Level 31 Level 33
Level 32

1.5.1 - Computing Related Legislation


31 words 0 ignored

Ready to learn       Ready to review

Ignore words

Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.

All None

Ignore?
trace the offender
It is often harder to prosecute for computing offences as it is difficult to prove where the offence took place or to ...
criminal activity
Legislators need to balance the rights of the individual with the need for security and protection from terrorist or ...
strong cryptography
Many countries have introduced legislation restricting or banning the use of ...
Data Protection Act
(1998) Legislation that ensures personal data is kept accurate, up-to-date, safe, secure and not used to harm individuals
lawfully
DPA Principle: data must be processed fairly and ...
excessive
DPA Principle: data must be adequate, relevant and not ...
up-to-date
DPA Principle: data must be accurate and ...
necessary
DPA Principle: data must not be retained for longer than ...
purpose
DPA Principle: data can only be used for the ... for which it was collected
secure
DPA Principle: data must be kept ...
rights
DPA Principle: data must be handled in accordance with the ... of the data subjects
adequate protection
DPA Principle: data must not be transferred outside the European Economic Area without ...
Data Commissioner
All data users (e.g. companies storing personal details) must register with the ...
Computer Misuse Act
(1990) Legislation that makes it an offence to access or modify computer material without permission
computer material
CMA Offence: Unauthorised access to ...
facilitate
CMA Offence: Unauthorised access with intent to commit or ... a crime
modification
CMA Offence: Unauthorised ... of computer material
supplying
CMA Offence: Making, ... or obtaining anything that can be used in computer misuse offences
Copyright Designs and Patents Act
(1988) Legislation that protects the creators of books, music, video and software from having their work illegally copied
appropriate license
The Copyright Act means that the ... must be bought to use, copy or distribute commercially available software
unique key
Method to prevent illegal copying: requiring the user to enter a ... before the software is installed
CD
Method to prevent illegal copying: requiring the ... to be present in the drive in order for the software to run
dongle
Method to prevent illegal copying: requiring a ... to be plugged into a USB port in order for the software to run
algorithms
The Copyright Designs and Patents Act cannot protect ...
Regulation of Investigatory Powers Act
(2000) Legislation that governs surveillance, investigation and the interception of communications
in secret
RIP Act Principle: allows certain public bodies to demand an ISP provides access to a customer's communications ...
in transit
RIP Act Principle: allows for mass surveillance of communications ...
facilitate surveillance
RIP Act Principle: allows certain public bodies to demand that ISPs fit equipment to ...
protected information
RIP Act Principle: allows certain public bodies to demand the encryption keys to ...
internet activities
RIP Act Principle: allows certain public bodies to monitor people's ...
in court
RIP Act Principle: prevents the existence of interception warrants or intercepted data from being revealed ...