click below
click below
Normal Size Small Size show me how
ethics and law
1.5 - Legal, moral, ethical and cultural issues
Question | Answer | Version of Act |
---|---|---|
exam law note | whilst the exam spec uses a specific set of laws, these can be outdated. Either usage (when the spec is released/the year of the exam) is fine, though the latter is prefered (EG DPA of 1998 and 2018) | |
The Data Protection Act (general) | controls how personal information is used by companies/the government | |
data subject | the one in which data is collected from and stored outside of their control | 1998 |
data controller | decidesn which data is collected, how it's collected and how it's stored/used | 1998 |
data comissioner | an indepenent public body appointed by the crown that can enforce the act and responds to the parliment | 1998 |
personal data | data attached to the sociatal parts of a person (e.g name, banking info, address) | |
sensitive data | data attached to the identity of a person (e.g nationality, orientation). | |
strictness of data | Sensitive data is subjected to more legal protections than personal data | |
the principals of data protection | the ways in which data handling is considered legally viable ie that its fair,purposful and to a legal quality | 1998 |
the rights of the data subject | the right to complain, request collected data, correct/remove collected data and the right to be compensated | 1998 |
Eu's involvment | The EU formed the General Data Protection Act in 2015 to strength and standardise the GDA, leading to the DPA 2018 in the UK to reach these standards | 2018 |
implementation of the GDPA | data controllers must prove how their methods are sufficent and data must be stored for only the necessary length. Increased quality of language | 2018 |
Computer Misuse Act | unauthorised access or modification to a system, including using it to or having the intent to use it to access/modify/make systems to comit these acts are illegal | 1990 |
acts included in the CMU | viruses Hacking Data destruction/theft Fraud Unauthorised work | 1990 |
Punishment of CMU | ranges from a fine of £5k to up to 10 years in prison depending on the severity | 1990 |
The Copright Design and Patents Act | Interlectural property is to be protected and can not be stolen or copied | 1988 |
Interlectural property | any creation of any form (often brands/inventions/designs) | |
copyright | the legal term to describe how the owner has rights over their work | 1988 |
patents | how the owner has exclusive rights to decide how their property is used | 1988 |
examples of work protected under copyright | music books art videos games software | |
how copyright works | any IP is automatically held under copyright meaning that it can't be stolen Whilst this doesn't DIRECTLY prevent the act, it means that IP owner can always take legal action | |
The Regulation of Investigatory Powers Act | the right for certain bodies to moniter communications/internet activities as well as the ability to intercept these services | 2000 |
example of bodies under RIPA | police security services environment protection agency office of fair trading serious fraud office | 2000 |
rights under RIPA | the demand to access data, including mass servalencem to use this data in court and also that Internet Service Providers can provide/allow access to their related data | 2000 |
business responses to RIPA | data must be sent when requested, meaning certain hardware/software must store these digital communications | 2000 |
concerns of RIPA | invasion of privacy freedom of speech unnecessary censorship improper use of RIPA | |
criminal law | cases within law which are based on the punishment of offenders to said law | |
civil law | cases within law between singular identities or groups |