3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.

Slides:



Advertisements
Similar presentations
I. Positive IT has had a massive impact in the last 40 years. People rely on using technology to stay in touch with people. Technology has had a positive.
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
An overview of the Data Protection Act Legal framework The Data Protection Act 1998 came into force in March 2001, replacing the Data Protection.
Data Protection Act. Lesson Objectives To understand the data protection act.
 The Data Protection Act 1998 is an Act of Parliament which defines UK law on the processing of data on identifiable living people and it is the main.
The Legal Framework Can you work out which slide each bullet point should go on?!
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
1 AQA ICT AS Level © Nelson Thornes Data Protection Act.
General Purpose Packages
Computer Legislation The need for computer laws Go to Contents.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.
Data Protection Act AS Module Heathcote Ch. 12.
What is personal data? Personal data is data about an individual which they consider to be private.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
THE DATA PROTECTION ACT Data Protection Act 1998 DPA 1. Reasons2. People3. Principles 4. Exemptions 4 key points you need to learn/understand/revise.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
Data Protection Act (1998).
Legal Implications You need to know about the following:
Health and Safety. Positive effects of ICT on physical health and mental well being Friendship using social networking Easy to keep contact with friends.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
Computing, Ethics and The Law
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
DATA PROTECTION ACT DATA PROTECTION ACT  Gives rights to data subjects (i.e. people who have data stored about them on a computer)  Information.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
The Data Protection Act 1998
Learning Intention Legislations impact on security of information
Legal and ethical issues
Implications of Digital Technology for Business and Customers
Legislation in ICT.
TB2 Lesson 5 Data Protection
The Data Protection Act 1998
Data Protection Legislation
Understanding the issues related to the use of information
Data Protection Act.
Identify the laws and guidelines that affect day-to-day use of IT.
Legal and Ethical Issues
Legislation in ICT.
Data Protection.
Presentation transcript:

3.4 Legal Implications

Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of Film Classification) and PEGI (Pan European Game Information) in establishing classifications for computer games. Keep informed about up-coming legislation in the UK regarding gaming classifications (Byron Review).

Overview Demonstrate and apply knowledge and understanding of: The Computer Misuse Act and describe the terms hacker, virus and spyware and how these relate to the Act; The Copyright Designs and Patents Act and identify breaches of the Act including software piracy and software licensing; The Data Protection Act and identify the eight principles of the Data Protection Act; State the rights of the data subject and the responsibilities of the data controller and Information Commissioner in ensuring the Data Protection Act is enforced.

PEGI Pan European Game Information A European video game content rating system established to help European parents make informed decisions on buying computer games with logos on games boxes.

Game Age Ratings 3 ratingSuitable for ages 3 and over 7 ratingSuitable only for persons of 7 years of age and older 12 ratingSuitable only for persons of over age 12 and older 16 ratingSuitable only for persons of over age 16 and older 18 ratingSuitable only for persons 18 years of age and older

Content Descriptions Violence Profanity Fear Sex Drugs Discrimination Gambling On-line

BBFC British Board of Film Classification Suitable only for adults 18 For adults only Restricted 18 Suitable only for those aged 15 and over 15 Suitable only for those aged 12 and over 12 May be unsuitable for under 12s 12A General viewing Parental Guidance All ages admitted Universal Suitable for all Universal Children

Byron review A report delivered on the 27 March 2008 to the UK Department for Children, Schools and Families. It was authored and overseen by Dr Tanya Byron. The Review focuses on the use of video games and the Internet (particularly social networking websites) by children, and discusses the use of classification and the role of parenting in policing them.

Computer Misuse Act Makes it illegal to: deliberately plant viruses in a computer system; gain unauthorised access to a computer system; commit computer fraud; and use a company computer without permission.

Definitions Hacker: A person who accesses a computer system without permission in order to do damage. Virus: A program designed to damage the operation of a computer system. Spyware: Software that can steal a person’s information from their computer system. Piracy: Illegally downloading information or programs which you do not have permission to do. Plagiarism: Passing work off as your own.

The Copyright Designs and Patents Act Deals with: illegally copying or downloading software; stealing ideas from one company for use in another; using unlicensed software; and non-payment of downloaded materials.

Data Protection Act Principles: 1.Data must be kept accurate and up-to-date. 2.Data must be kept no longer than necessary. 3.Data must be processed fairly and lawfully. 4.Data must be held securely. 5.Data must not be transferred outside the EU. 6.Data must not be kept longer than necessary. 7.Data must only be used for the specified purpose. 8.Data must be adequate and relevant for the intended purpose.

Data Subject Definition: The person about whom the information is about. Rights: Has the right to view data held about them. Has the right to have data explained to them.

Data Controller Definition: The person in a company who is responsible for controlling the way in which the data is processed. Responsibilities: Notifies the Data Commissioner on the intent to store data. Is responsible for the security surrounding the stored data.

Information Commissioner Definition:The person responsible for enforcing the Data Protection Act and enlightening the public about their rights. Responsibilities: Provides advice on protection. Helps organisations understand legislation.

Acronyms BBFC: British Board of Film Classification PEGI:Pan European Game Information

Exercise Different ICT laws exist in different countries. Find one such law and describe its purpose.