Professional Skills & Issues (H) - 2017 Exam
1. In EU law, an Internet service provider (ISP) in the UK is
not
liable for damages or criminal sanctions when transmitting data, under what circumstances?
the ISP hosts data by permanently storing data uploaded by its customers.
the ISP only transmits data to systems outside the UK.
the ISP acts as a mere conduit and simply transmits data up/downloaded by the customer.
the ISP uses caching to speed up downloading of future data by temporarily storing downloaded data.
2. What is the primary purpose of the Internet Watch Foundation (IWF)?
defends UK corporations from legal action regarding Internet content.
dictates UK government policy on inoffensive Internet content.
minimise the availability of potentially unlawful content on the Internet.
offers legal advice to parents in the UK seeking damages against Internet service providers.
3. In Europe, when is adult pornography usually deemed lawful?
when it is accessible to all European citizens.
when it is not disrespectful to religious beliefs.
when it takes the form of free speech.
when it is non-violent, consensual and inaccessible to minors.
4. In EU law, when is unsolicited email considered lawful?
when the email address of the sender is not visible.
when the email address of the receiver is not visible.
when prior consent has been obtained.
when prior consent has been sought.
5. In UK law, what is the basic principle of freedom of information?
that the information held by public bodies and private companies should always be available to the public.
that the information held by public bodies should always be available to the public.
that the information held by public bodies should be available to the public with certain exceptions.
that the information held by public bodies and private companies should be available to the public with certain exceptions.
6. In UK law, under what circumstances may personal data be transferred to a country or territory outside the European Economic Area (EEA)?
it may be permitted, if the country or territory have a specific trade agreement with the EU.
it may be permitted, if the consent of the data subject is obtained prior to transfer of data.
it may be permitted, if the country or territory ensure adequate levels of protection for the rights and freedoms of data subjects.
it is not permitted under any circumstances.
7. In UK law, when is processing sensitive data lawful?
when explicit consent is sought from the data subject.
when the data subject is a UK citizen and is at least 15 years old.
when the data subject has not stated they would not grant consent.
when the data subject grants explicit consent.
8. In UK law, what is personal data?
data that any individual considers personal.
data that relates to any person, dead or alive.
data that relates to a living person who can be identified.
data that is unique to an individual, e.g. genetic information.
9. In UK law, which of the following is usually
not
an offence under the Computer Misuse Act 1990 (CMA)?
intentionally spreading a virus or worm
stealing sensitive personal data (e.g., for publication or blackmail)
stealing commercially sensitive data
accessing pornography on work-place devices.
10. In US law, which of the following is usually
not
an offence under the Computer Fraud and Abuse Act (CFAA)?
selling a physical textbook bought in the UK to a US customer through the Internet.
denial-of-service attacks
trafficking in passwords.
unauthorised access to any "protected computer"
11. In UK law, who does the Computer Misuse Act 1990 (CMA) apply to in the following circumstances?
anyone, anywhere, who unlawfully accesses a computer anywhere in the world.
anyone, anywhere, who unlawfully accesses a computer in the United Kingdom.
only UK citizens who unlawfully access a computer in the UK.
only EU citizens who unlawfully access a computer in the UK.
12. In UK law, what amendment did the Police and Justice Act 2006 (PJA)
not
introduce to the Computer Misuse Act 1990 (CMA)?
intent to impair operation of any computer.
denial-of-service attacks.
building or selling hackers’ toolkits.
using Facebook and Twitter to share abusive statements.
13. In UK law, under what circumstances may whistle blowers
not
be protected under the Public Interest Disclosure Act 1998 (PIDA)?
when they expose environmental damage caused by employer.
when they approach the media, prior to the employer.
when they expose dangers to health and safety caused by employer.
when they expose failure of employer to comply with legal obligations.
14. In UK law, what may
not
be permitted for license holders under the Copyright, Design and Patents Act 1988 (CDPA)?
making one backup copy of a program.
decompiling a program to understand how to write another program to inter-operate with it.
decompiling a program to fix bugs.
installing a program on multiple machines.
15. In UK law, under what circumstances may it be permitted for employees to override an obligation of confidence?
expose lawful business practices in the public interest.
expose failure to comply with legal obligations in the public interest.
expose excessive earnings in the public interest.
expose private conversations with customers in the public interest.
16. What is considered cyber-squatting?
registering a trademark as your domain name and refusing to sell it to another individual at any price.
registering a trade mark as your own domain name and selling it to the trade mark owner at an inflated price.
maliciously redirecting individuals to another domain name.
duplicating a website and hosting under another domain name.
17. A cost-plus contract expects customers to pay supplier’s actual costs and what else?
an appropriate profit margin.
integration costs with existing customer systems.
an enduring annual license fee.
all associated legal fees.
18. In terms of bespoke software development to what type of code does copyright apply?
boiler-platecode.
open-source code.
standard library code.
code generated specifically for the customer.
19. When should a contract for bespoke software development specify surcharges for the customer?
for when the customer pays in a foreign currency (e.g. US dollars).
for customers who want to lease software to other users.
for a solution expected to operate across multiple territories.
for when the customer changes requirements.
20. In terms of bespoke software development, what responsibility does a customer have in a contract-hire contract?
management of supplied staff.
any associated legal cost of supplied staff.
ensuring the correct competences of supplied staff.
private healthcare for all supplied staff.
Submit Quiz