1.5.1 computing related legislation

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/3

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

4 Terms

1
New cards

The Data Protection Act 1998

  • this law applies to information stored both on computers and in organised paper filing systems

  • covers personal data, which is any data which can be used to identify a living person

  • data which can be used in combination with other data to identify a living person is also classified as personal data

    • examples of personal data, a person’s name and address

  • an individual who can be identified by personal data is referred to as the data subject, with the law protecting them in eight specific ways as laid out by the Government

    • personal data shall be processed fairly and lawfully

    • personal data shall be obtained only for one or more specified and lawful purpose

    • personal data shall be adequate, relevant and not excessive for its purpose

    • personal data shall be accurate and where necessary kept up to date

    • personal data shall not be kept for longer than is necessary for its purpose

    • personal data shall be processed in accordance with the rights of data subjects under this Act

    • appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data

    • personal data shall not be transferred to a country or territory outside the European Economic Area, unless that country or territory ensures an adequate level of data protection

  • act also gives data subjects rights, such as the right to request a copy of the data held about them, the right to correct the data held about them and the right to prevent marketing using contact details provided by the data subject

2
New cards

The Computer Misuse Act 1990

  • concerns the malicious use of computers.

  • outlines three primary offences

    • unauthorised access to computer materials

      • for example, finding a teacher’s password and opening their files

    • unauthorised access with intent to commit further offences

      • for example, finding a teacher’s password and opening their files with the intention of increasing your mark on their markbook

    • unauthorised modification of computer material

      • for example, finding a teacher’s password, opening their files and increasing your mark on their markbook

  • the consequences of the second and third offences are generally worse than the first, with each offence being punishable with imprisonment

3
New cards

The Copyright, Design and Patents Act 1988

  • brought in to protect people’s property online

  • covers everything from logos to music recordings

  • if a work is original, copyright automatically applies and doesn’t expire until 25-70 years after the death of the creator, depending on the type of work

  • in 1992, the Act was extended to include computer programs as a type of literary work, meaning that copyright automatically applies to code

  • if an individual believes that their work has been copied, it is their responsibility to take action under the Act

4
New cards

The Regulation of Investigatory Powers Act 2000

  • referred to as RIPA

  • covers investigation, surveillance and interception of communication by public bodies

  • for example, the Secret Service can legally wire-trap online conversations in the interests of national security provided that a warrant has been issued

  • furthermore, the act enforces internet service providers and mobile phone companies to give up information upon request from an authorised authority and to ensure that their networks have sufficient hardware installed to facilitate surveillance

  • this Act is controversial as its powers extend to small agencies like local councils

  • some people feel that the Act is an invasion of privacy, or that it is often improperly used