4.1 - UK Legislation

4.1 - UK Legislation

Assessment

Flashcard

Information Technology (IT)

11th Grade

Hard

Created by

TRC STUDENT

FREE Resource

Student preview

quiz-placeholder

11 questions

Show all answers

1.

FLASHCARD QUESTION

Front

What is the purpose of the Data Protection Act (2018)?

Back

The Data Protection Act (2018) protects the data of individuals stored on computers and processed by organizations. It ensures data is collected lawfully, used for specified reasons, is accurate, not excessive, and stored securely.

2.

FLASHCARD QUESTION

Front

Who is a data subject and a data controller?

Back

A data subject is a person whose data is stored. A data controller is an employee responsible for registering with the Information Commissioner and ensuring data protection principles are followed.

3.

FLASHCARD QUESTION

Front

What are the six principles of the Data Protection Act (2018)?

Back

1. Data must be collected lawfully and processed fairly. 2. Used only for specified reasons. 3. Relevant and not excessive. 4. Accurate and up-to-date. 5. Not stored longer than necessary. 6. Stored and processed securely.

4.

FLASHCARD QUESTION

Front

What rights do data subjects have under the Data Protection Act?

Back

Data subjects have the right to access their information, request corrections, and make a Subject Access Request (SAR) to receive a copy of their data.

5.

FLASHCARD QUESTION

Front

What is the Computer Misuse Act (1990)?

Back

The Computer Misuse Act (1990) aims to prevent unauthorized access to data, use of data for illegal activities, and unauthorized modification of data.

6.

FLASHCARD QUESTION

Front

What is the Freedom of Information Act (2000)?

Back

This act allows individuals to request information from public authorities, which must respond within 20 days unless the request is too expensive or involves sensitive information.

7.

FLASHCARD QUESTION

Front

What is the Regulation of Investigatory Powers Act (2000)?

Back

RIPA allows monitoring and accessing online communication of suspected criminals, including accessing encrypted data and installing surveillance equipment.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?