Legislation

Cards (24)

  • What does the Data Protection Act 1998 cover?
    How organizations can use personal data
  • What was the original purpose of the Data Protection Act 1998?
    To counter junk mail
  • What is one obligation of companies under the Data Protection Act?
    Keep data secure
  • What must organizations not do with personal data according to the Data Protection Act?
    Sell data without permission
  • What are the principles of the Data Protection Act?
    • Data must be processed fairly/lawfully
    • Data must be adequate/relevant/not excessive
    • Data must be accurate and up to date
    • Data must not be retained longer than necessary
    • Data can only be used for its collected purpose
    • Data must be kept secure
    • Data must be processed according to rights
    • Data must not be transferred outside the EU without protection
  • What does the Computer Misuse Act 1990 make illegal?
    Hacking
  • What are the three illegal acts under the Computer Misuse Act?
    1. Gaining unauthorized access to computer systems
    2. Gaining unauthorized access with criminal intent
    3. Unauthorised modification of computer materials
  • What does the Copyright, Designs and Patents Act 1988 cover?
    Intellectual property
  • How is copyright gained according to the Copyright, Designs and Patents Act?
    Automatically on creation
  • How long does a patent last?
    For a set number of years
  • What does the Regulation of Investigatory Powers Act 2000 (RIPA) empower or limit?
    • Use of technological surveillance by public bodies
    • Monitoring internet activity and electronic communications
    • Forcing users to hand over encryption keys
  • What laws regulate the use of technology?
    • Data Protection Act: regulates personal data storage
    • Computer Misuse Act: regulates unauthorized access
    • Copyright and Patents Act: regulates intellectual property
    • Regulation of Investigatory Powers Act: regulates IT surveillance
  • How does the Copyright Designs and Patents Act apply to streaming videos?
    • Copyright assigned automatically to video owner
    • Illegal to copy/distribute without permission
    • Copyright holder can request removal from platform
    • Membership/license restricts usage and access
  • What issue exists with the Computer Misuse Act regarding DDoS attacks?
    Harder to enforce due to unwitting participants
  • How does the Internet of Things affect DDoS attacks?
    It makes such attacks more common
  • What challenges do streaming and fast internet speeds pose?
    Licensing issues and piracy tracking
  • How can digital watermarking help with piracy?
    It can be used to track piracy
  • What impact does end-to-end encryption have on government monitoring?
    It makes monitoring communications trickier
  • What rights does RIPA implement regarding surveillance?
    • Additional rights for monitoring individuals
    • Allows various organizations to conduct surveillance
    • Aims to detect crime and defend national security
  • Who can carry out monitoring under RIPA?
    More organizations than just the Police
  • What happens if files are encrypted under RIPA?
    Keys can be demanded with penalties for refusal
  • What are the arguments for and against RIPA's powers?
    For:
    • Helps detect and prevent serious crimes
    • Enhances public safety

    Against:
    • Seen as a "snooper's charter"
    • Misuse for minor offences
  • How do communication tools like WhatsApp affect RIPA's effectiveness?
    They include end-to-end encryption by default
  • What is plausible deniability in encryption tools?
    It allows users to deny access to data