Legal issues. Computer Misuse Act 1990 Deals with misuse of ICT systems.

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

By Andy Scott, Michael Murray and Adam Kanopa
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
IRMA Anti-Piracy Compliance Programme. What is IRMA? International Recording Media Association IRMA developed the Anti-Piracy Compliance Programme in.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Ways in Which Information Can Be Misused. In this information age in which we live information is a precious and powerful commodity Unfortunately it can.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
C opyright Toni Lumley Music. Song Copyrights Copyrights identify who actually owns the rights to a song thus who gets to make money from it. When songwriters.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Electronic Piracy Your Name Here. What is Copyright? Visit ector=piracy_online_the_law Define copyright.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
The Legal Framework Can you work out which slide each bullet point should go on?!
© Folens 2008 Cultural changes in music Brought about by ICT.
Issues Raised by ICT.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
The Social Context of Computing Foundation Computing Never underestimate the power of human stupidity.
General Purpose Packages
FatMax Licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 2.5 LicenseCreative Commons Attribution-NonCommercial-ShareAlike 2.5.
Section 6 Theory Software Copyright, Viruses and Hacking.
3.4 Legal Implications. Overview Demonstrate knowledge and understanding of the Computer Misuse Act. Describe the roles of the BBFC (British Board of.
Ethical and Legal Issues v Ethical and legal issues are relevant to any project involving systems development. – privacy – professionalism – ownership.
Intellectual Property Software Piracy. Copying of software in large quantities for resale Illegal copying by businesses and individuals for their own.
Unethical use of Computers and Networks
Crime & Malpractice AS Module Heathcote Ch. 10.
6 th Grade. a. Identify Internet safety and security concerns (Cyber Predators, etc) b. Discuss illegal aspects of software piracy, hacking, and computer.
Ways in which Information can be Misused Misuses Of Information THE Misuse of information By: Antoinette Harris, Nickietha Phinn, Ashley Williams and.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Copyright Grace, Ienash, Nick. Copyright - International  Instruments of copyright  World Intellectual Property Organisation and EU Convention on Cybercrime.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
Software Piracy By: B. Kaniecki.
Laws Jamie Dunn.
Well, sir, from the sounds of it, you've got yourself some pirated software. I'm afraid there's nothing we can do to help you.`
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
MEDIA BY DAVID TEMBO. OBJECTIVES  Description on the current state of the media  Explain in detail Reasons:  File sharing  Piracy  Digital media.
Definition of Internet Piracy Definition of Internet Piracy Internet Piracy The unlawful reproduction and/or distribution of any copyrighted digital file.
CONTROLLING INFORMATION SYSTEMS
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Health and Safety. Positive effects of ICT on physical health and mental well being Friendship using social networking Easy to keep contact with friends.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Legal issues. Computer Misuse Act 1990 Deals with misuses of ICT systems.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic works, music, movies, symbols, names, images, and designs.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Earn money by sharing files on P2P networks
Legal and ethical issues
The Copyright, Designs and Patents Act 1988
Legislation in ICT.
Chapter 11 crime and security in the networked economy
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Five Unethical Uses of Computers
Societal Issues in Computing (COMP466)
Copyright, Designs and Patents Act 1988
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
Presentation transcript:

Legal issues

Computer Misuse Act 1990 Deals with misuse of ICT systems

Legal issues Computer Misuse Act 1990 makes it an offence to: Deliberately plant or transfer viruses Use ICT equipment for unauthorized work Illegally copy computer programs Hack into a computer system to view or alter data Use computers to commit fraud

Legal issues Hacking Deliberately attempting to or actually gaining access to a computer system without permission. Hackers may: –Do nothing, be content with access gained –Look at personal or sensitive data –Use personal data for blackmail purposes –Cause damage to data –Alter data to commit fraud

Legal issues Problems with prosecutions under the Act Need to prove intent, which is difficult Companies are reluctant to bring in the police owing to possible bad publicity and loss of business Damage has been done

Legal issues Copyright, Designs and Patents Act 1988 Makes it a criminal offence to: Copy or distribute software or manuals without permission or licence from the copyright owner Run more versions of software than the software licence allows Force employees to make or distribute software

Legal issues Copyright, Designs and Patents Act 1988 Covers –Software –Text in books, magazines etc.. –Innovative Human user interfaces –Hardware –Books and manuals –Images on websites.

Legal issues Copyright, Designs and Patents Act 1988 It is illegal to: –Copy software and music without permission –Copy images or text without permission –Copy sections of websites without permission –Sharing digital music illegally using peer-to- peer software –Running more copies of software than is allowed by the site licence.

Legal issues Copyright issues Software is easy to copy It is easy to transfer files from one country to another over the Internet Many people do not see copying software as theft Companies, artists losing out and will not longer be profitable to produce new material.

Legal issues Software piracy Illegal copying of software or data 27% of all software used in UK is pirated Pirated software is sold at car boot sales, computer fairs and on eBay Pirated software deprives the owners of software of billions of pounds in revenue Where do these figures come from?

Legal issues Problems with illegally copied software May contain viruses No technical support available Does not qualify for upgrades May not be complete Above all you are committing a crime

Legal issues The industry fights back. Choose either Piracy 1)Can you find any statistics? 2)Can you comment on any case studies? 3)Where does the money for pirated items go to? 4)What is the industry doing to fight back? Hacking 1)Can you find any statistics? 2)What prolific case have their been and what were the consequences 3)What is the latest trends in Computer crime? 4)What is the industry doing to fight back? In pairs – create a presentation on differences between Patent, Copyright and Design How much does a Patent cost?