Professional Skills & Issues (H) - Sample Exam

1. In the (UK) Data Protection Act 1998, which one of the following is not classified as sensitive personal data?

2. The (UK) Data Protection Act 1998 requires explicit consent for use of sensitive personal data. Suppose that an on-line service requires users to register, entering personal data including some data that is sensitive. Which one of the following is generally regarded as providing explicit consent?

3. The (UK) Data Protection Act 1998 grants certain rights to every data subject. Which one of the following rights is not granted to a data subject?

4. The (UK) Freedom of Information Act 2000 is based on certain principles. Which one of the following is not one of these principles?

5. The (UK) Regulation of Investigatory Powers Act 2000 grants certain agencies the right to seek a warrant to monitor telephone communications to or from a named person or organisation suspected of certain offences. Which one of the following agencies is not granted such a right?

6. Suppose that a university hosts its students’ personal web pages. A student posts a defamatory article on his web page, and the defamed person complains to the university. What if anything should the university do to comply with the law??

7. Under current European law, an internet service provider (ISP) can be sued for damages for transmitting a defamatory article in which one of the following circumstances?

8. Nearly every country has laws restricting pornography, but what is legal varies enormously. Suppose that a pornographer based in country X has a website whose content is lawful in country X, but the website is frequently accessed by people in country Y where its content is unlawful. Which one of the following statements is true?

9. Some unsolicited e-mail is intended to defraud you. In which one of the following cases would you be reasonably confident that an e-mail message is genuine?

10. Which of the following is not an offence under the (UK) Computer Misuse Act 1990?

11. The (UK) Computer Misuse Act and Police & Justice Act have proved to be less effective than expected. Which one of the following is not a reason for this problem?

12. Gary McKinnon (a UK citizen) openly admitted unauthorised access to US Department of Defense computers, but he was never brought to trial. Which one of the following statements is false?

13. Intellectual property is:

14. In which one of the following circumstances does a company own the rights to a software product?

15. Which one of the following statements is most accurate about European law on software patents?

16. An application program downloaded from the Internet has no packaging on which its trade mark could be displayed. Which is the best way to get round this problem?

17. Which one of the following statements about internet domain names is false?

18. The contract for the development of a bespoke software system always includes the requirements for that system. Which one of the following is the most suitable way to do this?

19. The contract for the development of a bespoke software system should define who will own the copyright in the software system. For which part of the system code could copyright reasonably be assigned to the customer?

20. If a software product is found to be defective, the supplier can limit their liability to pay damages (under UK law) in which one of the following circumstances?