1.5.1 Computer Related Legislation Flashcards

1
Q

Define ‘personal data’

A

Any information about a living individual that would identify them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define ‘data subject’

A

The person the data being stored is about

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define ‘data user’

A

The person who needs access to the data for their job

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define ‘data controller’

A

The person who applies for permission to collect and store data.

They decide what needs to be collected, what it is to be used for, and how it is to be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define ‘information commissioner’

A

The person who enforces the DPA 1998, and who organisations get permission from to collect personal data.

They make the general public aware of their rights under the act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What 3 parts does the Computer Misuse Act cover?

A
  1. Unauthorised access to stored data, e.g. hacking
  2. Access of data with intent of further offences, e.g. blackmail or fraud
  3. Unauthorised altering of data, including installing viruses or malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of the Copyright Design and Patents Act 1988?

A

To allow an individual or organisation which has created original work the right to control its use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the main problem with the Copyright Design and Patents Act 1988?

A

Most digital objects can be obtained illegally through pirating or streaming, which are hard to regulate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the Regulation of Investigatory Powers Act 2000 allow various public bodies the right to do?

A
  1. Can demand that ISPs provide access to customer’s digital communications
  2. Can carry out mass surveillance of digital communications
  3. Can demand that ISPs fit equipment to allow for digital surveillance
  4. Can intercept and monitor ongoing digital communication
  5. Demand that someone provide an encryption key
  6. Keep secret the existence of data they collect, even from courts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly