Save
computer science
legal/moral/cultural/ethical issues
computing related legislation
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Emily-Louise Parry
Visit profile
Cards (261)
What year was the Data Protection Act enacted?
1998
View source
What types of information does the Data Protection Act 1998 apply to?
Information stored on
computers
and in organised
paper filing systems
View source
What is classified as personal data under the Data Protection Act?
Any data that can identify a
living person
View source
What is a data subject?
An individual who can be identified by
personal data
View source
What are the eight specific ways the Data Protection Act protects data subjects?
Processed fairly and lawfully
Obtained for specified lawful purposes
Adequate, relevant, and not excessive
Accurate and kept up to date
Not kept longer than necessary
Processed in accordance with data subjects' rights
Protected against unauthorized processing and accidental loss
Not transferred outside the
European Economic Area
without adequate protection
View source
What rights do data subjects have under the Data Protection Act?
Right to request
a copy of their data, correct their data, and
prevent marketing
View source
What legislation replaced the Data Protection Act 1998 in 2018?
The General Data Protection Regulation (
GDPR
) and the
Data Protection Act 2018
View source
What does CMA stand for in the context of computer law?
Computer Misuse Act
View source
What is the primary focus of the Computer Misuse Act 1990?
Malicious
use of computers
View source
What are the three primary offences outlined in the Computer Misuse Act 1990?
Unauthorised access
to computer materials
Unauthorised access with intent to commit further offences
Unauthorised modification
of computer material
View source
What is an example of unauthorised access to computer materials?
Finding a teacher’s
password
and opening their files
View source
What are the consequences of the second and third offences under the Computer Misuse Act?
They are generally worse than the first and punishable with
imprisonment
View source
What year was the Copyright, Design and Patents Act enacted?
1988
View source
What does the Copyright, Design and Patents Act protect?
People's
property online
, including logos and music recordings
View source
How long does copyright last after the creator's death?
25-70
years, depending on the type of work
View source
What was added to the Copyright, Design and Patents Act in 1992?
Computer programs were included as a type of
literary work
View source
Who is responsible for taking action if their work is copied under the Copyright, Design and Patents Act?
The
individual
whose work has been copied
View source
What does RIPA stand for?
Regulation of Investigatory Powers Act
View source
What does the Regulation of Investigatory Powers Act cover?
Investigation, surveillance, and interception of
communication
by public bodies
View source
What is an example of how RIPA is used?
The
Secret Service
can wire-trap online conversations with a warrant
View source
What do internet service providers and mobile phone companies have to do under RIPA?
Provide information upon request from an
authorized authority
View source
Why is the Regulation of Investigatory Powers Act controversial?
It is seen as an
invasion of privacy
and can be improperly used
View source
What are the implications of the Regulation of Investigatory Powers Act on privacy and surveillance?
Allows public bodies to conduct surveillance
Requires cooperation from
internet service providers
Raises concerns about
invasion of privacy
Potential for misuse by small agencies
View source
What is the purpose of the Data Protection Act (DPA)?
To protect
sensitive
data stored about users.
View source
When was the Data Protection Act first published?
In
1998
.
View source
What does the DPA determine?
What organizations can do with
personal data
they have collected.
View source
What rights does the DPA define for individuals?
The
rights
of individuals
over
the
data
stored
about them.
View source
What act strengthened the DPA in 2018?
The General Data Protection Regulation (
GDPR
).
View source
What are the eight principles of the Data Protection Act?
Data must be used fairly and lawfully.
Data must only be used for the stated purpose.
Data must be adequate, relevant, and not excessive.
Data must be accurate and kept up-to-date.
Data should not be kept longer than necessary.
Data should only be used according to the rights of the
data subject
.
Data should be kept safe and secure.
Data must not be transferred to countries without
similar
protection.
View source
What does the Data Protection Act 2018 require companies to do?
To run a
GDPR
audit.
View source
How does the Data Protection Act 2018 differ from the Data Protection Act 1998?
The
'right to erasure'
has more exemptions in the 2018 version.
View source
What is the structure of the CPU?
The CPU consists of the
control unit
,
arithmetic logic unit
, and
registers
.
View source
What is the fetch, decode, execute cycle?
It is the process by which the
CPU
retrieves, interprets, and executes instructions.
View source
What factors affect CPU performance?
Clock speed
,
cache size
, and number of
cores
.
View source
What are the two types of processors mentioned?
CISC
and
RISC
.
View source
What is the difference between multicore and parallel cores?
Multicore
processors
have multiple cores on a single chip, while parallel cores can work on different tasks simultaneously.
View source
What are the types of storage mentioned?
Magnetic storage
and
optical storage
.
View source
What is flash memory?
A type of
non-volatile
storage that can be
electrically
erased and reprogrammed.
View source
What is the purpose of the Computer Misuse Act (1990)?
To
protect
against
hacking
and
cybercrime
View source
What is virtual memory?
A memory management capability that uses
hardware
and
software
to allow a computer to compensate for physical memory shortages.
View source
See all 261 cards