COMPUTER FUNDAMENTALS

COMPUTER ETHICS AND SECURITY

ETHICS IN COMPUTING

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Used in a way that is adequate, relevant and limited to only what is necessary.
A
Data Protection Act
B
Regulation of Investigatory Powers Act
C
Freedom of Information Act
D
Protection of Freedoms Act
E
Privacy and Electronic Communications Regulations
Explanation: 

Detailed explanation-1: -The second principle is that of purpose limitation. It means that personal data are to be collected only for specified, explicit and legitimate purposes and it is not allowed to process them further in a way that is not compatible with those purposes.

Detailed explanation-2: -Accuracy. Storage limitation. Integrity and confidentiality (security) Accountability.

There is 1 question to complete.