Level 31 Level 33
31 words 0 ignored
Ready to learn Ready to review
Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.
trace the offender
It is often harder to prosecute for computing offences as it is difficult to prove where the offence took place or to ...
Legislators need to balance the rights of the individual with the need for security and protection from terrorist or ...
Many countries have introduced legislation restricting or banning the use of ...
Data Protection Act
(1998) Legislation that ensures personal data is kept accurate, up-to-date, safe, secure and not used to harm individuals
DPA Principle: data must be processed fairly and ...
DPA Principle: data must be adequate, relevant and not ...
DPA Principle: data must be accurate and ...
DPA Principle: data must not be retained for longer than ...
DPA Principle: data can only be used for the ... for which it was collected
DPA Principle: data must be kept ...
DPA Principle: data must be handled in accordance with the ... of the data subjects
DPA Principle: data must not be transferred outside the European Economic Area without ...
All data users (e.g. companies storing personal details) must register with the ...
Computer Misuse Act
(1990) Legislation that makes it an offence to access or modify computer material without permission
CMA Offence: Unauthorised access to ...
CMA Offence: Unauthorised access with intent to commit or ... a crime
CMA Offence: Unauthorised ... of computer material
CMA Offence: Making, ... or obtaining anything that can be used in computer misuse offences
Copyright Designs and Patents Act
(1988) Legislation that protects the creators of books, music, video and software from having their work illegally copied
The Copyright Act means that the ... must be bought to use, copy or distribute commercially available software
Method to prevent illegal copying: requiring the user to enter a ... before the software is installed
Method to prevent illegal copying: requiring the ... to be present in the drive in order for the software to run
Method to prevent illegal copying: requiring a ... to be plugged into a USB port in order for the software to run
The Copyright Designs and Patents Act cannot protect ...
Regulation of Investigatory Powers Act
(2000) Legislation that governs surveillance, investigation and the interception of communications
RIP Act Principle: allows certain public bodies to demand an ISP provides access to a customer's communications ...
RIP Act Principle: allows for mass surveillance of communications ...
RIP Act Principle: allows certain public bodies to demand that ISPs fit equipment to ...
RIP Act Principle: allows certain public bodies to demand the encryption keys to ...
RIP Act Principle: allows certain public bodies to monitor people's ...
RIP Act Principle: prevents the existence of interception warrants or intercepted data from being revealed ...