Homework 1 Computing related legislation
Unit 9 Legal, moral, ethical and cultural issues
Homework 1 Computing related legislation Answers
1. A large retail company keeps track of all of its employees’ data on its payroll system. The
data includes when they start work, when they leave, address, phone number, salary,
position, etc.
The employees are concerned about the amount of information which is being stored about
them.
(a) Explain the kind of worries and fears the employees may have. [4]
Personal details being passed onto other people / third parties (1)
Concerns over identity theft if personal information is obtained from the system (1)
Personal details being obtained and used for nuisance calls (1)
Theft or burglary at home if work patterns can be obtained from company computers (1)
Bank account could be accessed / compromised if pay details are obtained (1)
Accept any other reasonable worries which directly relate to employee issues or problems
owing to dissemination of personal information at 1 mark each.
(b) Explain the steps the company could take in order to help minimise these fears. [4]
Anything related to passwords (1)
Encryption of personal data (1)
Compartmentalisation or restricted access to data of named employees (1)
Physical security measures (1)
Staff awareness campaigns (1)
Firewalls to prevent unauthorised access (1)
Audit trails, NFC being used in ID / access badges to sensitive information (1)
Again accept any reasonable measure which would reduce worries and fears at one mark
each.
2. The Computer Misuse Act makes it an offence to make, supply or obtain any article which
can be used for unauthorised access to computer material, such as data.
Give two examples of the kind of article meant by the Act, and explain how each could be
used to gain access to data. [4]
Hardware tools include key loggers (1) wireless receivers (1) and transmitters (1),
smartcard readers (1) and contactless readers (1). Anything that can gather electrical,
electro-magnetic, optical or magnetic data in storage or transit.
Software tools include Trojans (1) port scanners (1) password crackers (1) SQL-injection (1)
or any reasonable trick.
Allow indirect attacks such as skeleton keys, fake ID cards etc. to gain physical access to
servers etc.
1
Homework 1 Computing related legislation
Unit 9 Legal, moral, ethical and cultural issues
For each, allow 1 mark for a reasonable explanation of how it can lead to unauthorised
access - but not for denial (e.g. ransomware) or destruction (e.g. virus) unless justified as
modification, which is also an offence.
3. A game designer uses commercial software tools to manage and test the complicated code.
She also includes music and video in her games.
Describe the legal issues which she might need to think about, including the name of any
relevant Act.
[4]
The Copyright, Designs and Patents Act (1) 1988 covers protection for intellectual property
(1) including software programs (1) and media (1) although these may be covered by
licence agreements (1) or other contracts (1). (Max 4)
Allow any well-argued reference to other Acts e.g. Fraud, Obscene Publications - they may
be studying Law as well as Computer Science!
4. Name the Act which gives public bodies including the Police the right to intercept
communications.
Explain how it affects internet service providers, and state one provision which attempts to
deal with the use of strong encryption by criminals.
[4]
The Regulation of Investigatory Powers Act (1) 2000.
This enables certain public bodies to demand that:
● an ISP provide access to a customer's communications (1) in secret (1) / ISPs fit
equipment (1) to facilitate surveillance (1)
● someone hand over keys to protected information (1)
[Total 20 Marks]