Legislation

Cards (36)

  • Computer misuse offence numbering can be considered as number of steps necessary
  • Computer misuse offence 1 numbering explained
    There is 1 step, which is access without authority
  • Computer misuse offence 2 numbering explained
    There are 2 steps, which are
    gain unauthorised access
    Further another criminal offense
  • Computer misuse offence 3 numbering explained
    There are 3 steps,
    Gain unauthorised access
    Use a tool
    Impair the function of a system
  • Computer misuse offence 3a numbering explained:
    Furthers offence 3 by providing a tool
  • Computer misuse offence 3za numbering explained:
    Version of offence 3 in which it causes or creates risk of serious damage
  • All computer misuse offences can lead to a fine
  • The maximum sentences for offences in order of their names are
    1 - 2
    2 - 5
    3 - 10
    3a - 2
    3za - life
  • Intellectual property is created using ones mind, whether a design, or a phyiscal invention
  • For an invention to reigster it and protect it you will need to
    patent it
  • 2 main design categories?
    unregistered and registered
  • In the UK, you must register designs with the?
    IPO
  • Unregistered designs are automatically created, and protect the design for 15 years, form when it was recorded in a design document
  • Registered designs are created when a design is registered with the UK Intellectual Property Office (IPO), and it lasts for 10 more years
  • Patents is a license given by the government to protect an invention
  • Individuals have a human right to prvacy, however to protect themselves companies can monitor their own network fully.
  • THe telecommunications (Lawful business practice)(Interception of communications) regulations cannot infrnge DPA or Human rights act
  • Companies must have a formal policy if they a controlling communiciations on business network.
  • WCAG is about making websites Perceivable, operable, understandable, and robust. POUR one out for the disabled
  • Perceivable is about alt text and alternatives to time based media. It's all about making viewable content appropriate for as many people as possible.
  • Operable is about making a website as usable by different individuals as possible. For example make it operable from a keyboard, provide time to read and use content, and avoid seizure causing designs.
  • Understandable is alll about making the content of a website readable, predictable, and help users avoid mistakes
  • Robust is about ensuring that a website will remain compatible with user agents, including users and assistive technologies
  • 4 main ways a technology can help meet user needs are?
    Appropriate functionality
    Compatibility
    Reduction of pain points
    Accessibility considerations
  • ISO 27001 is all about running an isms
  • ISO 27002 best practice of information security
  • ISO 27004 is evaluating the perfomance of an ISMS
  • ISO 27009 shows how to adapt an ISMS for the needs of different sectors
  • the ISO 27000 is foucsed on information security, and if a company meets its requirements they can be assessed and possibly given an ISO 27000 certification
  • DSE regulations define that a company has what responsibilities?
    A paid for eye test for employees every 12 months
    Risk assessments
    Adequate breaks and training
  • DSE requires businesses take what precautions?
    Correct lighting
    Monitor screens
    Ergonomic input hardware
    Mandatory breaks
  • Preventativbe measures under the health and safety act include:
    Physically secured devices, and obscured cabling
  • All companies, under the health and safety act, must?
    Provide a health and sagety policy
    Consult with employees over risks
    Maintain workplace in a condtion that is safe and lacks risks
  • The DPA defines 8 data subject rights. What are they?
    Right to rectification
    Right to be informed
    Right to access
    Right to be forgetten
    Right to deny automated systems
    Right to object
    Right to portability
    Right to restrict usage
  • A DPA breach can result in a fine of 18 million or 4% of annual turnover, whichever is largest
  • DPA has 7 key principles, ICE LATS :
    Integrity - data can only be gathered on lawful grounds, in a way a user can expect
    Compliance - compliance with the law must be demonstrable
    Efficient - No unnecessary data is gathered, and data is sufficient for it's purpose
    Limitation - data is only to be used for explicitely stated purposes
    Accuracy - data must be accurate, including updating it
    Transparency - It must be clear who is responsible for ensuring data security
    Storage - data can only be stored securely until it is out of date, or unneeded