Legal and ethical issues

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Ways in Which Information Can Be Misused. In this information age in which we live information is a precious and powerful commodity Unfortunately it can.
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 6. Using Networks 1 Network Hardware - Hub Hub - A hub is used when you have.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Legislation in ICT.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
Copyright Infringement
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Company LOGO Software Piracy Software Piracy Software Pirate Gets 7 Years in Prison Cannelle Cuvelier.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Copyright, Designs and Patent Act.  Software copyright is protected by law for 50 years after it is published  It also includes data stored on computer.
Electronic Piracy Your Name Here. What is Copyright? Visit ector=piracy_online_the_law Define copyright.
The Legal Framework Can you work out which slide each bullet point should go on?!
Issues Raised by ICT.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
IS Lecture 10 Legal Control of Computer Crime Information Management and Computer Security, 3, 2, 13-19, 1995.
Crime & Malpractice AS Module Heathcote Ch. 10.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.
CAN I GET IN TROUBLE USING A... COMPUTER? Or do computers solve all of life’s problems?
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
Unit Essential Question: How does ethical behavior affect how and why I do things on the computer?
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Software Piracy By: B. Kaniecki.
Laws Jamie Dunn.
Computer Ethics. Computer Virus  A Virus is a computer program written to alter the way a computer operates, without the permission or knowledge of the.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Health and Safety. Positive effects of ICT on physical health and mental well being Friendship using social networking Easy to keep contact with friends.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Cyber Law And Ethics And Ethics.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
SOFTWARE PIRACY & WORKPLACE ETHICS. What Is Software Piracy? Unauthorized copying/installation/use Unauthorized distribution or sale.
The Copyright, Designs and Patents Act 1988
Data Protection Act and Other Laws
The Computer Misuse Act 1990
Legislation in ICT.
Chapter 11 crime and security in the networked economy
Five Unethical Uses of Computers
BCT 2.00 Analyze Technology Issues
Data Protection Act and Computer Misuse Act ANSWERS.
Societal Issues in Computing (COMP466)
Copyright, Designs and Patents Act 1988
Ethical, Legal, Cultural and Environmental Concerns
Social Issues in Computing
Social Issues in Computing
Legislation in ICT.
Ethical Use of Computers
Presentation transcript:

Legal and ethical issues The Computer Misuse Act 1990 and copyright issues

The Computer Misuse Act 1990 Deals with misuses of ICT systems

Computer Misuse Act 1990 Makes it an offence to: deliberately plant or transfer viruses use ICT equipment for unauthorized work illegally copy computer programs hack into a computer system to view or alter data use computers to commit fraud

Problems with prosecutions under the Act Need to prove intent, which is difficult. Companies are reluctant to bring in the police owing to possible bad publicity and loss of business.

Copyright issues Software is easy to copy. It is easy to transfer files from one country to another over the Internet. Many people do not see copying software as theft.

Software piracy Illegal copying of software or data: 27% of all software used in UK is pirated. Pirated software is sold at car boot sales, computer fairs and on eBay. Pirated software deprives the owners of software of billions of pounds in revenue.

Problems with illegally copied software It may contain viruses. No technical support is available. It does not qualify for upgrades. Software may not be complete. Above all you are committing a crime.

Copyright, Designs and Patents Act 1988 Makes it a criminal offence to: copy or distribute software or manuals without permission or licence from the copyright owner run more versions of software than the software licence allows force employees to make or distribute software