Computer Science AS OCR
-
1-1-structure-and-function-of-the-processor as5 主题
-
1-2-types-of-processor as3 主题
-
1-3-input-output-and-storage as2 主题
-
2-1-systems-software as8 主题
-
2-3-software-development as5 主题
-
2-4-types-of-programming-language as4 主题
-
3-1-compression-encryption-and-hashing as3 主题
-
3-2-databases as3 主题
-
3-3-networks as8 主题
-
3-4-web-technologies as13 主题
-
html as
-
css as
-
css-styling as
-
javascript as
-
variables-and-constants-in-javascript as
-
outputs-in-javascript as
-
selection-in-javascript- as
-
for-loops-in-javascript- as
-
while-loops-in-javascript- as
-
strings-in-javascript- as
-
operators-in-javascript- as
-
nested-statements-in-javascript as
-
functions-and-procedures-in-javascript as
-
html as
-
4-1-data-types as8 主题
-
4-2-data-structures as4 主题
-
4-3-boolean-algebra as1 主题
-
5-1-computing-related-legislation as4 主题
-
5-2-moral-and-ethical-issues as9 主题
-
6-1-thinking-abstractly as3 主题
-
6-2-thinking-ahead as1 主题
-
6-3-thinking-procedurally as3 主题
-
6-4-thinking-logically as2 主题
-
6-5-thinking-concurrently as2 主题
-
7-1-programming-techniques as9 主题
-
8-1-standard-algorithms-and-big-o-notation as8 主题
the-regulation-of-investigatory-powers-act-2000 as
Exam code:H046
The Regulation of Investigatory Powers Act 2000
What is the Regulation of Investigatory Powers?
-
The Regulation of Investigatory Powers Act (RIPA) legislates as to how organisations can monitor electronic communications
-
The RIPA covers investigation, surveillance and interception of communication by public bodies
-
E.g. MI6 can legally wiretap online conversations in the interests of national security provided that a warrant has been issued
-
-
Certain actions require government approval
-
Different organisations have different limits on what they can do (GCHQ is amongst those that have most freedom)
-
The Act enforces internet service providers (ISPs) and mobile phone companies to give up information on request from an authorised authority and to ensure that their networks have sufficient hardware installed to facilitate surveillance about a person
-
This Act is particularly controversial as its powers also extend to small agencies like local councils
-
Some people feel that the Act is an invasion of privacy or that it is used improperly
-
There have been examples of this Act being used for reasons other than monitoring criminal or terrorist activities including monitoring cockle fisherman, fly tippers, and even a family to work out whether they lived in the catchment area of a local school
Rights & impact on organisations
-
With the increase in criminal and terrorist activities on the internet this act allows the Police and other public bodies to:
-
Demand ISPs to provide access to a customer’s communications
-
This means that ISPs have to implement hardware and software which facilitates the surveillance of digital communications
-
-
Allows mass surveillance of communications
-
Demands access to be granted to protected information
-
Businesses have to provide access to digital communications or data when asked for
-
They have to implement hardware and software solutions that facilitates the storage of digital communications
-
-
Allowing monitoring of an individual’s internet activities
-
Prevents the existence of such interception activities being revealed in court
-
Case Study
British Councils used RIPA to secretly spy on public (External link to (opens in a new tab)theguardian.com (opens in a new tab)) (opens in a new tab)
-
In 2016 an investigation was completed after councils were given permission to carry out more than 55,000 days of covert surveillance over 5 years which included people walking dogs, feeding pigeons and fly-tipping
-
A freedom of information request has found that 186 local authorities, two-thirds of those that responded, used RIPA to gather evidence by secret listening devices, cameras and private detectives
Examiner Tips and Tricks
-
When you are asked to describe the RIPA you need to specify the technical terms “surveillance” and “communication” and don’t generalise them
-
Surveillance is the use of technology to gather information on people, and the communication is done electronically
Responses