Back to AI Flashcard MakerInformation Technology /A Level Computer Science Paper 1: 1.5.1 Computer Related Legislation

A Level Computer Science Paper 1: 1.5.1 Computer Related Legislation

Information Technology16 CardsCreated about 1 month ago

This flashcard set explains the three core offences outlined in the Computer Misuse Act 1990: unauthorized access, unauthorized access with intent to commit further crimes, and unauthorized modification of computer material. It also details what must be proven to be found guilty under each rule.

Computer Misuse Act 1990 3 rules

Rule #1: Unauthorised access to computer material
Rule #2: Unauthorised access with intent to commit or facilitate commission of future offences
Rule #3: Unauthorised modification of computer material

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/16

Key Terms

Term
Definition

Computer Misuse Act 1990 3 rules

Rule #1: Unauthorised access to computer material
Rule #2: Unauthorised access with intent to commit or facilitate commission of future offences...

Computer Misuse Act how to be guilty of rule #1

Guilty if they cause a computer to perform any function to access any data or program, the access is unauthorised and they knowingly did it

Computer Misuse Act how to be guilty of rule #2

Needs to be proven that the suspect was going to use the data under rule 1 to cause further offence or facilitate further offence by another

Computer Misuse Act how to be guilty of rule #3

Guilty if the suspect commits any act to cause the unauthorized modification of the contents of a computer and has the requisite intent and knowled...

Computer Misuse Act rule 3, what acts are punishable

Impairing the operation of the computer
Preventing or hindering access to program/data
Impairing the operation of a program/ access to data

Personal Data

Data that allows you to identify living people

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

Computer Misuse Act 1990 3 rules

Rule #1: Unauthorised access to computer material
Rule #2: Unauthorised access with intent to commit or facilitate commission of future offences
Rule #3: Unauthorised modification of computer material

Computer Misuse Act how to be guilty of rule #1

Guilty if they cause a computer to perform any function to access any data or program, the access is unauthorised and they knowingly did it

Computer Misuse Act how to be guilty of rule #2

Needs to be proven that the suspect was going to use the data under rule 1 to cause further offence or facilitate further offence by another

Computer Misuse Act how to be guilty of rule #3

Guilty if the suspect commits any act to cause the unauthorized modification of the contents of a computer and has the requisite intent and knowledge

Computer Misuse Act rule 3, what acts are punishable

Impairing the operation of the computer
Preventing or hindering access to program/data
Impairing the operation of a program/ access to data

Personal Data

Data that allows you to identify living people

Information Commissioner

Ensures the upholding of the data protection act

Data User

The person who processes the data - restricted use

Data Subject

The person the data is about

Data Protection Act 8 principles

  1. Data must be fair and lawful

  2. The data must be relevant and not excessive

  3. The data must be accurate and up to date

  4. Data must be held for no longer than necessary

  5. Data must only be used for the stated purpose

  6. Data must be held securely

  7. Data must be held within the rights of the subject

  8. Data must not be used in countries with weaker data protection laws

RIPA

Regulation of Investigatory Powers Act 2000

RIPA uses

Allows certain organisations to monitor the online activity and communication of individuals
Used to foil and avert criminal activities

RIPA 6 parts

  • Demands ISPs allow access to a customer surveillance

  • Allows mass surveillance of communication

  • Demands ISPs fit equipment to facilitate surveillance

  • Demands access be granted to protected information

  • To allow monitoring of any individuals internet activity

  • Prevents existence of such interception being revealed in court

CDPA

Copyright, Design and Patents Act 1988

CDPA uses

Prevents creators of books, music, video, software etc from having their work illegally copied

What can digital copying be?

Of the same quality as the original