How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.

Slides:



Advertisements
Similar presentations
IT: Communication and Impacts
Advertisements

The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
By Andy Scott, Michael Murray and Adam Kanopa
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Legal Implications relating to Computing Science Data Protection Act Computer Misuse Act Copyright, Designs and Patents Act Communications Act Health and.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Internet Safety/Cyber Ethics
A01 - Safe Working Practices - Safety Patrol UK Safety Patrol UK are an organisation that travels to businesses to give presentations and advice on using.
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
Higher Administration and IT Administrative Practices.
Health and Safety Legislation
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Health and Safety.
The laws Organizations are covered by lots of different laws
The Legal Framework Can you work out which slide each bullet point should go on?!
Administrative Practices Outcome 1
Digital Citizenship By Web Design.  It is a system to teach students and teachers the way to use technology correctly. As new technology appears we all.
General Purpose Packages
Data Protection LO4: How legal, ethical, safety and security issues affect how computers should be used IR Photography would like you to create a document.
I.C.T laws By Luke Honeyfield 12. Laws relating to I.C.T  Copyright, Design, Patents  Data protection ACT  Computer misuse ACT  Health and safety.
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
Section 6 Theory Software Copyright, Viruses and Hacking.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
© Copyright © A Quick Guide. What does the law actually say? Introduced to protect people who have created original pieces of work. Books, Music, Films,
The Computer Labs are a valuable tool for learning at Prattville High School While in the labs, students will Follow appropriate code of conduct. Adhere.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
Internet Safety Internet Safety LPM
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
Legal Implications You need to know about the following:
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Laws related to ICT   There are 4 laws that you might be asked about in the exams: Health & Safety at Work Act The Computer Misuse Act 1990 The Copyright,
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Computing, Ethics and The Law
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
1 AQA ICT AS Level © Nelson Thornes Safety and security Chip and Pin.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Learning Intention Legislations impact on security of information
PowerPoint presentation
Data Protection Act and Other Laws
Handout 2: Data Protection and Copyright
Legislation in ICT.
TB2 Lesson 5 Data Protection
Understanding the issues related to the use of information
Security of People, Property and Information
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
What is Information Security?
Data Protection.
How it affects policies and procedures
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

How these affect the use of computers

There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer Misuse 4.Health and Safety All businesses are required to comply with these laws and to keep up to date with any changes.

Its aim is to protect the rights of person. The Act sets out rules on how data should be stored and used. It provides the right to complain. 1.Personal data should be kept securely. 2.Personal data must not be sold or given to a third party 3.Personal data can only be used with permission 4.Personal data must be accurate and up to date 5.Personal data must be relevant, no unnecessary information 6.Personal data must only be used for its intended purpose 7.Personal data must be destroyed when it is no longer needed 8.Personal data must be used lawfully

This act makes it illegal to copy someone else's work, without their permission. Businesses who break this law risk having to pay a fine. There are 3 common ways in which this law is broken: 1.Using software without the correct software licence – i.e. installing software on more computers than you have licences for. 2.Downloading files, such as images from the Internet. If images are used then the copyright owner’s permission must be obtained and their name acknowledged. 3.Copying music, DVDs and software. If you share music, games or movies, which you have not created yourself, you are in breach of the copyright act.

All employers and employees have a responsibility to behave safely. The main laws covering computers are: 1.Employers need to ensure computers and the area around them is safe. 2.Employers need to ensure workstation equipment e.g. chairs or monitors meet the minimum requirements. E.g. they are adjustable for different people. 3.Employers need to plan breaks and changes of activity to prevent health issues, such as eye strain, headaches, back problems and RSI. 4.Employees have the right to ask for eye tests and glasses.

This act relates to illegal access to files and data stored on computers. It was introduced to cope with the increase in hacking and viruses. There are 3 main parts to the act. 1.Unauthorised access to computer material. This means if you try to access files or data that you don’t have permission to view, then you are breaking the law. (Hackers) 2.Unauthorised access with intent to commit further offences. This means that if you access material and then intend to use it to commit fraud, you are breaking the law. 3.Unauthorised changes to a computer system. This means if you make any changes to a computer system such as deleting/editing someone's files, you are breaking the law.

Some businesses need to monitor that tasks/jobs are being completed correctly and on time. There are several ways in which this can be done: 1.GPS/mobile phones – tracking the location of staff whilst they are working away from the main building. 2.Using CCTV cameras in buildings 3.Using swipe cards to monitor movement around and in and out of a building. 4.Using cookies to monitor web site access 5.Using key logging to record tasks completed on a computer 6.Recording telephone conversations 7.Customer buying patterns – tracking items bought and targeting new products or special offers.

For 1.Employee safety 2.Quickly locate employees and get help 3.Employer has a duty of care 4.Stop any dangerous or illegal activity Against 1.Could be seen as spying on employees 2.Could be used to track employees when they are on a break 3.Could be used to gather evidence against the employee