ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.

Slides:



Advertisements
Similar presentations
By Andy Scott, Michael Murray and Adam Kanopa
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Legal Implications relating to Computing Science Data Protection Act Computer Misuse Act Copyright, Designs and Patents Act Communications Act Health and.
1 Louisiana Department of Health and Hospitals Basic HIPAA Privacy Training: Policies and Procedures 01/09/
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
1.9 The Legal Framework In this section you must be able to:
Higher Administration and IT Administrative Practices.
Legalities of ICT Chapter 7.
Health and Safety Legislation
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
Marketing - Best Practice from a Legal Point of View Yvonne Cunnane - Information Technology Law Group 30 November 2006.
Issues Raised by ICT.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
General Purpose Packages
I.C.T laws By Luke Honeyfield 12. Laws relating to I.C.T  Copyright, Design, Patents  Data protection ACT  Computer misuse ACT  Health and safety.
G041: Lecture 16 Section B Revision Questions
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Regulation of Personal Information Sally Brierley & Emma Harvey.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Data protection and European citizens’ initiatives
Legal Implications You need to know about the following:
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Health and Safety. Positive effects of ICT on physical health and mental well being Friendship using social networking Easy to keep contact with friends.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Implementation of legislation (Chapter 47) By Haley Court.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Legal Implications 1 Computing Science and the Law V2 Data Protection Act Computer Misuse Act Copyright, Designs and Patents Act Communications Act Health.
Data Protection GCSE ICT Mrs N Steventon-2005.
PowerPoint presentation
Data Protection Act and Other Laws
Legislation in ICT.
Data Protection Act and Computer Misuse Act ANSWERS.
Social Issues in Computing
Social Issues in Computing
Legislation in ICT.
How it affects policies and procedures
Communicating in the IT Industry
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.

ICT, Communication & related Legislations. Communication is increasingly using I.T. What problems can arise from this process? Stolen identities, Financial irregularities (doctoring information), Confidential Health data being shared, Criminal & fraudulent activities – including industrial sabotage/espionage, ‘hacking’, Misuse & abusive use of IT.

ICT, Communication & related Legislations. The right to data privacy is heavily regulated and rigidly enforced in Europe. ‘Article 8’ of the European Convention of Human Rights provides a right to respect for one's "private and family life, his home and his correspondence", subject to certain restrictions. (SOURCE: ECHR) The Data Protection Act 1998 – oversees this right, or does it!?! Image:

ICT, Communication & related Legislations. The Data Protection Act 1998, the basic way it works is – Setting up rules that people have to follow Having an Information Commissioner to enforce the rules It does not stop companies storing information about people, it just makes them follow rules i.e. how they store, distribute & share information.

ICT, Communication & related Legislations. The Computer Misuse Act 1990, protects against – Anyone who causes a computer to perform any function with intent to secure access to any program or data (private/personal nature) held in a computer, Access which someone intends to secure is unauthorised, Hacking to include extortion, bribery, theft, fraud, Deliberately inducing ‘viruses.’

ICT, Communication & related Legislations. The Display Screen Regulations 1992, enforce the health & safety issues surrounding the use of IT – Companies must provide adequate training & information, Proper breaks or changes in activities, Suitable workstations i.e. correct furniture & accessories, Eye tests should employees request them, Adequate lighting

ICT, Communication & related Legislations. What about this one! – The Privacy and Electronic Communications (EC Directive) Regulations 2003, is a law in the UK which made it unlawful, amongst other things, to transmit an automated recorded message for direct marketing purposes via a telephone, without prior consent of the subscriber.

ICT, Communication & related Legislations. Images taken: Should of gone to Specsavers!

ICT, Communication & related Legislations. The Software Copyright Law, enforces the laws surrounding use of software i.e. – you do not have the right to give a copy to a friend, you cannot make a copy of a CD with a CD writer and then sell it, you cannot use the software on a network unless the licence allows it, you cannot rent out the software without the permission of the copyright holder.