The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.

Slides:



Advertisements
Similar presentations
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Advertisements

Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Legislation in ICT.
Higher Administration and IT Administrative Practices.
Software Copyright. Learning Objectives: By the end of this topic you should be able to:
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Health and Safety Legislation
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
General Purpose Packages
I.C.T laws By Luke Honeyfield 12. Laws relating to I.C.T  Copyright, Design, Patents  Data protection ACT  Computer misuse ACT  Health and safety.
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
Data Protection and Computer Misuse Act material Modified by Eric from Mary’s slides.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
The Data Protection Act 1998 The Eight Principles.
The Four Laws relating to ICT Health and safety Data protection act Copyright Computer misuse act By Marcus Ellis.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Computing and Information Science 1 Databases START.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
» The Health and Safety at Work etc. Act 1974 is the primary piece of legislation covering occupational health and safety in the United Kingdom. » The.
Legal Implications You need to know about the following:
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Computing, Ethics and The Law
Health and Safety Refresher Training
Copyright. What is Copyright? Copyright is a form of legal protection for the creator of a piece of work. It gives the creator (an author, composer, artist,
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Learning Objectives Can I discuss the copyright law Can I identify why organisations must protect data Can I describe how legislation affect computer use.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
Learning Intention Legislations impact on security of information
PowerPoint presentation
Data Protection Act and Other Laws
Handout 2: Data Protection and Copyright
Legislation in ICT.
Data Protection Act.
Understanding the issues related to the use of information
L.O. – How might copyright law affect our new media text?
What is Copyright? Elaine Munn.
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
Copyright, Designs and Patents Act 1988
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
How it affects policies and procedures
Presentation transcript:

The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others against risks to health and safety in connection with the activities of persons at work. Before the Health And Safety act was introduced in 1974 it was estimated that eight million employees had no legal safety protection at their work place. The employees must abide the following rules for the health and safety act to work. 1.To provide a good standard of control of the health and safety risks arising from work activities 2. To ensure all employees are competent to do their tasks and to give them sufficient training.

3. To review and upgrade this policy as compulsory at consistent intervals. 4.To consult with our employees on matters affecting their health and safety. 5. To provide and maintain safe plant and equipment 6. To provide information and supervision for employees 7. To maintain safe and healthy working conditions 8. To ensure safe handling and use of substances 9. To prevent accidents and cases of work related ill health

The Copyright, Design & Patents act was introduced to protect the copyright of individuals who have created original pieces of work. These can come in the form of authors books, composers of music, art, software developers. The penalties for breaking this Act include up to two years in prison and unlimited fines. Software piracy has become a major problem in the United Kingdom, it is estimated that 40% of all software is copied Names, titles, short phrases and colours are not generally considered unique or substantial enough to be covered, but a creation, such as a logo, that combines these elements may be.

Interpretation is related to the personal creation rather than the idea behind the creation. For example, your idea for a movie would not itself be protected, but the actual script of the movie you write would be. So, someone else is still entitled to write their own movie around the same sort of idea, provided they do not directly copy or change yours to do so. 1. Literary - Song lyrics, manuscripts, manuals, computer programs, commercial documents, leaflets, newsletters and articles. 2. Dramatic - Plays, dance,Musicals 3.Musical - Recordings and scores of music. 4. Artistic - Photography, painting, architecture, technical drawings/diagrams, maps and logos 5.Typographical - arrangement of published editions Magazines and periodicals 6. Sound recordings - May be recordings of works, e.g. musical 7. Films Broadcasts and cable programmes Rights do not subsist in any part of a work which is a copy taken from a previous work.

This is a piece of U.K. legislation that has been passed to protect your rights as an individual to have your personal data collected, stored and used in a suitable manner. The Data Protection Act requires anyone who handles personal information to comply with a number of important principles. It also gives individuals rights over their personal information Individuals have a wide range of rights under the Data Protection Act, including access, compensation and the prevention of processing.

The Act works in two ways. Firstly, it states that anyone who processes personal information must comply with eight principles, which make sure that personal information is: Fairly and lawfully processed Processed for limited purposes Adequate, relevant and not excessive Accurate and up to date Not kept for longer than is necessary Processed in line with your rights Secure Not transferred to other countries without adequate protection. The second area covered by the Act allows people who have important rights, including the right to find out what information is held on computer and most paper records. If an individual or organisation feel they're being denied access to personal information, or feel their information has not been handled according to the eight principles, they can contact the Information Commissioner's Office for guidance.

The computer misuse act of 1990 is a law in the united kingdom that makes illegal certain activities such as hacking into computers and databases or misusing systems a crime. The computer misuse act enables people to be prosecuted if they commit one of the following offences Unauthorised access to computer material Unauthorised access with intent to commit or facilitate a crime Unauthorised modification of computer material. This involves the distributing of viruses If you are found guilty of these offences you could face up to a five year prison sentence and a very hefty fine.

The penalties for each individual offence are. 1. Unauthorised access to computer material ('hacking') including the illicit copying of software held in any computer. This carries a penalty of up to six months imprisonment or up to a £5000 fine. 2. Unauthorised access with intent to commit or facilitate commission of further offences, which covers more serious cases of hacking, with a penalty of up to five years imprisonment and an unlimited fine. 3. Unauthorised modification of computer material, which includes the intentional and unauthorised destruction of software or data; the circulation of "infected" materials online; and the unauthorised addition of a password to a data file. This offence also carries a penalty of up to five years imprisonment and an unlimited fine.