Save
COMP SCI PAPER 2
CONSEQUENCES OF COMPUTING
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Khurram Latif
Visit profile
Cards (12)
Data Protection Act
Data must be
accurate
, not
excessive
, not
kept longer than necessary
, not
transferred to countries without adequate data protection
View source
Computer Misuse Act
Prevents hacking-
unauthorised
access to data, with further criminal intent,
modification
of computer material
View source
Freedom of Information
Act
Rights of access to information held by
schools
,
hospitals
,
police
View source
Copyright Designs and Patents
Act
Give rights to creators of material to control how the material is used EG copying, adapting
View source
Regulation of Investigatory Powers
Act
Public authorities eg
police
,
intelligence services
,
customs
have power to access data to investigate crimes EG
phone tapping
,
monitoring internet access
,
access to encryption keys
View source
RIPS Act EG
BBC
phone licenses. May be stolen/pirated
View source
Data breaches
Ebay
2019 145
mil accounts data compromised, everyone had to change
password
Sony
2014
politically motivated north korean group
guardians of peace
leak
emails
between employees
View source
Ebay data breach
Shares for ebay dropped
1.43%
View source
Sony data breach
Shares for sony dropped
6.6%
View source
Selective drop down menus for passwords
Prevents
keylogging
software
View source
Encryption
Makes data
unreadable
to those without the
key
to decode it
View source
Digital rights management
The process of
access management systems for digital media
EG
encryption
View source