ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.

Slides:



Advertisements
Similar presentations
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Advertisements

Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Legislation in ICT.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Copyright, Designs and Patents Act. Introduction You have spent three months working on your coursework. It is absolutely brilliant,, you just know that.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
Data Protection Overview
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
General Purpose Packages
Copyright, Designs and Patents Act 1988
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
L, E & P ISSUES1 Follow up on PSP: The PSP is about QUALITY - numerous measures are used - with the obvious commitments to data collection. One of the.
The Data Protection Act 1998 The Eight Principles.
© Copyright © A Quick Guide. What does the law actually say? Introduced to protect people who have created original pieces of work. Books, Music, Films,
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Data Protection Act AS Module Heathcote Ch. 12.
The Four Laws relating to ICT Health and safety Data protection act Copyright Computer misuse act By Marcus Ellis.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
Introduction Data protection is relevant to every individual, business or organisation today, not just Local Government. As well as protecting privacy,
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
Laws related to ICT   There are 4 laws that you might be asked about in the exams: Health & Safety at Work Act The Computer Misuse Act 1990 The Copyright,
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
In your pairs What is your law? Why is it important to have the law? How was law broken? Give examples of how to avoid being prosecuted under the law or.
DATA PROTECTION ACT (DPA). WHAT IS THE DATA PROTECTION ACT?  The Data Protection Act The Data Protection Act (DPA) gives individuals the right.
Copyright. What is Copyright? Copyright is a form of legal protection for the creator of a piece of work. It gives the creator (an author, composer, artist,
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
The Data Protection Act 1998
The Data Protection Act 1998
Learning Intention Legislations impact on security of information
Legal and ethical issues
Handout 2: Data Protection and Copyright
Legislation in ICT.
Data Protection Act.
The Data Protection Act 1998
Data Protection Legislation
Understanding the issues related to the use of information
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
Copyright, Designs and Patents Act 1988
Legislation in ICT.
Copyright, Design and Patents Act (1988)
Presentation transcript:

ICT and the Law You need to know about 3 laws covering the use and misuse of ICT

You need to know about: The Data Protection Act The Copyright Act The Computer Misuse Act

The principles of Data Protection Everyone has the ‘right to privacy’ (i.e. no one wants to have their personal details - medical, financial, educational, political - available to anyone). Because computerised databases often hold such data about people, they have to be protected from misuse.

What is personal data? Personal data covers both facts and opinions about the individual. It also includes information regarding the intentions of the data controller towards the individual, although in some limited circumstances exemptions will apply. With processing, the definition is far wider than before. For example, it incorporates the concepts of 'obtaining', holding' and 'disclosing'.

What is sensitive personal data? Sensitive personal data may not – in normal circumstances – be disclosed. It includes: – Information about a subject’s racial or ethnic origins. – Information about a subject’s religious or political beliefs. – Information about a subject’s physical or mental health. – Information about a subject’s criminal record or allegations of criminal activity.

The eight Principles of Data Protection – Data must be: 1.Fairly and lawfully processed. 2.Processed for limited purposes. 3.Adequate, relevant and not excessive. 4.Accurate. 5.Not kept longer than necessary. 6.Processed in accordance with the data subject's rights. 7.Secure. 8.Not transferred to countries without adequate protection.

The Data Protection Act The eight principles are enforced in the UK by Act of Parliament. This is the DATA PROTECTION ACT (1998). They also form part of the FREEDOM OF INFORMATION ACT (2000). The person in charge of making sure that both Acts are enforced is the INFORMATION REGISTRAR (formerly the DATA PROTECTION REGISTRAR).

A person’s rights under the Data Protection Act Everyone has the right to see any personal details held on a computer or paper-based data system. Everyone also has the right to see a description of the data that is held about them. Everyone also has the right to know why data is about them is held. A person can request a copy of this information.

A person’s rights under the Data Protection Act There are exceptions to this. These include: – Information that can prevent or help detect a crime. – Information that can be used to catch or prosecute offenders. – Information relating to the collection of taxes and duties (e.g. Income Tax, VAT). – Certain medical or social workers reports.

What to do now Log into Moodle>ICT>GCSE>Unit 1>Home Networks>Data Protection Act questions Answer and print You will need to use this link: ict.com/gcse_new/legal/dpa/miniweb/

Software piracy One of the most lucrative examples of computer crime is software piracy. This is the illegal copying of computer programs, and it is very widespread. It is estimated that over 66% of the computer software used in Europe is illegal.

Copyright, Design and Patents Act Aims to protect the creators of original pieces work including authors of books, film makers, composers and music artists, computer game designer, software designers. Gives them exclusive rights regarding that work for a certain period time. This includes the publication, distribution and adaptation of the work.

Why was it brought it? It ensures people are rewarded for their work eg artists receive payment for legal downloads which they would not if music/films etc were illegally downloaded or copied It protects them if someone steals or copies their work and gives them a legal case against the theft Allows prosecution to take place

What does it cover? Copying or downloading music Copying images or photographs Copying computer games Copying text from web pages and using it in your own work You should acknowledge your sources and credit the owner/creator! Changing something doesn’t make it your own! Copyright, Designs and Patents Act (1989)

Software crime The Copyright Act makes it a criminal offence to copy or steal software. This includes: – Copying or distributing software or manuals without the permission of the copyright owner (usually the software developer). – Using purchased software covered by copyright on more than one computer unless this is permitted by the software licence. – Encouraging or allowing people to copy or distribute illegal copies of software

Copyright, Designs and Patents Act (1989) A person guilty of an offence under this act may be sent to prison for up to ten years and be fined!

Creative Commons License The Creative Commons copyright licenses have been developed to balance the “all rights reserved” copyright law. They allow everyone from individual creators to large companies and institutions a way to grant copyright permissions to their creative work to other people such as you and me without infringing the copyright law. There are different levels of license depending on what the creator is willing to allow you to do. For example: If you see this symbol: This license lets others distribute, remix, tweak, and build upon your work, even commercially, as long as they credit you for the original creation. This is the most accommodating of licenses offered.

Computer Misuse Act (1990) Before 1990, there was no legislation to deal with the problem of hacking into a computer system, but with the increase in this problem and the need to deal with hackers, the Computer Misuse Act was passed in This act deals with: – Unauthorised access to a computer/computer material – Deliberately infecting a computer system with a virus/Trojan. – Using a computer to commit software piracy. – Using a computer to hack into another computer. – Using a computer to commit a fraud.

Penalties and problems A lot of people claim they “did not mean to” when they are accused of hacking and it is difficult to prove intent which makes prosecution difficult. Penalties range from up to 6 months to up to 5 years in prison, and up to an unlimited fine.

What to do now For the next 2 lessons: Produce a fact sheet/presentation/document of your own choice about the Copyright Act and Computer Misuse Act. Could cover both in the same document or do separately. Explain the Creative Commons License agreemnt Print when finished so you can revise from it. Final lesson on the Law an ICT (all on Moodle) Starter: Decide which law applies to each scenario Test Yourself ICT and Legal Issues Questions

Slide Title Make Effective Presentations Using Awesome Backgrounds Engage your Audience Capture Audience Attention