Acts quiz

1.Identify which law has been broken in each of the following scenarios and explain why the law has been broken: [12]

  • 1.A customer of a bank gets married and changes her name from Miss White to Mrs Walters.  She sends her bank a copy of her birth certificate and marriage certificate and asks for her name to be changed.  Six months later, she receives a letter addressed to Miss White
  • 2.A student discovers a teacher’s password.  They log onto the school network using the teacher’s username & password.
  • 3.A resident is concerned that his neighbour is a terrorist.  The resident installs a covert recording device on his neighbour’s phone.
  • 4.A school is asked by a parent for the names and addresses of all teachers who have been given early retirement in the last 5 years.  The school provides this information.
  • 5.A hospital is asked by a journalist to provide the number of patients that have died during operations in the last 12 months.  The hospital refuses to provide this information.
  • 6.A driver is stopped by the police for not having insurance.  The driver knows he has insurance because he purchased it from a local insurance broker.  He later discovers that the insurance broker lost his details because their computer system crashed.

Other acts

  1. Describe the purpose of the Electronic Communications Act (2000)  [4]
  2. Explain one advantage and one disadvantages of the Freedom of Information Act (2000).  [4]

RIPA (2000)

1.Give two reasons that public bodies might use to intercept communications.  [2]

2.Discuss the implications of the Regulation of Investigatory Powers Act (2000) on employers and employees.  [7]

CDP Act (1988)

1.Describe how the Copyright, Designs and Patents Act (1988) can be used to protect music produced by an unsigned artist. [4]

2.Describe two different types of software licence.  [4]

3.Describe two different ways that software could be used illegally.  [4]

4.Explain why people still risk illegally copying music, videos and software.  [4]

CMA (1990)

1.Describe two disadvantages of the Computer Misuse Act.  [4]

2.Identify three areas of crime under the Computer Misuse Act (1990) and for each area give an example of a crime that could be prosecuted under the act. [6]

DPA (1998) #2

  1. A psychiatrist sees patients in his office.  He has a list of appointments with the patients’ names and times on his desk.  Explain why this could be a breach of the DPA?    [2]
  2. Describe three purposes of the DPA.    [3]
  3. Explain the implications of the DPA to an organisation.    [6]

DPA (1998)

Read the section on the DPA (1998) in your AS textbook.

NOTE: Click the ‘uploads from icocoms’ link at the top of this video and scroll down to #48.  That is the correct video to watch – it’s a video about a doctor’s surgery.

Watch this training video from the ICO and answer these questions:

  1. Describe the consequences of handing over an old computer for recycling.
  2. Describe the problems that could occur if data is sent by fax.
  3. Describe how the receptionist breaches the DPA.
  4. Identify measures that the surgery should implement to improve their security procedures.
  5. Explain how encryption helps to prevent unauthorised disclosure of data?
  6. Explain why sending information by text without the data subject’s consent could be a breach of the DPA.

Impact of ICT on society

Class: this link is the second one I showed you in class today.

http://www-05.ibm.com/innovation/uk/smartercity/index_flash.html#/home/

It contains an overview of the impacts ICT can have on society (which we saw in class today).  Each link is clickable, and it has ideas for how ICT has impacted each area, e.g. education, transport, retail, etc.

Watch each video.  For each video, post your response here of ONE way that ICT has impacted that area of society.  EG:

Retail – online shopping.

Education – interactive whiteboards.

Like that.  Not so hard, but it will put this stuff into your minds and that is where it has to be.

Enjoy…

IMPACT ON SOCIETY: Remote controlled cyborg cockroaches

Read this article about remote controlled cyborg cockroaches and watch the embedded video:

http://www.cnet.com/news/eek-remote-controlled-cyborg-cockroaches-are-real/

  1. (P1) Evaluate the use of remote controlled cyborg cockroaches for searching for survivors after a disaster.
    1. Impact on searching for survivors after a disaster
    2. Advantage(s)
    3. Disadvantage(s)
  2. (P2) Evaluate the use of remote controlled cyborg cockroaches for espionage.
    1. Impact on espionage
    2. Advantage(s)
    3. Disadvantage(s)

Just write two paragraphs for this one, using the frame above I have provided.  BY THURSDAY MIDNIGHT.

Nonlinear and hierarchical presentations

1.Describe a non-linear presentation. [2]

2.Compare a hierarchical presentation with a non-linear presentation. [2]

3.Describe a situation in which a non-linear presentation might be appropriate. [2]

4.A tutorial is to be created for learning how to use a mobile phone to send emails.  Justify an appropriate type of presentation. [4]