Legal Implications 1 Computing Science and the Law V2 Data Protection Act Computer Misuse Act Copyright, Designs and Patents Act Communications Act Health.

Slides:



Advertisements
Similar presentations
Health and Safety and the use of ICT systems AQA Unit 1 Section 1 tcowling 2009 based on Mott, Leaming & Williams.
Advertisements

Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Legal Implications relating to Computing Science Data Protection Act Computer Misuse Act Copyright, Designs and Patents Act Communications Act Health and.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Legal Implications of ICT. In this section will look at: Legal Implications of ICT: ☼ Data Protection Act 1998 ◦ The 8 Principles, ◦ The Data Subject.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Legislation in ICT.
Health and Safety The risks involved in working with ICT © Folens 2008.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
Data Protection Act.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Data Protection Act. Lesson Objectives To understand the data protection act.
The Legal Framework Can you work out which slide each bullet point should go on?!
Administrative Practices Outcome 1
General Purpose Packages
1 AQA ICT AS Level © Nelson Thornes 2008 Display screen equipment regulations Health and Safety.
COMPUTER RELATED HEALTH PROBLEMS
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
Computers, the law and ethics  Lesson Objective: Understand some of the legal & ethical issues in developing computer systems  Learning Outcome: Know.
G061 - ICT Health Problems. Learning objectives: By the end of this topic you should be able to: describe health problems related to working with ICT.
The Data Protection Act By Ian Hughes Data should not be kept longer than is necessary for the specified purpose. Data processing should meet the.
IT and the LAW. The Computer Misuse Act of 1990 In the early 1980s in the UK, hacking was not illegal. Some universities stipulated that hacking, especially.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
Data Protection Act (1984, 1998). 2 Data Protection Act There are many organisations which hold personal information about individuals Examples: Loyalty.
Everyone has a duty to comply with the Act, including employers, employees, trainees, self-employed, manufacturers, suppliers, designers, importers of.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
AQA ICT for AS © Hodder Education 2008 Chapter 1 Health and safety in relation to the use of ICT systems.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
Information Systems Unit 3.
Legal Implications You need to know about the following:
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Laws related to ICT   There are 4 laws that you might be asked about in the exams: Health & Safety at Work Act The Computer Misuse Act 1990 The Copyright,
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
LEGAL IMPLICATION OF THE USE OF COMPUTER Lower Sixth Computing Lesson Prepared by: T.Fina.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
GCSE ICT Data and you: The Data Protection Act. Loyalty cards Many companies use loyalty cards to encourage consumers to use their shops and services.
Legislation 32 Legislation 32. Legislation 32 Our last topic is a BIG fave in the exam! It has often been the subject of the final question that’s worth.
ICT, Communication & related Legislations. Produced by Neil Liggett. Acts of Law – shared data & information.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Data protection act. During the second half of the 20th century, businesses, organisations and the government began using computers to store information.
  What is the purpose of the ‘copyright, designs and patents’ act? Name two ways computer users could breach the ‘copyright, designs and patents’ act?
The Data Protection Act 1998
Learning Intention Legislations impact on security of information
Data Protection GCSE ICT Mrs N Steventon-2005.
PowerPoint presentation
Implications of Digital Technology for Business and Customers
Administrative Practices Outcome 1
The risks involved in working with ICT
Data Protection Act and Other Laws
Handout 2: Data Protection and Copyright
Legislation in ICT.
Data Protection Act.
ERGONOMICS and HEALTH & SAFETY
Health and Safety.
The risks involved in working with ICT
The Data Protection Act 1998
Topic 6: Issues Press F5 to view!
Unit 7 – Organisational Systems Security
Legal and Ethical Issues
Legislation in ICT.
How it affects policies and procedures
Communicating in the IT Industry
Presentation transcript:

Legal Implications 1 Computing Science and the Law V2 Data Protection Act Computer Misuse Act Copyright, Designs and Patents Act Communications Act Health and Safety Regulations

2 The data protection Act was introduced to protect the rights of anybody who has their personal information stored on a computer system. Within the act: Data Subjects are the people whose information is being stored. Data Users are the companies or organisations (clubs, charities etc) who are using the subjects’ data. Information Commissioner is a government appointed individual who maintains a list of who is storing what data. All companies who store personal data must register with the Information Commissioner's Office. Computing Science and the Law V2 Data Protection Act 1998

3 The 8 principles of the Data Protection Act are: 1. Data is processed fairly and lawfully Data not to be used for any criminal activity such as fraud, identification theft etc. 2. Data is obtained for specified and lawful purposes Data users must have a good reason for collecting and using the personal data and only collect relevant data. 3. Data stored is adequate, relevant and not excessive Only hold personal data about customers that is sufficient for the purpose you are holding it for. 4. Data is always accurate and up to date Data must be accurate as inaccuracies could affect them negatively. E.g. wrongly recorded debt could lead to a poor credit rating and a loan being refused. Data Protection Act 1998

4 5. Data is not kept any longer than necessary Subjects data is deleted or removed after it has not been used for a set period of time. For example a survey that collects personal data would have to delete the original data once the survey is complete. 6. Data is processed in accordance with the data subject’s rights You have the right to see the personal data being held about you. 7. Data is securely stored Data users must insure that data is held in a secure location, with security in place to prevent access by unauthorised personnel. 8. Data is not transferred to another country without similar data protection legislation. Data users must be assured that their data will not be passed to countries without adequate security in place to meet the principles of the UK’s data protection laws. Computing Science and the Law V2 Data Protection Act 1998

5 Exemptions from the Act All companies have to comply with the above regulations except the Police and national security departments of the Government, such as MI5. Computing Science and the Law V2 Clip 1 The Lights are On Clip 2 What you Need to Know Data Protection Act 1988

6 Computing Science and the Law V2 Data Protection Act 1998 Now Read page 25 and do Rev. Ex 6 questions 1-4 from page 36.

Computer Misuse Act Illegal to misuse computers to perform the following actions: 1.Unauthorised access to computer material It is unlawful to hack into computer systems to gain private and confidential information. Hackers often delete, steal or alter the data they access. 2.Unauthorised access with intent to commit or facilitate commission of further offences Illegal for hacker to access protected data so that they can use the data for illegal purposes (selling data on, fraud, bribery etc). 3. Unauthorised acts with intent to impair the operation of computer Illegal to send computer viruses to perform harm to computer systems. Deliberately crashing a website by overloading the host server (DOS attacks).

Computer Misuse Act Now Read page 26 and do Rev. Ex 6 question 5 from page 36.

Copyright, Designs and Patents Act Under copyright law it is illegal to: 1.Make or sell unauthorised copies of software 2.Possess pirate software for your own use 3.If you are a company to knowingly use software you have not paid for Computing Science and the Law V2

Copyright, Designs and Patents Act Computing Science and the Law V2 Now Read page 27 and do Rev. Ex 6 question 6 from page 36.

1.Dishonestly obtaining electronic communications services Using someone’s Internet services (usually Wi-Fi) without permission. Cloning a mobile phone. Copying someone’s phone SIM card. The copy is then inserted into another phone. The owner of the original SIM will end up paying the bill for both phones. 11 Deals with abuse of telecommunication- phone lines, Wi-Fi, mobile phone network, television, broadcasting and postal services. Computing Science and the Law V2 Communications Act 2003

12 Computing Science and the Law V2 2. Possession of equipment used to dishonestly obtain communications services: Owning software used to illegally connect to password protected Wi-Fi hotspot Owning hardware used to copy phone SIMs. 3. Improper use of a public electronic communications network: Sending a message grossly offensive, indecent, obscene or menacing nature. Communications Act 2003 This could be an , text message or social network post. Sending a message that is deliberately designed to cause annoyance, inconvenience or needless anxiety to another.

13 Computing Science and the Law V2 Communications Act 2003 Now Read page 28 and do Rev. Ex 6 questions 7-8 from page 36.

Employers have a responsibility to ensure that computer users can safely use a computer system without a detrimental affect on their health. Health & Safety Regulations These responsibilities include: Monitors - Providing workstation users with tilt and swivel, anti-glare monitors to avoid eye and neck strain. Keyboards - Providing workstation users with adjustable keyboards with clearly defined characters and enough space in front to provide wrist support. Chairs - Providing workstation users with fully adjustable chairs to allow users to sit comfortably to prevent back strain. Environment - Providing an environment which has appropriate desk space, is spacious enough and has appropriate lighting to avoid eye strain. Health and Safety (Display Screen Equipment) Regulations Clip

Health & Safety Regulations Computing Science and the Law V2 15 As well as providing a healthy working environment, employers are also responsible for: 1.Conducting a risk assessment (measuring length of time at workstations, assessing equipment use). 2.Providing free eye exams for staff who continually use computer systems. 3.Providing training in correct computer use (posture, positioning of equipment, the importance of regular short breaks, how to use a mouse).

Health & Safety Regulations 16 Health problems associated with working with computers include: 1.Repetitive strain injury (RSI) Pain from muscles, nerves and tendons caused by repetitive movement and overuse. Mostly affects the upper body, such as the forearm, elbow, wrist, hands, neck and shoulders, and may also cause stiffness and swelling. 2.Eye strain Symptoms such as fatigue, pain in or around the eyes, blurred vision, headache and occasional double vision. 3.Back pain Result of being crouched and hunched towards the monitors and computer due to the design and positioning of peripherals. Can cause severe and acute pain in the upper back, particularly pain in the neck and or shoulders. 4.Computer Related Stress Tight shoulders whilst sat at the computer, having a fuzzy mind and not able to think clearly and getting angry at computer crashing or losing your data.

Health & Safety Regulations 17 Now Read page 30 and do Rev. Ex 6 questions from page 36.

Legal Implications 18 With a partner, do Task 8 from page 29.Write your answers in your jotter.