COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
This legislation is intended to prevent unauthorised access and modification of electronic data.
A
Data Protection Act
B
Computer Misuse Act
C
Copyright and Patents Act
D
Regulation of Investigatory Powers Act
Explanation: 

Detailed explanation-1: -Computer Misuse Act 1990. The Computer Misuse Act 1990 creates three distinct criminal offenses: Unauthorized access to computers, including the illicit copying of software held in any computer.

Detailed explanation-2: -Unauthorised modification of computer material This offence includes the deliberate deletion or corruption of programmes or data. It also includes the introduction of viruses etc., where these result in the modification or destruction of data.

Detailed explanation-3: -The Computer Misuse Act was passed in 1990. What is not an offence under the Computer Misuse Act? Copying software and trying to sell it to someone for a profit is not an offence under the Computer Misuse Act.

Detailed explanation-4: -Your Bibliography: Legislation.gov.uk. 2016. Computer Misuse Act 1990. [online] Available at: <http://www.legislation.gov.uk/ukpga/1990/18/section/3ZA> [Accessed 14 January 2016].

There is 1 question to complete.