100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

COMPACT SUMMARY FOR TOPIC 12: Computer Related Legalisation

Rating
-
Sold
-
Pages
1
Uploaded on
15-08-2024
Written in
2022/2023

A-Level Computer Science Revision Guide: Computer-Related Legislation This comprehensive revision guide covers key computer-related legislation crucial for A-Level Computer Science students. It succinctly explains the Data Protection Act (DPA), Computer Misuse Act (CMA), Copyright Design and Patents Act (CDPA), and the Regulation of Investigatory Powers Act (RIPA). Each section highlights essential principles, legal implications, and real-world applications, ensuring students grasp the importance of these laws in the digital age. Perfect for quick revisions or in-depth study sessions!

Show more Read less
Institution
OCR








Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
August 15, 2024
Number of pages
1
Written in
2022/2023
Type
Summary

Content preview

Computer science—A Level—Topic 12 Computer related legalisation
Data Protection Act 1998 The Computer Misuse act 1990
The DPA was a legalisation first introduced in The CMA was a legalisation first introduced as a direct response to the
1998 and it was introduced to make sure new technology like computers and the internet in 1990. It defined unau-
someone’s personal and private data were thorised access to computer systems and the theft of electronic data.
secured and not unreasonably used.
It has 8 principles that it follows:
It made the following things illegal:
1.Data must be fairly and lawfully processed.
1.Unauthorised access to a computer system by hacking.—Can be fined
2.Data must be obtained for specific and lawful up to £5000.
purposes.
2.Unauthorised access to digital materials with the intent to commit fur-
3.Personal data must be adequate and not too ther crimes.—can be fined any amount and imprisoned up to 5 years.
excessive.
3.Unauthorised modification of data.—can be fined any amount and im-
4.Personal data must be accurately up to date. prisoned up to 5 years.
5.Data must not be held onto for longer than 4.Making, supplying or obtaining tools used to commit computer misuse
intended. offences.—can be fined any amount and imprisoned up to 10 years.
6.Personal data must be processed in line with
your rights.
Copyright design and patents act 1988
7.Personal data must be held securely.
8.Personal data must not be transferred to other The CDPA was a legalisation that allowed content creators to protect their
intellectual property, it gave them the right to control the way their work
countries outside the European Economic Area. could be used, their work could include music, games, posters, literature, art
and brand names etc.
The DPA was updated in 2018 to become the Copyright is a legal term used to describe the rights a creator has over their
General data protection act. own work.
•It included the same principles except the 6th Patents are an exclusive right granted for an invention—they provide the
and 8th principle meaning personal data could owner with the right to decide how their invention can be used by others.
be transferred to other countries if needed to.
It makes it illegal for people to copy someone’s work without their permis-
sion and the owner of that copyright/work can take legal action.

The role of the creative commons license gave individuals and organisations a
standardized way of using the author’s work under copyright laws.

The Regulation of investigatory powers act 2000
Term Explanation The RIPA was introduced as a direct response to evolution of technology, as the internet
becomes more popular, criminals and terrorists are increasingly communicating via the
internet. The RIPA gives the right to public bodies such as the police and security services
Personal data Any information about an indi- to investigate and intercept communication of individuals.
vidual so that they can be iden-
tified.
It allow public bodies to:
Data subject The person that the data is
being stored about. •Demand ISPs to provide access to a customer’s surveillance.
•Allow mass surveillance of communication.
Data user The person who needs access •Demand ISPs to fit equipment to facilitate surveillance.
to the data as part of their job.
•Demand access be granted to protected information.
Data control-This is the person who needs •To allow monitoring of an individual’s internet activities.
ler to apply for permissions to •Prevent existence of such interception activities being revealed in court.
store and collect data.
They decide what data to col-
lect and what it will be used To summarise, it helps to reduce terrorism/crime however there is controversy about it
for. invading privacy.
Information This is the person who enforc-
commissioner es the DPA and who organisa-
tions need to apply to in order
to gain permissions to collect
and store personal data.
£3.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
JackJordi05

Also available in package deal

Thumbnail
Package deal
-
14 2024
£ 47.86 More info

Get to know the seller

Seller avatar
JackJordi05 Cranfield University
View profile
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
1 year
Number of followers
0
Documents
14
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions