Professional Skills & Issues (H) - 2017 Exam
1. In EU law, an Internet service provider (ISP) in the UK is
not
liable for damages or criminal sanctions when transmitting data, under what circumstances?
the ISP acts as a mere conduit and simply transmits data up/downloaded by the customer.
the ISP uses caching to speed up downloading of future data by temporarily storing downloaded data.
the ISP hosts data by permanently storing data uploaded by its customers.
the ISP only transmits data to systems outside the UK.
2. What is the primary purpose of the Internet Watch Foundation (IWF)?
offers legal advice to parents in the UK seeking damages against Internet service providers.
minimise the availability of potentially unlawful content on the Internet.
dictates UK government policy on inoffensive Internet content.
defends UK corporations from legal action regarding Internet content.
3. In Europe, when is adult pornography usually deemed lawful?
when it is non-violent, consensual and inaccessible to minors.
when it is accessible to all European citizens.
when it is not disrespectful to religious beliefs.
when it takes the form of free speech.
4. In EU law, when is unsolicited email considered lawful?
when the email address of the sender is not visible.
when prior consent has been sought.
when the email address of the receiver is not visible.
when prior consent has been obtained.
5. In UK law, what is the basic principle of freedom of information?
that the information held by public bodies and private companies should always be available to the public.
that the information held by public bodies and private companies should be available to the public with certain exceptions.
that the information held by public bodies should be available to the public with certain exceptions.
that the information held by public bodies should always be available to the public.
6. In UK law, under what circumstances may personal data be transferred to a country or territory outside the European Economic Area (EEA)?
it may be permitted, if the country or territory have a specific trade agreement with the EU.
it may be permitted, if the consent of the data subject is obtained prior to transfer of data.
it may be permitted, if the country or territory ensure adequate levels of protection for the rights and freedoms of data subjects.
it is not permitted under any circumstances.
7. In UK law, when is processing sensitive data lawful?
when the data subject grants explicit consent.
when the data subject has not stated they would not grant consent.
when explicit consent is sought from the data subject.
when the data subject is a UK citizen and is at least 15 years old.
8. In UK law, what is personal data?
data that relates to any person, dead or alive.
data that any individual considers personal.
data that is unique to an individual, e.g. genetic information.
data that relates to a living person who can be identified.
9. In UK law, which of the following is usually
not
an offence under the Computer Misuse Act 1990 (CMA)?
accessing pornography on work-place devices.
stealing commercially sensitive data
stealing sensitive personal data (e.g., for publication or blackmail)
intentionally spreading a virus or worm
10. In US law, which of the following is usually
not
an offence under the Computer Fraud and Abuse Act (CFAA)?
denial-of-service attacks
unauthorised access to any "protected computer"
selling a physical textbook bought in the UK to a US customer through the Internet.
trafficking in passwords.
11. In UK law, who does the Computer Misuse Act 1990 (CMA) apply to in the following circumstances?
anyone, anywhere, who unlawfully accesses a computer anywhere in the world.
anyone, anywhere, who unlawfully accesses a computer in the United Kingdom.
only UK citizens who unlawfully access a computer in the UK.
only EU citizens who unlawfully access a computer in the UK.
12. In UK law, what amendment did the Police and Justice Act 2006 (PJA)
not
introduce to the Computer Misuse Act 1990 (CMA)?
building or selling hackers’ toolkits.
intent to impair operation of any computer.
using Facebook and Twitter to share abusive statements.
denial-of-service attacks.
13. In UK law, under what circumstances may whistle blowers
not
be protected under the Public Interest Disclosure Act 1998 (PIDA)?
when they expose dangers to health and safety caused by employer.
when they expose failure of employer to comply with legal obligations.
when they approach the media, prior to the employer.
when they expose environmental damage caused by employer.
14. In UK law, what may
not
be permitted for license holders under the Copyright, Design and Patents Act 1988 (CDPA)?
decompiling a program to fix bugs.
decompiling a program to understand how to write another program to inter-operate with it.
installing a program on multiple machines.
making one backup copy of a program.
15. In UK law, under what circumstances may it be permitted for employees to override an obligation of confidence?
expose excessive earnings in the public interest.
expose failure to comply with legal obligations in the public interest.
expose lawful business practices in the public interest.
expose private conversations with customers in the public interest.
16. What is considered cyber-squatting?
registering a trademark as your domain name and refusing to sell it to another individual at any price.
duplicating a website and hosting under another domain name.
maliciously redirecting individuals to another domain name.
registering a trade mark as your own domain name and selling it to the trade mark owner at an inflated price.
17. A cost-plus contract expects customers to pay supplier’s actual costs and what else?
all associated legal fees.
an appropriate profit margin.
an enduring annual license fee.
integration costs with existing customer systems.
18. In terms of bespoke software development to what type of code does copyright apply?
boiler-platecode.
standard library code.
code generated specifically for the customer.
open-source code.
19. When should a contract for bespoke software development specify surcharges for the customer?
for a solution expected to operate across multiple territories.
for when the customer pays in a foreign currency (e.g. US dollars).
for customers who want to lease software to other users.
for when the customer changes requirements.
20. In terms of bespoke software development, what responsibility does a customer have in a contract-hire contract?
ensuring the correct competences of supplied staff.
any associated legal cost of supplied staff.
private healthcare for all supplied staff.
management of supplied staff.
Submit Quiz