Computer-Science-A-level-Ocr
-
3-3-networks8 主题
-
3-2-databases7 主题
-
3-1-compression-encryption-and-hashing4 主题
-
2-5-object-oriented-languages7 主题
-
2-4-types-of-programming-language4 主题
-
2-3-software-development5 主题
-
2-2-applications-generation6 主题
-
2-1-systems-software8 主题
-
1-3-input-output-and-storage2 主题
-
1-2-types-of-processor3 主题
-
1-1-structure-and-function-of-the-processor1 主题
-
structuring-your-responses3 主题
-
the-exam-papers2 主题
-
8-2-algorithms-for-the-main-data-structures4 主题
-
8-1-algorithms10 主题
-
7-2-computational-methods11 主题
-
7-1-programming-techniques14 主题
-
capturing-selecting-managing-and-exchanging-data
-
entity-relationship-diagrams
-
data-normalisation
-
relational-databases
-
hashing
-
symmetric-vs-asymmetric-encryption
-
run-length-encoding-and-dictionary-coding
-
lossy-and-lossless-compression
-
polymorphism-oop
-
encapsulation-oop
-
inheritance-oop
-
attributes-oop
-
methods-oop
-
objects-oop
-
capturing-selecting-managing-and-exchanging-data
-
6-5-thinking-concurrently2 主题
-
6-4-thinking-logically2 主题
-
6-3-thinking-procedurally3 主题
-
6-2-thinking-ahead1 主题
-
6-1-thinking-abstractly3 主题
-
5-2-moral-and-ethical-issues9 主题
-
5-1-computing-related-legislation4 主题
-
4-3-boolean-algebra5 主题
-
4-2-data-structures10 主题
-
4-1-data-types9 主题
-
3-4-web-technologies16 主题
-
environmental-effects
-
automated-decision-making
-
computers-in-the-workforce
-
layout-colour-paradigms-and-character-sets
-
piracy-and-offensive-communications
-
analysing-personal-information
-
monitoring-behaviour
-
censorship-and-the-internet
-
artificial-intelligence
-
the-regulation-of-investigatory-powers-act-2000
-
the-copyright-design-and-patents-act-1988
-
the-computer-misuse-act-1990
-
the-data-protection-act-1998
-
adder-circuits
-
flip-flop-circuits
-
simplifying-boolean-algebra
-
environmental-effects
the-regulation-of-investigatory-powers-act-2000
The Regulation of Investigatory Powers Act 2000
What is the Regulation of Investigatory Powers?
-
The Regulation of Investigatory Powers Act (RIPA) legislates as to how organisations can monitor electronic communications
-
The RIPA covers investigation, surveillance and interception of communication by public bodies
-
E.g. MI6 can legally wiretap online conversations in the interests of national security provided that a warrant has been issued
-
-
Certain actions require government approval
-
Different organisations have different limits on what they can do (GCHQ is amongst those that have most freedom)
-
The Act enforces internet service providers (ISPs) and mobile phone companies to give up information on request from an authorised authority and to ensure that their networks have sufficient hardware installed to facilitate surveillance about a person
-
This Act is particularly controversial as its powers also extend to small agencies like local councils
-
Some people feel that the Act is an invasion of privacy or that it is used improperly
-
There have been examples of this Act being used for reasons other than monitoring criminal or terrorist activities including monitoring cockle fisherman, fly tippers, and even a family to work out whether they lived in the catchment area of a local school
Rights & impact on organisations
-
With the increase in criminal and terrorist activities on the internet this act allows the Police and other public bodies to:
-
Demand ISPs to provide access to a customer’s communications
-
This means that ISPs have to implement hardware and software which facilitates the surveillance of digital communications
-
-
Allows mass surveillance of communications
-
Demands access to be granted to protected information
-
Businesses have to provide access to digital communications or data when asked for
-
They have to implement hardware and software solutions that facilitates the storage of digital communications
-
-
Allowing monitoring of an individual’s internet activities
-
Prevents the existence of such interception activities being revealed in court
-
Case Study
British Councils used RIPA to secretly spy on public (External link to (opens in a new tab)theguardian.com (opens in a new tab)) (opens in a new tab)
-
In 2016 an investigation was completed after councils were given permission to carry out more than 55,000 days of covert surveillance over 5 years which included people walking dogs, feeding pigeons and fly-tipping
-
A freedom of information request has found that 186 local authorities, two-thirds of those that responded, used RIPA to gather evidence by secret listening devices, cameras and private detectives
Examiner Tips and Tricks
-
When you are asked to describe the RIPA you need to specify the technical terms “surveillance” and “communication” and don’t generalise them
-
Surveillance is the use of technology to gather information on people, and the communication is done electronically
Responses