Save
A-level Computer Science
School Notes
Legislation
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Ana Saker
Visit profile
Cards (24)
What does the Data Protection Act 1998 cover?
How
organizations
can
use
personal data
View source
What was the original purpose of the Data Protection Act 1998?
To
counter
junk mail
View source
What is one obligation of companies under the Data Protection Act?
Keep
data
secure
View source
What must organizations not do with personal data according to the Data Protection Act?
Sell
data
without
permission
View source
What are the principles of the Data Protection Act?
Data must be
processed
fairly/lawfully
Data must be
adequate/relevant/not excessive
Data must be
accurate and up to date
Data must not be
retained longer than necessary
Data can only be used for
its
collected purpose
Data must be
kept
secure
Data must be
processed
according
to
rights
Data must not be
transferred
outside
the
EU
without
protection
View source
What does the Computer Misuse Act 1990 make illegal?
Hacking
View source
What are the three illegal acts under the Computer Misuse Act?
Gaining unauthorized access
to
computer
systems
Gaining unauthorized
access
with
criminal intent
Unauthorised
modification
of
computer
materials
View source
What does the Copyright, Designs and Patents Act 1988 cover?
Intellectual property
View source
How is copyright gained according to the Copyright, Designs and Patents Act?
Automatically
on
creation
View source
How long does a patent last?
For a
set
number
of
years
View source
What does the Regulation of Investigatory Powers Act 2000 (RIPA) empower or limit?
Use of
technological surveillance
by
public
bodies
Monitoring
internet
activity
and
electronic
communications
Forcing
users
to
hand
over
encryption
keys
View source
What laws regulate the use of technology?
Data Protection Act:
regulates
personal
data
storage
Computer Misuse Act:
regulates
unauthorized
access
Copyright and Patents Act:
regulates
intellectual
property
Regulation of Investigatory Powers Act:
regulates
IT
surveillance
View source
How does the Copyright Designs and Patents Act apply to streaming videos?
Copyright
assigned
automatically
to
video
owner
Illegal to
copy/distribute
without
permission
Copyright
holder
can
request
removal
from
platform
Membership/license
restricts
usage
and
access
View source
What issue exists with the Computer Misuse Act regarding DDoS attacks?
Harder to
enforce
due
to
unwitting
participants
View source
How does the Internet of Things affect DDoS attacks?
It
makes
such
attacks
more
common
View source
What challenges do streaming and fast internet speeds pose?
Licensing issues
and
piracy tracking
View source
How can digital watermarking help with piracy?
It
can
be
used
to
track
piracy
View source
What impact does end-to-end encryption have on government monitoring?
It makes
monitoring
communications
trickier
View source
What rights does RIPA implement regarding surveillance?
Additional rights for
monitoring
individuals
Allows various
organizations
to
conduct
surveillance
Aims to detect
crime
and
defend
national security
View source
Who can carry out monitoring under RIPA?
More
organizations
than
just
the
Police
View source
What happens if files are encrypted under RIPA?
Keys can be
demanded
with
penalties
for
refusal
View source
What are the arguments for and against RIPA's powers?
For:
Helps
detect
and
prevent
serious
crimes
Enhances
public safety
Against:
Seen as a "
snooper's charter
"
Misuse for
minor offences
View source
How do communication tools like WhatsApp affect RIPA's effectiveness?
They
include
end-to-end
encryption
by
default
View source
What is plausible deniability in encryption tools?
It allows users
to
deny
access to data
View source