Legal Implications relating to Computing Science Data Protection Act Computer Misuse Act Copyright, Designs and Patents Act Communications Act Health and.

Slides:



Advertisements
Similar presentations
Health and Safety and the use of ICT systems AQA Unit 1 Section 1 tcowling 2009 based on Mott, Leaming & Williams.
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
Higher Administration and IT Administrative Practices.
Health and Safety The risks involved in working with ICT © Folens 2008.
Legislation Who governs e-commerce?. E-commerce is regulated by laws and guidelines. These aim to ensure that sites operate effectively and that online.
Health and Safety Legislation
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
Issues Raised by ICT.
Administrative Practices Outcome 1
General Purpose Packages
1 AQA ICT AS Level © Nelson Thornes 2008 Display screen equipment regulations Health and Safety.
COMPUTER RELATED HEALTH PROBLEMS
 The objectives of the Regulations are to improve working conditions at DSE by providing ergonomic solutions, to enable certain regular users of the.
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
Computers, the law and ethics  Lesson Objective: Understand some of the legal & ethical issues in developing computer systems  Learning Outcome: Know.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
Accommodation & Hospitality Services STAFF BRIEFING – No 20 Workstations & Ergonomics.
G061 - ICT Health Problems. Learning objectives: By the end of this topic you should be able to: describe health problems related to working with ICT.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
AQA ICT for AS © Hodder Education 2008 Chapter 1 Health and safety in relation to the use of ICT systems.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
Information Systems Unit 3.
Data Protection Act (1998).
Legal Implications You need to know about the following:
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Laws related to ICT   There are 4 laws that you might be asked about in the exams: Health & Safety at Work Act The Computer Misuse Act 1990 The Copyright,
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Computing, Ethics and The Law
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Coleg Gwent Ergonomics. Coleg Gwent What does it mean?
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Legal Implications 1 Computing Science and the Law V2 Data Protection Act Computer Misuse Act Copyright, Designs and Patents Act Communications Act Health.
  What is the purpose of the ‘copyright, designs and patents’ act? Name two ways computer users could breach the ‘copyright, designs and patents’ act?
The Data Protection Act 1998
PowerPoint presentation
Data Protection Act and Other Laws
Legislation in ICT.
Data Protection Act.
ERGONOMICS and HEALTH & SAFETY
The Data Protection Act 1998
Legislation in ICT.
How it affects policies and procedures
Presentation transcript:

Legal Implications relating to Computing Science Data Protection Act Computer Misuse Act Copyright, Designs and Patents Act Communications Act Health and Safety Regulations 1 Computing Science and the Law V1

Data Protection Act The data protection Act was first introduced to protect the rights of anybody who has their personal information stored on a computer system. Within the act: Data Subjects are the people who data is stored. Data Users are the companies or organisations (clubs, charities etc) who are using the subjects’ data. Information Commissioner is a government appointed individual who maintains a list of who is storing what data. All companies who store personal data must register with the Information Commissioner's Office. Computing Science and the Law V1

3 Data Protection Act 1988 The 8 principles of the Data Protection Act are: 1. Data is processed fairly and lawfully This requires that data is not used for any criminal activity such as fraud, identification theft etc. 2. Data is obtained for specified and lawful purposes Subjects must be assured that data users have legitimate grounds for collecting and using the personal data and only collect relevant data. 3. Data stored is adequate, relevant and not excessive Customers must be assured that you hold personal data about them that is sufficient for the purpose you are holding it for in relation to that individual. 4. Data is always accurate and up to date. Subjects must be assured that their data is accurately stored as inaccuracies could affect them negatively. For example a wrongly recorded debt could lead to a poor credit rating and a loan being refused. Computing Science and the Law V1

4 Data Protection Act Data is not kept any longer than necessary Subjects data is deleted or removed after it has not been used for a set period of time. For example a survey that collects personal data would have to delete the original data once the survey is complete. 6. Data is processed in accordance with the data subject’s rights Customers have a right of access to a copy of the information comprised in their personal data (although data users are allowed to charge a small administration fee for this service) 7. Data is securely stored Data users must insure that data is held in a secure location, with security in place to prevent access by unauthorised personnel. 8.Data is not transferred to another country without similar data protection legislation. Data users must be assured that their data will not be passed to countries without adequate security in place to meet the principles of the UK’s data protection laws. The 8 principles of the Data Protection Act are: Computing Science and the Law V1

Data Protection Act Exemptions from the Act All companies have to comply with the above regulations except the Police and Security Services, such as MI5. These organisations are exempt from the Act. Computing Science and the Law V1 Clip 1 The Lights are On Clip 2 What you Need to Know

Computer Misuse Act This legislation makes it illegal to misuse computers to perform the following actions: 1. Unauthorised access to computer material Commonly known as ‘hacking’, the act of using software and hardware to access data without permission is made illegal by the Computer Misuse Act. Hackers often delete, steal or alter the data they access but by then the crime has already been committed as they have already gained access to the data unlawfully. 2. Unauthorised access with intent to commit or facilitate commission of further offences The act states that if the hacker access protected data so that they can use they data for illegal purposes (selling data on, fraud, bribery etc) they may also be charged under the act. 3. Unauthorised acts with intent to impair the operation of computer There may be several examples of how this part of the law could be broken: Deliberately crashing a website by overloading the host server (DOS attacks). Deliberately spreading viruses (not creating a virus does not break the law). Computing Science and the Law V1

Copyright, Designs and Patents Act The Copyright, Designs and Patents Act 1988, is the current UK copyright law. It gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used. The rights cover: Broadcast and public performance, copying, adapting, issuing, renting and lending copies to the public. In many cases, the creator will also have the right to be identified as the author and to object to distortions of his work. Under copyright law it is illegal to 1.Make or sell unauthorised copies of software 2.Possess pirate software for your own use 3.If you are a company to knowingly use software you have not paid for Computing Science and the Law V1

Offences related to Computing Science are listed below: 1 Dishonestly obtaining electronic communications services Using someone’s Internet services (usually Wi-Fi) without permission. This is an offence as the perpetrator is stealing a service that another user is paying for. Cloning a mobile phone. This involves copying the phone’s SIM card. The copy is then inserted into another phone. The owner of the original SIM will subsequently end up paying the bill for both phones. Often cloned phones are sold to people who wish to make international calls so the bills may be huge. 2 Possession of equipment used to dishonestly obtain communications services: Examples of this could be owning software using to illegally connect to password protected Wi-Fi hotspot or owning hardware used to copy phone SIMs. 3 Improper use of a public electronic communications network: Sending a message grossly offensive, indecent, obscene or menacing nature. This could apply to an , text message or even a social network post. Sending a message that is deliberately designed for the purpose of causing annoyance, inconvenience or needless anxiety to another. Communications Act This act deals with abuses of telecommunication (phonelines, Wi-Fi, mobile phone network), television, broadcasting and postal services. Computing Science and the Law V1

Now attempt Task 8 Legal Implications on page 29 9 Computing Science and the Law V1

Health & Safety Regulations Computing Science and the Law V1 10 Employers have a responsibility to ensure that computer users can safely use a computer system without a detrimental affect on their health. These responsibilities include: Monitors - Providing workstation users with tilt and swivel, anti-glare monitors to avoid eye and neck strain. Keyboards - Providing workstation users with adjustable keyboards with clearly defined characters and enough space in front to provide wrist support. Chairs - Providing workstation users with fully adjustable chairs to allow users to sit comfortably to prevent back strain. Environment - Providing an environment which has appropriate desk space, is spacious enough and has appropriate lighting to avoid eye strain.

Health & Safety Regulations Computing Science and the Law V1 11 The law relating to health and safety issues for work with computers is contained in the Health and Safety (Display Screen Equipment) Regulations In addition to providing a healthy working environment, employers are also responsible for: Conducting a risk assessment (measuring length of time at workstations, assessing equipment use). Providing free eye exams for staff who continually use computer systems. Providing training in correct computer use (posture, positioning of equipment, the importance of regular short breaks, how to use a mouse)

Health & Safety Regulations Computing Science and the Law V1 12 Health problems associated with working with computers include: Repetitive strain injury (RSI) Pain from muscles, nerves and tendons caused by repetitive movement and overuse. The condition mostly affects parts of the upper body, such as the forearm, elbow, wrist, hands, neck and shoulders, and may also cause stiffness and swelling. Eye strain Eye strain is a condition that manifests itself through symptoms such as fatigue, pain in or around the eyes, blurred vision, headache and occasional double vision. Symptoms often occur after reading, computer work, or other close activities that involve tedious visual tasks. Back pain These problems relate to users being crouched and hunched towards the monitors and computer components due to the design and positioning of these peripherals. This can cause severe and acute pain in the upper back, particularly pain in the neck and or shoulders. Computer Related Stress Symptoms of stress caused by computer use include getting tight shoulders whilst sat at the computer, having a fuzzy and unclear mind (not able to think clearly) and getting angry at computer crashing or losing your data.