ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.

Slides:



Advertisements
Similar presentations
IT: Communication and Impacts
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Let’s Talk About Cyber Security
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
1 AQA ICT AS Level © Nelson Thornes Data Protection Act.
General Purpose Packages
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
IT security By Tilly Gerlack.
Elma Graham. To understand what data protection is To reflect on how data protection affects you To consider how you would safeguard the data of others.
Pass ECDL41 European Computer Driving Licence Module 1 – Concepts of IT Chapter 1.6 – Legal Issues and Security.
A virus is a piece of software tht is designed to copy itself onto other programs causing them to function differently. In the 80’s, when the viruses.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
The Data Protection Act (1998). The Data Protection Act allows you to Check if any organisation keeps information about you on computer or in paper form.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Project 1a Evaluation Section. Using ICT Advantages and Disadvantages of using ICT.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Legal issues The Data Protection Act Legal issues What the Act covers The misuse of personal data By organizations and businesses.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Computer security By Isabelle Cooper.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
All about viruses, hacking and backups By Harriet Thomas.
Computer security By Georgia. Contents b b What is a virus ? b b How to stop viruses b b What is a hacker ? b b How to prevent hackers b b What are backups,
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
Digital Citizenship Project Created By: Celeste Jackson ED 505-Dr. Martha Hocutt.
Information Systems Unit 3.
Data Protection Act (1998).
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Laws related to ICT   There are 4 laws that you might be asked about in the exams: Health & Safety at Work Act The Computer Misuse Act 1990 The Copyright,
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
ICT and the Law You need to know about 3 laws covering the use and misuse of ICT.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
1 AQA ICT AS Level © Nelson Thornes Safety and security Chip and Pin.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Learning Intention Legislations impact on security of information
Handling Personal Data
Data Protection Act and Other Laws
Legislation in ICT.
The Data Protection Act & ICT Law
Unit 7 – Organisational Systems Security
Legislation in ICT.
Communicating in the IT Industry
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

ICT and the Law Mr Conti

Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because it is private and personal – nothing to do with anyone else. In order to keep our details private, we need a Data Protection Act.

The Data Protection Act 1998 sets out to protect the privacy of personal information. It only covers personal information about living individuals, not about businesses. It covers data stored on computer or in a paper-based filing system. It lets people check what data is being held about them. It is run by the Information Commissioner’s Office.

Data subjects are people who have data held about them – just about everybody really. Data users are the people or organizations who hold the data. There are far more data users than many people think. An organization holding data has to have a data controller – a person who makes sure the act is followed. Subjects and users

what data they want to store what they want to use it for how long they will keep it who they might pass it on to. What do data users have to do? They have to notify the Information Commissioner and say: They also have to agree to follow the eight Data Protection Principles.

It’s the principle of the thing The act says that data must be: 1.fairly and lawfully processed (used) 2.used for limited purposes 3.adequate and relevant. Only what is needed may be used 4.accurate 5.not kept for longer than is necessary 6.accessible to the individual and able to be corrected or removed where necessary 7.secure 8.not transferred to countries without adequate protection.

see what data is being held about them if they ask the data user. They may have to pay to see it What rights do data subjects have? They have the right to: change anything that is wrong refuse to have some data stored at all, if it might cause damage or distress refuse to allow processing for direct marketing – junk mail complain to the Data Protection Commission if they think the rules have been broken claim compensation if they can prove they have been caused damage by a data controller breaking the rules.

national security – you cannot demand to see your data if national security is at stake police investigations – information being used to prevent crime is not covered (though police records are) examination results are exempt until they are published by the examining bodies. Do users always have those rights? There are a few cases when the Data Protection Act does not apply. These are called exemptions to the Act. Here are a few of them:

Socrative Task 1 Data Protection Student Log In Room

Look, this is my new program! You say the words you want and it types them for you. Guaranteed 100% accurate. That’s amazing!

But the best bit is, it can change it to any language you want just by pressing this button, and it always gets it right. Wow. Did it take long to write? Years and years, but I’m so proud of it I’m going to give it away to everyone who wants it! Do you want a copy?

Did you notice anything wrong with the previous slide? Would you give away years of work and knowledge without expecting a reward for it? Most people feel that they have a right to be paid for the work they do. That’s why we need copyright laws. The Copyright and Patents Act aims to protect people who invent things from having their ideas stolen. It covers software as a whole, and also the code that makes up the software. When you buy software, you don’t actually buy the software itself. You buy the right to use it, which is called a license. You can only use it in the way the license says you can.

The Copyright and Patents Act aims to protect people who invent things from having their ideas stolen. It covers software as a whole, and also the code that makes up the software. When you buy software, you don’t actually buy the software itself. You buy the right to use it, which is called a license. You can only use it in the way the license says you can.

Socrative Task 2 Copyright Student Log In Room

1. Unauthorized access to computer material is an offence. That’s bad. That’s worse. That’s the worst! 2. Accessing with intent to commit or facilitate committing another offence. 3. Unauthorized modification to computer material. The Computer Misuse Act was passed to stop unauthorized access to computers, often called hacking. There are three offences in the act.

Many people think of hackers as glamorous teenage whizz kids who know lots about computers. Hackers Who is the hacker? Some hackers are teenagers, often bored ones, but others may be system administrators, business rivals, thieves, foreign security services or disgruntled employees. Hackers may not mean to damage anything, but they might do so by accident. It could be any one of them!

Firewalls A firewall can stop others from hacking into your computer. This is a program which filters data coming in through the Internet to a computer or network. It stops people hacking into your system, taking control of your computer and using your machine as a host to access or run programs.

Computer viruses A virus is a piece of computer code which copies itself, usually without your permission. Some viruses can damage data. All viruses use up system resources (memory, hard disk space, etc.). Viruses are written by people, they don't just appear. On many occasions they are sent as attachments to s. Because viruses cause computer code to be modified (changed), they are illegal under the Computer Misuse Act. The first British virus writer to be prosecuted, in 1995, was sentenced to 18 months in prison.

Preventing infections Install anti-virus software and ensure it is updated regularly. Avoid downloading programs from unknown sources. Never run macros in programs unless you know what they are. Never open an attachment if it is not from someone you know.

Summary The Computer Misuse Act was passed in It is designed to stop unauthorized access. Hackers attempt to take control by viewing, accessing or running programs from another person’s computer without their permission. A firewall stops other users from hacking into your computer by filtering data coming in through the Internet to a computer or network. A virus, virus, worm and Trojan horse are all types of electronic infections. Anti-virus software prevents infections, providing it is regularly updated.

Socrative Task 3 Computer Misuse Student Log In Room