ICT Acts and Legislation

?
what year was the data protection act passed?
1998
1 of 44
why was the data protection act developed?
to give protection and lay down rules about how data about people can be used
2 of 44
What does the data protection act cover?
information or data stored on a computer or an organised paper filing system about living people.
3 of 44
who is the Information Commissioner?
the person who has powers to enforce the Act.
4 of 44
who is the data controller?
a person or company that collects and keeps data about people.
5 of 44
who is the data subject?
someone who has data about them stored somewhere, outside of their direct control. This makes us all data subjects.
6 of 44
where must an organization apply to be able to store data?
with the Information Commissioner.
7 of 44
What are some examples of personal data?
their name, address, medical details, banking details
8 of 44
What are some examples of sensitive data?
racial or ethnic origin, political opinions, religion, membership of a trade union, health, sex life, criminal activity
9 of 44
how many principles of data protection are there?
8
10 of 44
what is the first principle of data protection?
data must be collected and used fairly and inside the law
11 of 44
what is the second principle of data protection?
data must only be held and used for the reasons given to the Information Commissioner.
12 of 44
what is the third principle of data protection?
data can only be used for those registered purposes and only be disclosed to those people mentioned in the register entry. You cannot give it away or sell it unless you said you would to begin with.
13 of 44
what is the fourth principle of data protection?
The information held must be adequate, relevant and not excessive when compared with the purpose stated in the register. So you must have enough detail but not too much for the job that you are doing with the data
14 of 44
what is the fifth principle of data protection?
data must be accurate and be kept up to date. There is a duty to keep it up to date, for example to change an address when people move.
15 of 44
what is the sixth principle of data protection?
must not be kept longer than is necessary for the registered purpose. It is alright to keep information for certain lengths of time but not indefinitely.
16 of 44
what is the seventh principle of data protection?
The information must be kept safe and secure. This includes keeping the information backed up and away from any unauthorised access. It would be wrong to leave personal data open to be viewed by just anyone.
17 of 44
what is the eighth principle of data protection?
The files may not be transferred outside of the European Economic Area unless the country that the data is being sent to has a suitable data protection law.
18 of 44
describe the right of subject access
A data subject has a right to be supplied by a data controller with the personal data held about him or her. The data controller can charge for this
19 of 44
describe the right of correction
A data subject may force a data controller to correct any mistakes in the data held about them.
20 of 44
describe the right to prevent distress
A data subject may prevent the use of information if it would be likely to cause them distress.
21 of 44
describe the right to prevent direct marketing
A data subject may stop their data being used in attempts to sell them things
22 of 44
describe the right to prevent automatic decisions
A data subject may specify that they do not want a data user to make "automated" decisions about them where, through points scoring, a computer decides on, for example, a loan application.
23 of 44
describe the right of complaint to the Information Commissioner
A data subject can ask for the use of their personal data to be reviewed by the Information Commissioner who can enforce a ruling using the DPA. The Commissioner may inspect a controller's computers to help in the investigation.
24 of 44
describe the right to compensation
The data subject is entitled to use the law to get compensation for damage caused if personal data about them is inaccurate, lost, or disclosed.
25 of 44
What types of Exemptions are there from 1998 DPA
complete or partial
26 of 44
What would qualify someone for a complete exemption from the 1998 DPA
Any personal data that is held for a national security reason is not covered. Personal data held for domestic purposes only at home.
27 of 44
what would qualify someone for a partial exemption from the 1998 DPA?
doctors to keep information from patients if they think it is in their best interests. A school pupil has no right to exam results before publication. for statistical, historical or research purposes.
28 of 44
What are types of computer misuse?
Hacking, Data misuse and unauthorised transfer or copying, Copying and distributing copyrighted software, Email and chat room abuses, ***********, Identity and financial abuses, Viruses,
29 of 44
what is hacking?
Hacking is where an unauthorised person uses a network, internet or modem connection to gain access past security passwords or other security to see data stored on another computer.
30 of 44
what types of data cannot be copied without copyright holders permission?
Personal data, company research and written work, such as novels and textbooks
31 of 44
what comes under Copying and distributing copyrighted software?
copying music and movies with computer equipment and distributing it on the internet without the copyright holder's permission.
32 of 44
what is included in Identity and financial abuses?
misuse of stolen or fictional credit card numbers to obtain goods or services on the internet, and use of computers in financial frauds.
33 of 44
what are viruses?
Viruses are relatively simple programs written by people and designed to cause nuisance or damage to computers or their files
34 of 44
what year was the computer misuse act passed?
1990
35 of 44
how many new offences came with the computer misuse act?
three
36 of 44
what is the first offence of the computer misuse act?
accessing computer material without permission, eg looking at someone else's files
37 of 44
what is the second offence of the computer misuse act?
accessing computer material without permission with intent to commit further criminal offences, eg hacking into the bank's computer and wanting to increase the amount in your account
38 of 44
what is the third offence of the computer misuse act?
altering computer data without permission, eg writing a virus to destroy someone else's data, or actually changing the money in an account
39 of 44
What is a reason for a chat room being closed?
abuses, especially where children are vulnerable. giving out of personal contact details or arrangeing meetings .
40 of 44
how can you reduce E-mail spamming?
never replying to anonymous emails, setting filters on email accounts, reporting spammers to ISPs, governments passing laws to punish persistent spammers with heavy fines
41 of 44
What does copyright law forbid you from doing?
giving a copy of a software to a friend, making a copy and then selling it, using the software on a network (unless the licence allows it), renting the software without the permission of the copyright holder
42 of 44
what is the law that governs copyright in the UK called
the Copyright, Designs and Patents Act 1988.
43 of 44
Describe one way in which the software industry prevents people from copying software illegally?
The software industry has set up an organisation called FAST to try to prevent users from breaking copyright law. Offenders can be prosecuted and sent to prison if caught.
44 of 44

Other cards in this set

Card 2

Front

why was the data protection act developed?

Back

to give protection and lay down rules about how data about people can be used

Card 3

Front

What does the data protection act cover?

Back

Preview of the front of card 3

Card 4

Front

who is the Information Commissioner?

Back

Preview of the front of card 4

Card 5

Front

who is the data controller?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Acts, Security and Legislation resources »