COMPUTER ETHICS AND SECURITY
ETHICS IN COMPUTING
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
TRUE
|
|
FALSE
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -Under provisions in Part III of the Regulation of Investigatory Powers Act (RIPA) 2000, individuals and businesses can be compelled to either decrypt documents or hand over the necessary encryption key.
Detailed explanation-2: -France. Loi no 2001-1062 du 15 novembre 2001 relative à la sécurité quotidienne, article 30 (Law #2001-1062 of 15 November 2001 on Community Safety) allows a judge or prosecutor to compel any qualified person to decrypt or surrender keys to make available any information encountered in the course of an investigation.
Detailed explanation-3: -The Regulation of Investigatory Powers Act 2000, or ‘RIPA’ as it is commonly known, governs the use of covert surveillance by public bodies. This includes bugs, video surveillance and interceptions of private communications (eg phone calls and emails), and even undercover agents (’covert human intelligence sources’).
Detailed explanation-4: -RIPA provides an authorisation process for covert surveillance and information gathering, and an authorisation can be used as a defence against a claim that the council has interfered with an individual’s right to private life under Article 8 of the European Convention on Human Rights.