Professional Skills & Issues (H) - 2017 Exam
1. In EU law, an Internet service provider (ISP) in the UK is
not
liable for damages or criminal sanctions when transmitting data, under what circumstances?
the ISP acts as a mere conduit and simply transmits data up/downloaded by the customer.
the ISP uses caching to speed up downloading of future data by temporarily storing downloaded data.
the ISP only transmits data to systems outside the UK.
the ISP hosts data by permanently storing data uploaded by its customers.
2. What is the primary purpose of the Internet Watch Foundation (IWF)?
offers legal advice to parents in the UK seeking damages against Internet service providers.
dictates UK government policy on inoffensive Internet content.
defends UK corporations from legal action regarding Internet content.
minimise the availability of potentially unlawful content on the Internet.
3. In Europe, when is adult pornography usually deemed lawful?
when it is non-violent, consensual and inaccessible to minors.
when it is accessible to all European citizens.
when it takes the form of free speech.
when it is not disrespectful to religious beliefs.
4. In EU law, when is unsolicited email considered lawful?
when the email address of the sender is not visible.
when prior consent has been sought.
when prior consent has been obtained.
when the email address of the receiver is not visible.
5. In UK law, what is the basic principle of freedom of information?
that the information held by public bodies and private companies should be available to the public with certain exceptions.
that the information held by public bodies should be available to the public with certain exceptions.
that the information held by public bodies and private companies should always be available to the public.
that the information held by public bodies should always be available to the public.
6. In UK law, under what circumstances may personal data be transferred to a country or territory outside the European Economic Area (EEA)?
it is not permitted under any circumstances.
it may be permitted, if the country or territory have a specific trade agreement with the EU.
it may be permitted, if the country or territory ensure adequate levels of protection for the rights and freedoms of data subjects.
it may be permitted, if the consent of the data subject is obtained prior to transfer of data.
7. In UK law, when is processing sensitive data lawful?
when explicit consent is sought from the data subject.
when the data subject grants explicit consent.
when the data subject has not stated they would not grant consent.
when the data subject is a UK citizen and is at least 15 years old.
8. In UK law, what is personal data?
data that is unique to an individual, e.g. genetic information.
data that relates to any person, dead or alive.
data that any individual considers personal.
data that relates to a living person who can be identified.
9. In UK law, which of the following is usually
not
an offence under the Computer Misuse Act 1990 (CMA)?
accessing pornography on work-place devices.
stealing commercially sensitive data
intentionally spreading a virus or worm
stealing sensitive personal data (e.g., for publication or blackmail)
10. In US law, which of the following is usually
not
an offence under the Computer Fraud and Abuse Act (CFAA)?
unauthorised access to any "protected computer"
denial-of-service attacks
selling a physical textbook bought in the UK to a US customer through the Internet.
trafficking in passwords.
11. In UK law, who does the Computer Misuse Act 1990 (CMA) apply to in the following circumstances?
anyone, anywhere, who unlawfully accesses a computer anywhere in the world.
only EU citizens who unlawfully access a computer in the UK.
only UK citizens who unlawfully access a computer in the UK.
anyone, anywhere, who unlawfully accesses a computer in the United Kingdom.
12. In UK law, what amendment did the Police and Justice Act 2006 (PJA)
not
introduce to the Computer Misuse Act 1990 (CMA)?
denial-of-service attacks.
using Facebook and Twitter to share abusive statements.
building or selling hackers’ toolkits.
intent to impair operation of any computer.
13. In UK law, under what circumstances may whistle blowers
not
be protected under the Public Interest Disclosure Act 1998 (PIDA)?
when they expose environmental damage caused by employer.
when they approach the media, prior to the employer.
when they expose failure of employer to comply with legal obligations.
when they expose dangers to health and safety caused by employer.
14. In UK law, what may
not
be permitted for license holders under the Copyright, Design and Patents Act 1988 (CDPA)?
decompiling a program to understand how to write another program to inter-operate with it.
making one backup copy of a program.
installing a program on multiple machines.
decompiling a program to fix bugs.
15. In UK law, under what circumstances may it be permitted for employees to override an obligation of confidence?
expose private conversations with customers in the public interest.
expose excessive earnings in the public interest.
expose failure to comply with legal obligations in the public interest.
expose lawful business practices in the public interest.
16. What is considered cyber-squatting?
maliciously redirecting individuals to another domain name.
registering a trademark as your domain name and refusing to sell it to another individual at any price.
duplicating a website and hosting under another domain name.
registering a trade mark as your own domain name and selling it to the trade mark owner at an inflated price.
17. A cost-plus contract expects customers to pay supplier’s actual costs and what else?
an appropriate profit margin.
all associated legal fees.
integration costs with existing customer systems.
an enduring annual license fee.
18. In terms of bespoke software development to what type of code does copyright apply?
standard library code.
boiler-platecode.
open-source code.
code generated specifically for the customer.
19. When should a contract for bespoke software development specify surcharges for the customer?
for a solution expected to operate across multiple territories.
for customers who want to lease software to other users.
for when the customer pays in a foreign currency (e.g. US dollars).
for when the customer changes requirements.
20. In terms of bespoke software development, what responsibility does a customer have in a contract-hire contract?
management of supplied staff.
any associated legal cost of supplied staff.
ensuring the correct competences of supplied staff.
private healthcare for all supplied staff.
Submit Quiz