Professional Skills & Issues (H) - 2017 Exam
1. In EU law, an Internet service provider (ISP) in the UK is
not
liable for damages or criminal sanctions when transmitting data, under what circumstances?
the ISP acts as a mere conduit and simply transmits data up/downloaded by the customer.
the ISP uses caching to speed up downloading of future data by temporarily storing downloaded data.
the ISP only transmits data to systems outside the UK.
the ISP hosts data by permanently storing data uploaded by its customers.
2. What is the primary purpose of the Internet Watch Foundation (IWF)?
defends UK corporations from legal action regarding Internet content.
minimise the availability of potentially unlawful content on the Internet.
offers legal advice to parents in the UK seeking damages against Internet service providers.
dictates UK government policy on inoffensive Internet content.
3. In Europe, when is adult pornography usually deemed lawful?
when it is not disrespectful to religious beliefs.
when it is accessible to all European citizens.
when it takes the form of free speech.
when it is non-violent, consensual and inaccessible to minors.
4. In EU law, when is unsolicited email considered lawful?
when prior consent has been obtained.
when prior consent has been sought.
when the email address of the sender is not visible.
when the email address of the receiver is not visible.
5. In UK law, what is the basic principle of freedom of information?
that the information held by public bodies and private companies should be available to the public with certain exceptions.
that the information held by public bodies and private companies should always be available to the public.
that the information held by public bodies should be available to the public with certain exceptions.
that the information held by public bodies should always be available to the public.
6. In UK law, under what circumstances may personal data be transferred to a country or territory outside the European Economic Area (EEA)?
it may be permitted, if the country or territory have a specific trade agreement with the EU.
it may be permitted, if the country or territory ensure adequate levels of protection for the rights and freedoms of data subjects.
it may be permitted, if the consent of the data subject is obtained prior to transfer of data.
it is not permitted under any circumstances.
7. In UK law, when is processing sensitive data lawful?
when explicit consent is sought from the data subject.
when the data subject grants explicit consent.
when the data subject is a UK citizen and is at least 15 years old.
when the data subject has not stated they would not grant consent.
8. In UK law, what is personal data?
data that relates to a living person who can be identified.
data that is unique to an individual, e.g. genetic information.
data that any individual considers personal.
data that relates to any person, dead or alive.
9. In UK law, which of the following is usually
not
an offence under the Computer Misuse Act 1990 (CMA)?
stealing sensitive personal data (e.g., for publication or blackmail)
intentionally spreading a virus or worm
accessing pornography on work-place devices.
stealing commercially sensitive data
10. In US law, which of the following is usually
not
an offence under the Computer Fraud and Abuse Act (CFAA)?
unauthorised access to any "protected computer"
trafficking in passwords.
selling a physical textbook bought in the UK to a US customer through the Internet.
denial-of-service attacks
11. In UK law, who does the Computer Misuse Act 1990 (CMA) apply to in the following circumstances?
anyone, anywhere, who unlawfully accesses a computer anywhere in the world.
only EU citizens who unlawfully access a computer in the UK.
anyone, anywhere, who unlawfully accesses a computer in the United Kingdom.
only UK citizens who unlawfully access a computer in the UK.
12. In UK law, what amendment did the Police and Justice Act 2006 (PJA)
not
introduce to the Computer Misuse Act 1990 (CMA)?
building or selling hackers’ toolkits.
denial-of-service attacks.
using Facebook and Twitter to share abusive statements.
intent to impair operation of any computer.
13. In UK law, under what circumstances may whistle blowers
not
be protected under the Public Interest Disclosure Act 1998 (PIDA)?
when they approach the media, prior to the employer.
when they expose dangers to health and safety caused by employer.
when they expose failure of employer to comply with legal obligations.
when they expose environmental damage caused by employer.
14. In UK law, what may
not
be permitted for license holders under the Copyright, Design and Patents Act 1988 (CDPA)?
decompiling a program to understand how to write another program to inter-operate with it.
making one backup copy of a program.
decompiling a program to fix bugs.
installing a program on multiple machines.
15. In UK law, under what circumstances may it be permitted for employees to override an obligation of confidence?
expose failure to comply with legal obligations in the public interest.
expose lawful business practices in the public interest.
expose private conversations with customers in the public interest.
expose excessive earnings in the public interest.
16. What is considered cyber-squatting?
registering a trade mark as your own domain name and selling it to the trade mark owner at an inflated price.
maliciously redirecting individuals to another domain name.
duplicating a website and hosting under another domain name.
registering a trademark as your domain name and refusing to sell it to another individual at any price.
17. A cost-plus contract expects customers to pay supplier’s actual costs and what else?
an enduring annual license fee.
an appropriate profit margin.
integration costs with existing customer systems.
all associated legal fees.
18. In terms of bespoke software development to what type of code does copyright apply?
boiler-platecode.
open-source code.
standard library code.
code generated specifically for the customer.
19. When should a contract for bespoke software development specify surcharges for the customer?
for a solution expected to operate across multiple territories.
for customers who want to lease software to other users.
for when the customer pays in a foreign currency (e.g. US dollars).
for when the customer changes requirements.
20. In terms of bespoke software development, what responsibility does a customer have in a contract-hire contract?
management of supplied staff.
any associated legal cost of supplied staff.
private healthcare for all supplied staff.
ensuring the correct competences of supplied staff.
Submit Quiz