Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,

Slides:



Advertisements
Similar presentations
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Advertisements

Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
Data Protection Act Description The Data Protection Act controls how your personal information can be used and protects from the misuse of your.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Overview
The Data Protection Act
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
1 AQA ICT AS Level © Nelson Thornes Data Protection Act.
General Purpose Packages
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
Processing personal health data: the regulator’s perspective Ken Macdonald Assistant Commissioner Information Commissioner’s Office.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Data Protection Act What the Act covers The misuse of personal data by organisations and businesses.
THE DATA PROTECTION ACT Data Protection Act 1998 DPA 1. Reasons2. People3. Principles 4. Exemptions 4 key points you need to learn/understand/revise.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Data Protection Act The Data Protection Act (DPA) is a balance between rights of the DATA SUBJECT and obligations of the DATA CONTROLLER DATA CONTROLLER.
Information Systems Unit 3.
Data Protection Act (1998).
Legal Implications You need to know about the following:
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Laws related to ICT   There are 4 laws that you might be asked about in the exams: Health & Safety at Work Act The Computer Misuse Act 1990 The Copyright,
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
In your pairs What is your law? Why is it important to have the law? How was law broken? Give examples of how to avoid being prosecuted under the law or.
DATA PROTECTION ACT (DPA). WHAT IS THE DATA PROTECTION ACT?  The Data Protection Act The Data Protection Act (DPA) gives individuals the right.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
1 AQA ICT AS Level © Nelson Thornes Safety and security Chip and Pin.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
The Data Protection Act 1998
The Data Protection Act 1998
Learning Intention Legislations impact on security of information
Data Protection GCSE ICT Mrs N Steventon-2005.
Handout 2: Data Protection and Copyright
Legislation in ICT.
Data Protection Act.
The Data Protection Act 1998
Understanding the issues related to the use of information
Legal and Ethical Issues
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
Copyright, Design and Patents Act (1988)
Presentation transcript:

Legislation & ICT By Savannah Inkster

By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright, Design & Patents ActCopyright, Design & Patents Act

By Savannah Data Protection Act Why is it needed? To protect personal information held on computers & paper.

By Savannah Data Protection Act Terminology Information Commissioner is the person who enforces the Data Protection Act and has permission to collect and store personal data. Data subject is the person that the data is being collected from or stored about. Data Controller decides what data the organisation needs to collect and what it will be used for and is the person who must apply for permission to collect and store data in the first place. Data User is any person who needs to access or use the data as part of their job e.g. doctor or secretary. Personal Data is any data about a person e.g. name or details of driving offences.

By Savannah 8 Principles of the DPA 1.Personal data should be obtained and processed fairly and lawfully 2.Personal data can be held only for specified and lawful purposes 3.Personal data should be adequate, relevant and not excessive for the required purpose 4.Personal data should be accurate and kept up-to-date 5.Personal data should not be kept for longer than is necessary 6.Data must be processed in accordance with the rights of the data subject 7.Appropriate security measures must be taken against unauthorised access 8.Personal data cannot be transferred to countries outside the E.U. unless the country has similar legislation to the D.P.A.

By Savannah Rights of Data Subject See data held on themselves, but must pay small fee Have any errors corrected Claim compensation for any distress caused if the Act has been broken

By Savannah Exemptions 1.National Security - If required for the purpose of safeguarding national security, data controllers do not have to disclose the data held to data subjects. 2.Crime - Data which is being held in order to prevent or detect a crime does not have to be disclosed. 3.Taxation - any data collected for taxation purposes is exempt 4.Heath, Education and Social Work - personal data about the physical or mental health of the data subject. You have no automatic right to view your medical records. 5.Schools and examinations - personal data relating to the present or past pupils of a school. Examination scripts and examination marks held by examination authorities. Not everyone is entitled to see the data which is held on them. Exemptions are:

By Savannah Computer Misuse Act Why is it needed? To stop people hacking into other peoples computer systems To stop people creating and spreading viruses. This applies to anybody.

By Savannah Offence 1 Unauthorised access to computer material e.g looking or changing somebody's files without their permission. This offence carries the risk of being sentenced to six months in prison and/or a hefty fine.

By Savannah Offence 2 Unauthorised access with intent to commit or facilitate a crime e.g guessing or stealing a password in order to get into someone's user area or their bank account. Anyone caught doing this risks up to a five year prison sentence and/or a hefty fine.

By Savannah Offence 3 Unauthorised modification of computer material This offence covers purposely introducing viruses to other peoples' systems. e.g deletion or changes made to files with the intent to cause damage to an individual or company. This offence carries a penalty of up to five years in prison and/or a fine. Writing a virus technically isn't a crime; but if you knowingly transmit a virus to others, you are guilty under this section of the Computer Misuse Act.

By Savannah Copyright, Design & Patents Act Why is it needed? To ensure people are rewarded for their endeavours e.g music To give protection to the copyright holder if someone tries to copy or steal their work. This applies to anybody trying to steal or copy other peoples work.

By Savannah Copyright, Design & Patents Act Copyright & ICT protect from: Copying software Copying or downloading music Copying images or photographs from the web Copying text from web pages and using it in your work or posting it onto your website and pretending it is your own work. The penalties for these "copyright infringement" offences depend on the seriousness of the offences: are an unlimited fine and/or up to 10 years imprisonment.