Professional Skills & Issues (H)

1. In UK law, which of the following is usually not an offence under the Computer Misuse Act 1990 (CMA)?

2. In UK law, what is personal data?

3. The contract for the development of a bespoke software system should define who will own the copyright in the software system. For which part of the system code could copyright reasonably be assigned to the customer?

4. Data protection laws were introduced to address concerns about the ways in which personal data might be misused. Which of the following was not such a concern?

5. The principle known as "obligation of confidence" makes which of the following unlawful?

6. A UK citizen has identified potentially unlawful content on the Internet, but is unsure that it is definitely unlawful. Which of the following actions would be the best first step?

7. The (UK) Data Protection Act 1984 was primarily focused on addressing the concerns of data misuse by what entities?

8. Nearly every country has laws restricting pornography, but what is legal varies enormously. Suppose that a pornographer based in country X has a website whose content is lawful in country X, but the website is frequently accessed by people in country Y where its content is unlawful. Which one of the following statements is true?

9. The (UK) Draft Investigatory Powers Bill would require communications service providers to:

10. In EU law, when is unsolicited email considered lawful?

11. The (UK) Computer Misuse Act 1990 was enacted to combat misuse. Which of the following is not a criminal offence under the act?

12. In UK law, what amendment did the Police and Justice Act 2006 (PJA) not introduce to the Computer Misuse Act 1990 (CMA)?

13. In terms of bespoke software development, what responsibility does a customer have in a contract-hire contract?

14. Some unsolicited e-mail is intended to defraud you. In which one of the following cases would you be reasonably confident that an e-mail message is genuine?

15. In UK law, under what circumstances may personal data be transferred to a country or territory outside the European Economic Area (EEA)?

16. The (UK) Computer Misuse Act and Police & Justice Act have proved to be less effective than expected. Which one of the following is not a reason for this problem?

17. What is a fixed-price software contract?

18. In terms of intellectual property rights, what is the ‘obligation of confidence’ principle?

19. In UK law, under what circumstances may whistle blowers not be protected under the Public Interest Disclosure Act 1998 (PIDA)?

20. Software patenting is a difficult issue. Which of the following is not a reason for this difficulty?

21. The (UK) Sale of Goods Act 1979 requires that goods sold must be fit for purpose. Under which of the following scenarios could a customer demand a refund, under the act?

22. The (UK) Data Protection Act 1998 defines various terms. Which of the following accurately describes the role of the data controller?

23. What is a professional body?

24. In UK law, under what circumstances may it be permitted for employees to override an obligation of confidence?

25. The (UK) Regulation of Investigatory Powers Act 2000 grants certain agencies the right to seek a warrant to monitor telephone communications to or from a named person or organisation suspected of certain offences. Which one of the following agencies is not granted such a right?

26. What is the primary purpose of the Internet Watch Foundation (IWF)?

27. The Internet transcends national boundaries and jurisdictions. The Council of Europe (CoE) have approved a convention on cybercrime. Which of the following is not covered by the convention?

28. In European law, unsolicited e-mail is considered unlawful in which of the following scenarios?

29. Gary McKinnon (a UK citizen) openly admitted unauthorised access to US Department of Defense computers, but he was never brought to trial. Which one of the following statements is false?

30. In the UK, computer fraud is covered by existing anti-fraud laws. Which of the following statements is false?

31. An application program downloaded from the Internet has no packaging on which its trade mark could be displayed. Which is the best way to get round this problem?

32. Controlling children’s access to internet pornography is difficult for a number of reasons. Which of the following is false?

33. The (UK) Freedom of Information Act 2000 gives every citizen the right to request information from certain organisations. Which of the following is covered by the act?

34. The (US) Computer Fraud and Abuse Act 1986 was enacted to combat misuse. What are the limits of penalties for first offences?

35. The (UK) Data Protection Act 1998 requires that personal data should be kept no longer than necessary. Which of the following is false?

36. UK law defines various kinds of computer misuse offences. Which of the following is not such an offence?

37. The (UK) Data Protection Act 1998 defined various personal data as sensitive. Which of the following is not considered sensitive data?

38. In the development of a bespoke software system, what is the best way for the contractor to deal with the possibility that the client might request changes in the requirements during the term of the software contract?

39. In the (UK) Data Protection Act 1998, which one of the following is not classified as sensitive personal data?

40. There are some differences between European and US laws on unsolicited e-mail (spam). Which of the following is true?

41. In the UK, if a person deliberately obtains unauthorised access to personal data stored on a computer, but makes no use of that data:

42. Suppose that a university hosts its students’ personal web pages. A student posts a defamatory article on his web page, and the defamed person complains to the university. What if anything should the university do to comply with the law??

43. Which of the following is not an offence under the (UK) Computer Misuse Act 1990?

44. What is considered cyber-squatting?

45. When should a contract for bespoke software development specify surcharges for the customer?

46. In UK law, what may not be permitted for license holders under the Copyright, Design and Patents Act 1988 (CDPA)?

47. In Europe, when is adult pornography usually deemed lawful?

48. In United States law, unsolicited email is considered lawful in which of the following scenarios?

49. In EU law, an Internet service provider (ISP) in the UK is not liable for damages or criminal sanctions when transmitting data, under what circumstances?

50. The (UK) Freedom of Information Act 2000 is based on certain principles. Which one of the following is not one of these principles?

51. In European law, an Internet service provider (ISP) could be considered a mere conduit in which of the following circumstances?

52. Retail software licences and corporate software licences differ in several respects. Which one of the following is typical of a corporate software licence?

53. The (UK) Data Protection Act 1998 requires explicit consent for use of sensitive personal data. Suppose that an on-line service requires users to register, entering personal data including some data that is sensitive. Which one of the following is generally regarded as providing explicit consent?

54. In UK law, which of the following is not an offence under the Computer Misuse Act (CMA) 1990?

55. In UK law, what is the basic principle of freedom of information?

56. The (UK) Data Protection Act 1998 defines sensitive personal data. Which of the following is not classified as sensitive personal data?

57. In UK law, when is processing sensitive data lawful?

58. Under current European law, an internet service provider (ISP) can be sued for damages for transmitting a defamatory article in which one of the following circumstances?

59. In which one of the following circumstances does a company own the rights to a software product?

60. The (UK) Police and Justice Act 2006 (PJA) enhanced the (UK) Computer Misuse Act (CMA) 1990. Which of the following was not directly addressed in the PJA act?

61. In European law, an internet service provider (ISP) could be prosecuted in which of the following circumstances?

62. If a software product is found to be defective, the supplier can limit their liability to pay damages (under UK law) in which one of the following circumstances?

63. The contract for the development of a bespoke software system always includes the requirements for that system. Which one of the following is the most suitable way to do this?

64. Suppose that a business provides space for its employees’ personal web pages, and suppose that one employee uses this space to post an article that is alleged to be defamatory. In European law, which of the following statements is most accurate?

65. In UK law, who does the Computer Misuse Act 1990 (CMA) apply to in the following circumstances?

66. Companies naturally want to use their trade marks in their domain names. Which of the following statements is false?

67. In terms of bespoke software development to what type of code does copyright apply?

68. The (UK) Freedom of Information Act 2000 gives every citizen the right to request information from certain organisations. Which of the following is not covered by the Act?

69. The (UK) Data Protection Act 1998 introduced changes to data protection laws in the United Kingdom. What significant change did the act introduce?

70. An application program downloaded from the Internet has no packaging on which its trade mark could be displayed. Which is the best way to get round this problem?

71. A cost-plus contract expects customers to pay supplier’s actual costs and what else?

72. A software supplier can legitimately include, in its terms and conditions, a clause that limits its liability in case of:

73. The (UK) Copyright, Design and Patents Act 1988 is the primary copyright law in the United Kingdom. Which of the following is accurate in the case of source code?

74. Which one of the following statements is most accurate about European law on software patents?

75. The (UK) Data Protection Act 1998 grants certain rights to every data subject. Which one of the following rights is not granted to a data subject?

76. Intellectual property is:

77. Which one of the following statements about internet domain names is false?

78. In US law, which of the following is usually not an offence under the Computer Fraud and Abuse Act (CFAA)?

79. Which of the following is not covered by copyright law?

80. The (UK) Public Interest Disclosure Act 1998 (PIDA) provides protection for whistle-blowers. Which of the following scenarios would not be covered by the act?