computing related legislation

    Cards (261)

    • What year was the Data Protection Act enacted?
      1998
    • What types of information does the Data Protection Act 1998 apply to?
      Information stored on computers and in organised paper filing systems
    • What is classified as personal data under the Data Protection Act?
      Any data that can identify a living person
    • What is a data subject?
      An individual who can be identified by personal data
    • What are the eight specific ways the Data Protection Act protects data subjects?
      1. Processed fairly and lawfully
      2. Obtained for specified lawful purposes
      3. Adequate, relevant, and not excessive
      4. Accurate and kept up to date
      5. Not kept longer than necessary
      6. Processed in accordance with data subjects' rights
      7. Protected against unauthorized processing and accidental loss
      8. Not transferred outside the European Economic Area without adequate protection
    • What rights do data subjects have under the Data Protection Act?
      Right to request a copy of their data, correct their data, and prevent marketing
    • What legislation replaced the Data Protection Act 1998 in 2018?
      The General Data Protection Regulation (GDPR) and the Data Protection Act 2018
    • What does CMA stand for in the context of computer law?
      Computer Misuse Act
    • What is the primary focus of the Computer Misuse Act 1990?
      Malicious use of computers
    • What are the three primary offences outlined in the Computer Misuse Act 1990?
      1. Unauthorised access to computer materials
      2. Unauthorised access with intent to commit further offences
      3. Unauthorised modification of computer material
    • What is an example of unauthorised access to computer materials?
      Finding a teacher’s password and opening their files
    • What are the consequences of the second and third offences under the Computer Misuse Act?
      They are generally worse than the first and punishable with imprisonment
    • What year was the Copyright, Design and Patents Act enacted?
      1988
    • What does the Copyright, Design and Patents Act protect?
      People's property online, including logos and music recordings
    • How long does copyright last after the creator's death?
      25-70 years, depending on the type of work
    • What was added to the Copyright, Design and Patents Act in 1992?
      Computer programs were included as a type of literary work
    • Who is responsible for taking action if their work is copied under the Copyright, Design and Patents Act?
      The individual whose work has been copied
    • What does RIPA stand for?
      Regulation of Investigatory Powers Act
    • What does the Regulation of Investigatory Powers Act cover?
      Investigation, surveillance, and interception of communication by public bodies
    • What is an example of how RIPA is used?
      The Secret Service can wire-trap online conversations with a warrant
    • What do internet service providers and mobile phone companies have to do under RIPA?
      Provide information upon request from an authorized authority
    • Why is the Regulation of Investigatory Powers Act controversial?
      It is seen as an invasion of privacy and can be improperly used
    • What are the implications of the Regulation of Investigatory Powers Act on privacy and surveillance?
      • Allows public bodies to conduct surveillance
      • Requires cooperation from internet service providers
      • Raises concerns about invasion of privacy
      • Potential for misuse by small agencies
    • What is the purpose of the Data Protection Act (DPA)?
      To protect sensitive data stored about users.
    • When was the Data Protection Act first published?
      In 1998.
    • What does the DPA determine?
      What organizations can do with personal data they have collected.
    • What rights does the DPA define for individuals?
      The rights of individuals over the data stored about them.
    • What act strengthened the DPA in 2018?
      The General Data Protection Regulation (GDPR).
    • What are the eight principles of the Data Protection Act?
      1. Data must be used fairly and lawfully.
      2. Data must only be used for the stated purpose.
      3. Data must be adequate, relevant, and not excessive.
      4. Data must be accurate and kept up-to-date.
      5. Data should not be kept longer than necessary.
      6. Data should only be used according to the rights of the data subject.
      7. Data should be kept safe and secure.
      8. Data must not be transferred to countries without similar protection.
    • What does the Data Protection Act 2018 require companies to do?
      To run a GDPR audit.
    • How does the Data Protection Act 2018 differ from the Data Protection Act 1998?
      The 'right to erasure' has more exemptions in the 2018 version.
    • What is the structure of the CPU?
      The CPU consists of the control unit, arithmetic logic unit, and registers.
    • What is the fetch, decode, execute cycle?
      It is the process by which the CPU retrieves, interprets, and executes instructions.
    • What factors affect CPU performance?
      Clock speed, cache size, and number of cores.
    • What are the two types of processors mentioned?
      CISC and RISC.
    • What is the difference between multicore and parallel cores?
      Multicore processors have multiple cores on a single chip, while parallel cores can work on different tasks simultaneously.
    • What are the types of storage mentioned?
      Magnetic storage and optical storage.
    • What is flash memory?
      A type of non-volatile storage that can be electrically erased and reprogrammed.
    • What is the purpose of the Computer Misuse Act (1990)?
      To protect against hacking and cybercrime
    • What is virtual memory?
      A memory management capability that uses hardware and software to allow a computer to compensate for physical memory shortages.