Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ethics and law

1.5 - Legal, moral, ethical and cultural issues

QuestionAnswerVersion of Act
exam law note whilst the exam spec uses a specific set of laws, these can be outdated. Either usage (when the spec is released/the year of the exam) is fine, though the latter is prefered (EG DPA of 1998 and 2018)
The Data Protection Act (general) controls how personal information is used by companies/the government
data subject the one in which data is collected from and stored outside of their control 1998
data controller decidesn which data is collected, how it's collected and how it's stored/used 1998
data comissioner an indepenent public body appointed by the crown that can enforce the act and responds to the parliment 1998
personal data data attached to the sociatal parts of a person (e.g name, banking info, address)
sensitive data data attached to the identity of a person (e.g nationality, orientation).
strictness of data Sensitive data is subjected to more legal protections than personal data
the principals of data protection the ways in which data handling is considered legally viable ie that its fair,purposful and to a legal quality 1998
the rights of the data subject the right to complain, request collected data, correct/remove collected data and the right to be compensated 1998
Eu's involvment The EU formed the General Data Protection Act in 2015 to strength and standardise the GDA, leading to the DPA 2018 in the UK to reach these standards 2018
implementation of the GDPA data controllers must prove how their methods are sufficent and data must be stored for only the necessary length. Increased quality of language 2018
Computer Misuse Act unauthorised access or modification to a system, including using it to or having the intent to use it to access/modify/make systems to comit these acts are illegal 1990
acts included in the CMU viruses Hacking Data destruction/theft Fraud Unauthorised work 1990
Punishment of CMU ranges from a fine of £5k to up to 10 years in prison depending on the severity 1990
The Copright Design and Patents Act Interlectural property is to be protected and can not be stolen or copied 1988
Interlectural property any creation of any form (often brands/inventions/designs)
copyright the legal term to describe how the owner has rights over their work 1988
patents how the owner has exclusive rights to decide how their property is used 1988
examples of work protected under copyright music books art videos games software
how copyright works any IP is automatically held under copyright meaning that it can't be stolen Whilst this doesn't DIRECTLY prevent the act, it means that IP owner can always take legal action
The Regulation of Investigatory Powers Act the right for certain bodies to moniter communications/internet activities as well as the ability to intercept these services 2000
example of bodies under RIPA police security services environment protection agency office of fair trading serious fraud office 2000
rights under RIPA the demand to access data, including mass servalencem to use this data in court and also that Internet Service Providers can provide/allow access to their related data 2000
business responses to RIPA data must be sent when requested, meaning certain hardware/software must store these digital communications 2000
concerns of RIPA invasion of privacy freedom of speech unnecessary censorship improper use of RIPA
criminal law cases within law which are based on the punishment of offenders to said law
civil law cases within law between singular identities or groups
Created by: That cool NAMe
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards