about their activities; and
o members of the public are entitled to request information from public authorities.
• Social Media terms and conditions

37
Q

What is professional conduct?

A

Conduct that is stipulated (fastsatt) by your terms and conditions of employment. Professional Conduct is a standard requirement in every organisation.

38
Q

Difference between professional conduct and personal morals

A

Personal morals are usually not clearly defined as the terms and conditions of employments. Personal morals might also wary lots because people come from different cultures meaning something that might be normal to do in the US might not be fine to do in the UK.

39
Q

How can professional conduct be maintained in the workplace?

A

By both parts agreeing to the (professional) conduct, being on the same page, follow-up any breaches on this.

The biggest cause of employee conduct breaches is discriminatory behaviour (whether intended or unintended) So avoiding this would be good.

Other areas to cover:

  • Dignity at work policy (bullying and harassment)
  • Performance, Discipline, Grievance & Dismissal (formally raising your concerns/grievances with HR)
  • Equality and Diversity Policy
40
Q

How may professional conduct be breached and results in a criminal offense?

A

By for example not breaking the professional conduct that has been agreed upon within an organisation.

Breaking this could mean someone has been bullied or harassment, and especially long term this would be a criminal offence. Employees could also misuse their power at the organisation to steal data and such.

41
Q

DPA - What is personal data?

A

Personal data is defined as information that can identify a person to one or more factors; physical, physiological, mental, economic, cultural or social identity.

42
Q

What is ICO?

A

Information Commissioner`s Office

43
Q

What is the purpose of ICO?

A

Office responsible for the enforcement of the Data Protection Act 1998

44
Q

What is the fee for a breach of the DPA?

A

Fines of up to £500,000 for serious breaches of the DPA.

45
Q

What is the fee for a breach of the GDPR?

A

Penalties will reach an upper limit of €20 million or 4% or annual global turnover – whichever is higher.

46
Q

Who is liable, if the provider of a cloud storage decides to outsource their storage solutions?

A

The cloud provider is still liable

47
Q

What are the four BCS professional conduct principles?

A

Public Interest
Professional Competence and Integrity
Duty to Relevant Authority
Duty to the Profession

48
Q

How many parts is there to a contract?

A

Four

49
Q

Who makes the UK legislation?

A

The parliament

50
Q

DPA - Name some sensitive information that requries stronger legal protection

A

There is also stronger legal protection for more sensitive information, such as: ethnic background, political opinions, religious beliefs, health, sexual health and criminal records.

51
Q

What did Sean Duffy do?

A

Troll.

Natasha McBryde, 15, committed suicide after being bullied online. She died instantly after being hit by a passenger train near her home in Bromsgrove, Worcestershire.

  • The day after Natasha’s death in February, Duffy posted comments including “I fell asleep on the track lolz” on the Facebook tribute page created by her brother James, 17.
  • Four days later he created a YouTube video called “Tasha the Tank Engine” featuring her face superimposed on to the front of the fictional engine.
52
Q

What acts governs trolling/cyber bullying?

A
  • The Communications Act 2003

* The Malicious Communications Act 1998 (More Serious cases)