5.1 Computing Related Legislation (OCR A Level Computer Science) Flashcards

Exam code: H446

1/34

0Still learning

Know0

Cards in this collection (34)

  • Define Data Protection Act.

    The Data Protection Act is a law that protects personal data from being misused.

  • What are three examples of personal data?

    Examples of personal data include name, address, and date of birth.

  • True or False?

    The Data Protection Act applies to personal data used for domestic purposes, such as writing to friends or taking family photos.

    False.

    Personal data used for domestic purposes is exempt from the Data Protection Act.

  • Personal data must be         and lawfully processed according to the Data Protection Principles.

    Personal data must be fairly and lawfully processed according to the Data Protection Principles.

  • What must a company do if they hold personal data that is out of date or incorrect?

    If a company holds personal data that is out of date or incorrect, the individual has a right to have it corrected or deleted.

  • A company must not transfer personal data to countries outside the                    unless those countries have similar data protection laws.

    A company must not transfer personal data to countries outside the European Economic Area unless those countries have similar data protection laws.

  • Who is responsible within a company for ensuring compliance with the Data Protection Act?

    The Data Controller is the member of staff responsible for ensuring compliance with the Data Protection Act.

  • Define Subject Access Request (SAR).

    A Subject Access Request (SAR) is a request by an individual to obtain a copy of all the personal data a company holds about them.

  • What right allows an individual to have their personal data deleted in certain situations under the Data Protection Act?

    Under the Data Protection Act, the right to be forgotten allows an individual to have their personal data deleted in certain circumstances.

  • Companies must put in place         or digital security measures to prevent data from being accessed without consent.

    Companies must put in place physical or digital security measures to prevent data from being accessed without consent.

  • Define Computer Misuse Act 1990.

    The Computer Misuse Act 1990 is a UK law designed to prevent the malicious use of computers, such as hacking and unauthorised access to computer systems.

  • What are the three primary offences under the Computer Misuse Act?

    The three primary offences are: unauthorised access to computer material, unauthorised access with intent to commit further offences, and unauthorised modification of computer files.

  • The Computer Misuse Act was created to ensure that computer         was covered by the law.

    The Computer Misuse Act was created to ensure that computer hacking was covered by the law.

  • How can organisations minimise the threat of unauthorised access to their computer systems?

    Organisations can minimise the threat by using digital signatures, digital certificates, and firewalls to prevent unauthorised access and attacks.

  • Define firewall.

    A firewall is a security system that prevents unauthorised access to or from a private network, helping stop DoS or DDoS attacks.

  • True or False?

    Accessing someone else's email account without permission breaks the Computer Misuse Act.

    True.

    Accessing computer material without authorisation is an offence under the Computer Misuse Act.

  • The         led the successful prosecution of two individuals for stealing personal information.

    The Information Commissioner’s Office (ICO) led the successful prosecution of two individuals for stealing personal information.

  • What are the possible legal consequences for breaking the Computer Misuse Act?

    Breaking the Computer Misuse Act can result in prison sentences, with longer sentences for more serious offences such as unauthorised modification or intent to commit further offences.

  • Define intellectual property.

    Intellectual property is an original creation of the mind, such as inventions, literary or artistic works, which are legally protected from unauthorized use.

  • What does the Copyright, Designs and Patents Act 1988 protect?

    The Copyright, Designs and Patents Act 1988 protects the intellectual property of individuals or companies from being copied, modified, or distributed without permission.

  • If an         work is        , copyright automatically applies and lasts for 25–70 years after the creator’s death.

    If an original work is created, copyright automatically applies and lasts for 25–70 years after the creator’s death.

  • True or False?

    Copyright protection only applies if you register your work officially.

    False.

    Copyright is automatically applied to original work as soon as it is created; registration is not required.

  • Define primary breach (under the Copyright, Designs and Patents Act).

    A primary breach involves directly infringing copyright, such as copying, distributing, renting, or adapting the original work without permission.

  • Downloading and sharing videos from services like Netflix would be a         of the Copyright, Designs and Patents Act.

    Downloading and sharing videos from services like Netflix would be a breach of the Copyright, Designs and Patents Act.

  • What was the outcome of the copyright case between Ed Sheeran and the heirs of Marvin Gaye’s co-writer?

    Ed Sheeran won his case and the court ruled that he did not copy ‘Let’s Get It On’ by Marvin Gaye when composing his song ‘Thinking Out Loud’.

  • Define secondary breach (under the Copyright, Designs and Patents Act).

    A secondary breach involves indirectly supporting copyright infringement, for example by importing, possessing, or providing means to copy or perform copyrighted works unlawfully.

  • Define Regulation of Investigatory Powers Act (RIPA).

    The Regulation of Investigatory Powers Act (RIPA) is a law that legislates how organisations can monitor electronic communications through investigation, surveillance, and interception by public bodies.

  • Which organisations have the most freedom under RIPA to intercept communications?

    GCHQ and similar agencies have the most freedom under RIPA to intercept communications, while other organisations have different limits.

  • The Regulation of Investigatory Powers Act allows public bodies to conduct         and intercept            .

    The Regulation of Investigatory Powers Act allows public bodies to conduct surveillance and intercept communications.

  • True or False?

    RIPA only applies to large national agencies like MI6 and GCHQ.

    False.

    RIPA also applies to smaller agencies like local councils, not just large national agencies.

  • What technical terms should be used when describing the powers granted by RIPA?

    You should use the technical terms surveillance and communication when describing the powers granted by RIPA.

  • ISPs and mobile phone companies must provide           and ensure their networks allow                under RIPA.

    ISPs and mobile phone companies must provide information on request and ensure their networks allow surveillance under RIPA.

  • What must businesses do if requested under RIPA by an authorised authority?

    Businesses must provide access to digital communications or data and implement hardware and software solutions that facilitate the storage and surveillance of digital communications.

  • Give an example of a controversial use of RIPA by local councils.

    One controversial use of RIPA by local councils was surveilling families to determine school catchment area eligibility or monitoring activities like feeding pigeons and fly-tipping.

Sign up to unlock flashcards

or