Skip to the content. Back to Chapter 1

Legislation questions

A number of laws govern the use of computers. For each of the following scenarios tick one box relating to the law being broken.

Scenario CMA CDPA DPA
A bank accidentally publishes customers' details onto its website
Someone downloads a pirated version of a piece of software that users would ordinarily have to pay for
Someone writes and distributes a virus

Marks: [3 / 3]

A town council stores details of the people who live in the town. These details are stored in a database on a newtork. Some people are worried about the storage of their details.

Describe three methods that can be used to protect the data about people held in the town council's database

  1. Restrict database access, e.g. with a username/password authentication system. This also enables the use of transaction logging to note who accesses/modifies data, and what data they accessed
  2. The database can be backed up to a secure location frequently to ensure that information is never lost; the backups would need to be secured and stored offsite
  3. The database could be encrypted to ensure that even if a security breach occurs, the attacker would be unable to extract any useful information from the retrieved data

Marks: [6 / 6]

A database stores information about songs on a music streaming service. One of the tables, called Song, has the fields:

A band called RandomBits revokes their permission for their songs to be streamed.
The company removes all the songs belonging to RandomBits from their service.

  1. Identify the law with which the company are complying

    • Data Protection Act Copyright, Design, and Patents Act
  2. Write an SQL statement that will remove all songs by RandomBits from the table Song

    • DELETE -- specify that I am deleting records
      FROM "Song" -- specify the table
      WHERE "Artist" LIKE 'RandomBits'; -- use LIKE for case-insensitivity; could use = instead
      
  3. When the songs have been removed, explain what must happen to the table PlayListEntry if the database is to retain its referential integrity.

    • PlayListEntry records which reference songs by RandomBits must be updated to point to a 'Deleted Song' fake record, or deleted entirely, so that no record points to a record which does not exist.

    • In SQL, this can be achieved by running the following before deleting the songs:

      UPDATE "PlayListEntry" -- modify records in PlayListEntry
      SET "PlayListEntry"."TrackID" = 'MissingTrack' -- update to point to missing track
      FROM "PlayListEntry"
      INNER JOIN "Song" ON "PlayListEntry"."TrackID" = "Song"."TrackID" -- link rows where appropriate
      WHERE "Song"."Artist" LIKE "RandomBits"; -- select only RandomBits songs
      

Marks: [3 / 4]

A dance group decide they are going to use the Internet to promote their work.

Describe one legal implication the dance group need to consider when adding soundtracks to their videos.

The dance group must consider whether or not the soundtrack they choose to use is free (permissive, not price) before they can add it to their videos; if the soundtrack they choose is not free then they either must negotiate with the copyright holder, or will be in breach of the CDPA (Copyright, Design, and Patents Act)

See And Believe is a company that specialises in computer-generated imagery (CGI) for films. Producing CGI requires lots of processing power and so the company has a large number of high-performance computers.

The company is working on scenes from the latest Stellar Scuffles film. There is strict security around the film, and there are worries about unauthorised people gaining access to the company's network and putting clips from the film on the internet.

Discuss to what extent each of the following laws is intended to address the issue of someone accessing and distributing clips of the film online:

A number of laws govern the use of computers.

Describe the purpose of the Regulation of Investigatory Powers Act.

The Regulation of Investigatory Powers Act (RIPA) was created with the purpose of allowing law enforcement to inspect online communications at a similar or greater level of ability compared to the physical world.

Police, and certain specified government agencies, may (under certain circumstances) collect mass data on individuals' digital communications, without their knowledge or consent. It also allows the seizure of encryption keys, to decrypt encrypted data.

The Investigatory Powers Act has been nicknamed the 'Snoopers Act'. The legislation itself is quite controversial. Discuss why this is so.

The Investigatory Powers Act (IPA) further enhances the powers of law enforcement from the powers given under the Regulation of Investigatory Powers Act (RIPA). It added sweeping new powers, such as the bulk collection of data, to the previous powers such as seizure of encryption keys.

Privacy campaigners felt that the new powers were overly intrusive, and the Civil Rights group Liberty issued a legal challenge against the IPA, stipulating that it does not protect human rights (as defined by the European Convention on Human Rights).

Those who support the act, however, suggest that it mainly serves the purpose of bringing digital powers in line with their analogue counterparts.