Foundations of IT Legal Issues and IT – Social Needs?

Slides:



Advertisements
Similar presentations
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Advertisements

Administrative Systems and the Law What you need to know to produce an oral presentation for Unit 7 When the presentations will take place Resources you.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
BT2103 Developing Small Systems for Business Lecture 2 Databases, Data Management, And The Legal Framework.
The Data Protection (Jersey) Law 2005.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
Higher Administration and IT Administrative Practices.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Legalities of ICT Chapter 7.
Health and Safety Legislation
Supporting Further and Higher Education JISC Legal Information Service 21 January 2003 Introduction to Copyright John Kelly JISC Legal.
Towards a Freedom of Information Law in Qatar Fahad bin Mohammed Al Attiya Executive Chairman, Qatar National Food Security Programme.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Supporting further and higher education Digital Preservation: Legal Issues Chinese National Academy of Sciences July04 Neil Beagrie, BL/JISC Partnership.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
The Legal Framework Can you work out which slide each bullet point should go on?!
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
Administrative Practices Outcome 1
Legal Aspects of Computer System Security “Security - Protecting Our Resources”
General Purpose Packages
Handling information 14 Standard.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
Computer Legislation The need for computer laws Go to Contents.
L, E & P ISSUES1 Follow up on PSP: The PSP is about QUALITY - numerous measures are used - with the obvious commitments to data collection. One of the.
The Data Protection Act 1998 The Eight Principles.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Data Protection Act AS Module Heathcote Ch. 12.
Data Protection Corporate training Data Protection Act 1998 Replaces DPA 1994 EC directive 94/46/EC The Information Commissioner The courts.
What is personal data? Personal data is data about an individual which they consider to be private.
The Data Protection Act - Confidentiality and Associated Problems.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Federation Against Software Theft. What Is Copyright? What is copyright infringement? What are the penalties for copyright infringement? What is a trade.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
Computing and Information Science 1 Databases START.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Legal Implications You need to know about the following:
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
Computing, Ethics and The Law
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Learning Intention Legislations impact on security of information
Legal challenges related to software vulnerability disclosure
PowerPoint presentation
Administrative Practices Outcome 1
Handout 2: Data Protection and Copyright
Legislation in ICT.
Data Protection Legislation
Unit 7 – Organisational Systems Security
General Data Protection Regulations 2018
Legislation in ICT.
Presentation transcript:

Foundations of IT Legal Issues and IT – Social Needs?

2 Intended Learning Outcomes Through engaging in self-study, preparation and learning activities you will:  Be aware of some UK statutes related to the IT industry and users of IT  Be aware of some illustrative case law regarding the Use of IT  Be increasingly aware of some copyright and trademark issues connected with IT

3 Reality Check!  There are higher degrees that focus on IT / computing law, thus this session can only hint at the issues and the legislation.  As IT develops and changes the law tries to change but it can be slightly out-of-step

4 Activity 1 – Knowledge  Discuss with a partner and record the things you know are ‘illegal’ or breaches of some form of contract  Record the legislation you are aware of that impinges on IT and IT users

5 Main Statutes in English Law - 1  Computer Misuse Act 1990  Copyright Act 1956  Copyright (Computer Software) Amendment Act 1985  Copyright, Designs & Patents Act 1988  Disability Discrimination Act 1995 & 2005

6 Main Statutes in English Law - 2  Data Protection Act(s) 1984 & 1998  Interception of Communications Act 1985  Regulation of Investigatory Powers Act 2000  Protection of Children Act 1978  Various Trademarks Act 1994

7 Data Protection  Legislation regarding data protection is also found in other countries:  France  Germany  Sweden  USA  Singapore  Hong Kong  Australia  ?

8 Data Protection  Data Protection Act 1984 – This had limited scope – in the main it related to processes that required individuals, companies and organisations to register that they held data.

9 Activity 2 - Register  When do you feel it would be necessary for an individual, an organisation or a business to register (as previously required ) or notify (as currently required) under the terms of Data Protection?

10 Activity 2 - Register  It is probable that you will have to register if you are dealing with Personal data  Personal data means data which relate to a living individual who can be identified from those data or from those data and other information which is in the possession of, or is likely to come into the possession of, the data controller. 

11 Data Protection Data Protection Act 1998 defines data protection principles.

12 Data Protection 8 enforceable principles of good practice

13 Data Protection fairly and lawfully processed; 1

14 Data Protection processed for limited purposes; 2

15 Data Protection adequate, relevant and not excessive; 3

16 Data Protection accurate; 4

17 Data Protection not kept longer than necessary; 5

18 Data Protection processed in accordance with the data subject's rights; 6

19 Data Protection secure; 7

20 Data Protection not transferred to countries without adequate protection. 8

21 Data Protection  Personal data covers both facts and opinions about the individual.

22 Data Protection Data processing, the definition is far wider than previously accepted. Incorporates the concepts of 'obtaining', ‘holding' and 'disclosing'.

23 Computer Misuse Act 1990 criminal offence  The so called ‘basic offence’ under this Act states that it is a criminal offence to obtain unauthorized access to computer material.  Unauthorised access includes "browsing" or "probing”.  It implies that the individual knows that in gaining access he/she is gaining unauthorised access.

24 Computer Misuse Act 1990 This raises three questions:  What constitutes access?  What constitutes authorised access?  How is it possible to make a judgement about any individual’s degree of ‘intent’?

25 Activity 3 – Access etc…  Spend a few minutes discussing what you believe may constitute ‘access’  What is your understanding of ‘intent’  Do you consider there to be a difference between ‘obtaining’ and ‘processing’

26 Case Scenarios A “Mike” went to a locksmith to purchase some equipment. He had formerly worked as a sales assistant at the business. The transaction was entered on a PC. While the PC was left unattended Mike keyed in a code that provided a 70% discount thus reducing the cost of the equipment from some £700 to £200. When the business realised what happened “Mike” was arrested and charged with an offence under Computer Misuse Act. How did the case progress?

27 Case Scenarios A on another computer The Judge dismissed the case because he held the narrow view that the phrasing in the legislation about access, required one PC to be used to obtain access to a ‘program or data held on another computer’.

28 Case Scenarios - B An electrical contractor’s office has recently installed a network. The PCs are used by administrative staff. During a lunch break one of the company electricians sits at a PC and views unacceptable material on the web. A member of the administrative staff returns from lunch break to find disturbing images on the PC. In what circumstances might there be an offence?

29 Case Scenarios - B Unauthorised access will only be an offence when the user is aware that access is unauthorised! all employees Actions: The Electrical Contractor needs to get all employees to sign an ‘Acceptable Use’ policy. This should ensure that the employees appreciate who has authorised access and that if they do not any access will be deemed to be unauthorised

30 Case Scenarios - C A computer ‘hacker’ admitted to gaining unauthorised access to several computer systems on several occasions. The hacker’s defence suggested that the hacker was addicted to hacking. Is there any intent involved in the hacker’s actions?

31 Case Scenarios - C The defence argued that as this was an addiction there was no intent because the hacker was acting as a result of a compulsion. The judge directed the jury that this would not be a proper defence against the charges. The jury acquitted the defendant – Juries are not allowed to provide reasons for their decision.

32 Copyright and Trademarks  Copyright Act 1956  Copyright (Computer Software) Amendment Act 1985  EC directive on the Legal Protection of Programs….  Copyright (Computer Programs) Regulations 1992

33 Copyright and Trademarks  Copyright can be applied to software but also can be applied to any information recorded in electronic format such as e- mail, multimedia and web pages  Piecemeal approach to technology  1956 Act extended protection to TV and radio broadcasts

34 Copyright and Trademarks  Copyright lasts for the lifetime of the author and continues for 70 years after the author’s death  Copyright applies to three forms of ‘property’

35 Activity - Copyright  What do you think are the three forms of property?  Literary, dramatic, musical or artistic works  Sound recordings, films, broadcasts or cable programmes  Typographical arrangement of a published work

36 Copyright  The 1988 Act states that a literary work would include “ a computer program”  Where does a computer program end and a film begin? (e.g. Toy Story )  Issues of digital sampling (sound)?  Issues of digital photos  Back up copies?

37 Trademarks  Trademarks Act 1994 defines a trademark as: – …any sign capable of being represented graphically…(it may include) words (including personal names) designs, letters, numerals & packaging

38 Activity - Trademarks What elements of a domain name would it be appropriate to register as a trademark? What is cyber-squatting? What EU IT law and directives are there?

39 Activity – Sources of information  Use Google – search  Use Google Scholar –  Check Library – search  Lloyd, I. J., (2000) Information Technology Law (3 rd Ed.) Butterworths  Hedley, S., and Aplin, T. Blackstone’s Statutes on IT and e-Commerce Oxford University Press